Examining
two of the most eminent features in an access control system and door
controller with slave reader operated through smart cards or finger
punch for surveillance.
Anti
Pass Back:
This
refers to a process of blocking the unauthorized access of
unregistered person through a registered employee.
It has been experienced in the offices that unauthorized people access a particular floor with the help of an authorized person with only one access card. Once an employee who has marked IN by punching the card on access system will need to mark OUT as well to complete one cycle on IN and OUT from the floor, otherwise the system won't allow the employee to enter or leave the floor, this feature, in turn, can block the exit of the person who has entered the floor illegally as he/she won't be able to move out from the floor now.
It has been experienced in the offices that unauthorized people access a particular floor with the help of an authorized person with only one access card. Once an employee who has marked IN by punching the card on access system will need to mark OUT as well to complete one cycle on IN and OUT from the floor, otherwise the system won't allow the employee to enter or leave the floor, this feature, in turn, can block the exit of the person who has entered the floor illegally as he/she won't be able to move out from the floor now.
Feedback
Locks:
Following
the list of various modes of security breach through access control
systems, another one in the list can be a physical barrier which can
obstruct a gate from closing, let us suppose an authorized employee
opened the door with the access card and placed a chair, rod or any
other object before the door creating a barrier and not letting it to
meet the armature plate to get closed. This act can make the doors
open for everyone. What is particular about feedback locks is the
siren or beep sound which gets installed with the doors so that if
any object restricts the door in getting closed, the siren or beep
sound starts ringing, informing everyone about the suspicious
activity.
No comments:
Post a Comment