top of page
Mike Pagnutti

Enhancing Security Efficiency: The Role of Card Access Systems

I end up explaining how card access works to at least one end user a week. I know not all systems work this way. I’ve also never worked as a system designer, but I’ve been in the user side of so many softwares that I lost count. With my knowledge, I explain it like this:


Card access is dumb until it gets back to the software.


It’s a series of (usually) 5 digits on a credential.


That credential can be a card, fob, or stored digitally on your mobile phone. For simplicity’s sake, we’ll call it a card for today.


These 5 digits are in a database table contained in the board controlling the access point.


You present your card, and the board looks it up in the table.


Card #12345 in table? Yes or No


Card #12345 allowed in access point? Yes or No


It’s 04/20/2024 at 13:53. Is card #12345 allowed at this time? Yes or No


Then the board logs all this information and decides if that credential has access. If the answer is yes, the board usually changes the state of a relay, which basically means touches two wires together or pulls them apart.


That’s when the “magic” happens and the door, gate, or whatever can be opened.


I tend to geek out a little bit when it comes to that “magic”. I love working with low voltage and making a whole bunch of components work together.


What does all that mean for the end user and the role of card access in the security program?


First and foremost, it means SECURITY AND ACCOUNTABILITY!


What I mean about accountability is when those five digits make it back from the board database to the software.


As the system administrator, you know where and when that card was used. Once it’s in the software, it no longer shows up as #12345, it shows up as the card holder’s name.


Now you can see that Steve Smith tried to access the marketing door at 1:53 pm on Saturday. I don’t know Steve who works in your office, but you do. Let’s pretend Steve was given a card and his information was set up in your properly designed software. With most access control softwares you can set up access to specific doors. You can even set up specific days and times for access for multiple or specific doors.


Maybe Steve does your poster design and is allowed in the marketing door 24/7 so the door unlocked.


Maybe Steve works in your mailroom and is allowed in the marketing door Monday through Friday and has no business being in there on Saturday so the door stayed locked.


Maybe Steve works in maintenance with facility wide, 24/7 access and there was an issue. The door unlocked.


This reporting and data logging enables you to pull (or automate to email) reports for accountability of credential holders.


Marketing Steve puts in for overtime including Saturday? Pull a report on that door for the pay period.


There was a security issue on Saturday? Pull a report of unsuccessful access attempts (or all access allowed or denied) for all doors…mailroom Steve will be in there!


Want to know what maintenance requests were attended to on Saturday? Pull a report to show what doors maintenance Steve accessed for that day.


From a security standpoint the options and advantages are almost endless.


These options vary from one software to another, but I’ll list a few of my favourites.


I’ve already mentioned the access levels, but you can tailor these to specific doors, individual, or groups of cardholders.


I’ve also mentioned the day/time zones in relation to cardholders and specific doors. These can also be applied to have a door unlock for a set period. You can have your main entrance unlock during the day for client access. You can also set that schedule to only start AFTER a staff member presents their card.


Door position contacts will notify you if a door is propped open.


Request to Exit inputs will let you know when someone went back out the door and can tell the difference between someone going out and a door being forced open from the outside.


Anti-pass back can be either timed or need the card holder to present their card at an exit reader. This keeps cardholders from passing their card back to someone who will use it after them.


Dual credential is the feature of needing a code and a card. It reduces the risk if a card gets lost and it much better than using a code alone.


Dual custody requires two valid card holders to swipe before the door can be unlocked.


Access limits is the feature of limiting the number of cardholders within a space.


Yes, yes…card access can be defeated. That’s why I say it plays a role in the Security Program. There needs to be other layers in place. People need to pull these reports or respond to alarms. The culture of the facility needs to be embracing of the system. More on that in another post. We’re here to talk card access.


In order to maximize the advantages and security of your card access system there needs to be acceptance from the card holders. More on that in another post.

4 views0 comments

Recent Posts

See All

Comments


bottom of page