inner_b1

Access Control System

Access control systems (ACSs) rely on administrator-defined rules that allow or restrict user access to protected network resources. These access rules can, for example, require strong user authentication such as tokens or biometric devices to prove the identity of users requesting access. They can also restrict access to various network services based on time of day or group need.

Some ACS products allow for the creation of an access control list (ACL), which is a set of rules that define security policy. These ACLs contain one or more access control entries (ACEs), which are the actual rule definitions themselves. These rules can restrict access by specific user, time of day, IP address, function (department, management level, etc.), or specific system from which a logon or access attempt is being made.

TYPES OF ACCESS CONTROL SYSTEM

  • Standalone Access Control System
  • Single Door Networkable Access Control system
  • 2 Door Access Control System
  • 4 Door Access Control System
  • Elevator Access Control system

VARIOUS MODELS USED IN ACCESS CONTROL SYSTEM

  • Fingerprint
  • Facial
  • Palm
  • Iris