Browse Electronic Keypads for Access Control Systems

Electronic keypads - Expert commentary

Why face recognition as a credential is the ideal choice for access control?
Why face recognition as a credential is the ideal choice for access control?

In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.

Key-centric access management system: providing the highest possible levels of security
Key-centric access management system: providing the highest possible levels of security

In daily work and life, various locks have always played the role of protecting asset safety. In different usage scenarios, the most appropriate lock must be selected to maximise benefits. In the past applications, the difficulties encountered by managers are as follows. Unlocking authority is difficult to control, unclear access records, emergency unlocking, and troublesome upgrade and installation. Through the following points, how the key-centric access management system solves such problems. Access management system The key-centric access management system, also known as intelligent passive electronic lock system, which is based on three elements: electronic keys, electronic cylinders and management software, can provide powerful and traceable access control. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be quickly disabled. Each smart key is unique and cannot be copied, and in the event of loss or theft, these keys can be disabledIn the process of using traditional mechanical locks, it is not difficult to find that it is quite complex to realise the access control of unlocking. The difficulty is that the keys can be copied at will, the use records are not clear, and the credibility of employees cannot be guaranteed... etc. For managers, this is a safety issue that cannot be ignored. Mechanical lock system And through the key-centric access management system, we can accurately assign access authority for each user, and set different access authority for locks in different areas. For example, we can set the XX user to have access to the archive room (A) from 10:00 on May 1, 2021 to 17:00 on June 1, 2021, within this time range. Outside this time range, there will be no unlock authority. The flexibility of the traditional mechanical lock system is insufficient. There is no clear record to determine who entered the area. It is usually a simple paper record that records the unlocking records of the employees. The authenticity and validity of the system need to be examined. In the key-centric access management system, when an employee unlocks the lock, the unlock record will be synchronised to the management terminal. Remote authorised unlocking With the key-centric access management system, remote authorised unlocking can be realised Through secondary records, managers can easily track employees and supervise employees' visits to each area. In daily work, there are often emergencies that require temporary visits to certain specific areas. If you encounter a situation where the distance is extremely long, and you don’t have the key to that area, you can imagine how bad this is. The process of fetching the keys back and forth is time-consuming and laborious. With the key-centric access management system, remote authorised unlocking can be realised. You can apply for the unlocking authority through the mobile APP, or you can temporarily issue the unlocking authority for the area on the management terminal, which saves time and effort. When faced with the failure of ordinary mechanical locks to meet management needs, some managers can already think of upgrading their management system, that is, the intelligent access control system. Passive electronic locks But before making this decision, the manager will inevitably consider the various costs brought about by the upgrade, including installation costs (cable cost), learning costs, and maintenance costs. Since most of the universal intelligent access control systems on the market require wiring and power supply, the cost of transformation and upgrading is quite high for managers who have such a huge amount of engineering. The key-centric access management system is the ‘gospel’ for managers. Since passive electronic locks and ordinary mechanical locks have the same size, they can be directly retrofitted to existing hardware, and they can be replaced step by step simply and easily. At present, the key-centric access management system is being known and applied by more and more managers and enterprises. Application industries include, such as power utilities, water utilities, public security, telecommunication industry, transportation, etc.

Automatic gates: Making the right investment for access control
Automatic gates: Making the right investment for access control

The experience of the COVID-19 pandemic has made us all more conscious of who is coming and going from our property. Whether it is a family home, business premises or public building, property owners want full control over access for protection and peace of mind. As a provider of access control technologies, we are seeing a growing demand for automated gates with a variety of access control systems. There are a number of considerations that buyers need to make when investing. And as an installer, there is advice that you can offer to help your clients make the right choice for their property. Here are some of the key considerations you’ll need to make and discuss with your client. Whomever you buy from, you should be offered more than a simple instruction manual. Electronic locks, magnetic locks and code security In the first instance, you’ll need to advise on the type of lock and access control available. Electronic locks release on the operation of the automation system to allow the gates to open. Locks are required for all non-locking (also known as reversible) operators and are recommended for any gate on a multi-user site or any gate over 2.5m. Apply the same logic to an automated gate as you would to a domestic door – for example, you wouldn’t fit your front door with a lock on the same side as the hinges or a drop bolt at the hinge end of a manual gate so why dispense with this logic when the gate is automated? Electronic locks release on the operation of the automation system to allow the gates to open There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks. These are all designed for external use. While the gate itself will provide physical security, the customer will want to feel in control of who enters their property, when and for what purpose. Consider access for post and deliveries, waste disposal and visitors arriving on foot etc. There is a range of options available. Intercom systems will allow the user to vet visitors, keypad entry can allow remote access for visitors with a specific code, remote controls allow an oncoming driver to open the gates without getting out of the vehicle, and a timer control can be used to open or close the gates at certain times of the day. Vehicle detection loops can be installed discreetly under the tarmac allowing the presence of vehicles to exit the gates and prevent closing whilst obstructed. Sliding gates versus swinging gates There are a number of locks on the market including magnetic locks, drop locks that “shoot” a bolt into the ground and side latching locks Gates can be automated to either swing or to slide open and in the case of swinging gates, the opener may be concealed underground or gate mounted. The most suitable opener for your installation will depend on the space available and the type of gate selected. Concealed underground automation is ideal for highly ornate gates. However, where gates are fully infilled (typical of many timber designs), gate mounted openers are concealed from the front of the gate by the gate leaf and present a cost-effective option. The choice between slide and swing is largely down to space - swing gates require a clear space for their opening arc whilst sliding gates require space to one or both sides of the gate. Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited, as they use the least space when opening. Voltage Most swing gate and sliding systems are available in 24v or 230v. The 24v systems still need 230v mains power – there is a transformer built into the 24v control panels. Deciding which voltage to use can include a combination of factors such as the material of the gates, the location of the system and the safety features you want. Concealed underground automation is ideal for highly ornate gates With wrought iron gates, the wind can pass through them whereas with fully boarded wooden gates (popular because they give full privacy) the wind has nowhere to go, so they act like sails. For commercial or industrial applications with larger entrances and a heavy gate, you may need 3 Phase 400v power (sliding gates only). Installing gate motors in confined spaces The environment in which you are fitting may well influence which gate and motor you recommend. Will it be in an exposed area which is subject to the elements? Will it be positioned on a slope? Sliding gates are perhaps the best choice where the drive slopes or when drive space is limited Installers have always faced the challenge of installing gate motors in confined spaces. When fitting a pedestrian gate, there is often limited space in which to work – potentially making an installation time consuming and technically demanding. If this is the case for you, consider a gate operator which is designed specifically for installations with limited space for manoeuvre. An example of this is the E5 compact gate operator. The operator is not only small but has an optional slide lever attachment designed for installations where there is extremely limited space, meaning that just 8cm of the pillar is needed for installation. What’s more, improved fixing points and a simple ‘hook and fasten’ process means assembly is safe, quick and straight forward. Ultimately, you’ll be looking for a good quality, reliable product with good service. Work with a supplier that offers more than just a manual. If they are happy to offer training, their time and advice when you buy, the chances are you’ll get their support long term.

Latest Yale Security Products news

ASSA ABLOY unveils the latest in ‘curb-to-core’ solutions at ISC West 2020
ASSA ABLOY unveils the latest in ‘curb-to-core’ solutions at ISC West 2020

As SIA’s 2020 Member of the Year, ASSA ABLOY’s presence at ISC West 2020 will include an enhanced booth experience, showcasing a suite of new product innovations that help security professionals create access in smart and efficient ways. “Security professionals are experiencing rapid industry change, which is why ASSA ABLOY is focused on educating customers about the latest curb-to-core solutions,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Opening Solutions America. “We intimately understand our customers’ challenges and have built a comprehensive suite of products and services that bring them smarter, simplified and intuitive solutions to help grow their businesses.” Providing Security and Access Control from Curb to Core ASSA ABLOY is a manufacturer that can provide doors, frames, mechanical and electronic access control to secure all of the openings in a myriad of facility types. Attendees will experience this broad range of solutions in a reimagined, user-friendly booth that highlights both individual products and complete, full-size door openings. Some of the latest innovations include: Building Envelope Adams Rite P8800 Pullman Rim Exit Device: This rim exit device is designed for narrow stile aluminium applications that require a life-safety exit device with a Pullman latching solution for use in retail storefronts, multi-use commercial offices, schools, medical centres and financial institutions. Norton 6300 Series Low Energy Operator: With a modular design and simple controls, this operator has a broad set of intelligent functions, such as power close, latch assist and obstruction detection to secure moderate to high traffic openings. Yale nexTouch Keypad Exit Trim: Ideal for commercial and multi-family environments, this exit trim provides the latest in keypad access with key-free convenience as an upgrade or retrofit solution. Interior Solutions Enhanced credential support across the Aperio family of wireless devices: Now offering support for mobile access via BLE (Bluetooth Low Energy) or NFC, the Aperio wireless solution provides complete flexibility for your mobile access deployments. Securitron AQL Power Series: This customisable, intelligent power supply system provides improved functionality and efficiency through remote monitoring, with the ability to power a single electrified door opening or hundreds of access points. Status Indicators: The new status indicator option for Corbin Russwin ML2000 Series and SARGENT 8200 Series mortise locks features a 180° window design providing optimised visibility for the locked/unlocked door status, enhancing the privacy and emergency preparedness needs of any facility. RITE Slide: This acoustically-rated, soft close sliding door has a modern aesthetic design, ideal for medical rooms, patient rooms, offices and hospitality. Specialty Solutions Ultra-Light UL8 Bullet Resistant Door: Using an ultra-lightweight patented core, this door is over 50% lighter than conventional bullet-resistant doors. Real-world installation The full-size door display features complete solutions, typical of what you might find in vertical markets like government, education, healthcare, retail, multi-family, deco, glass and more. These doorways offer a unique opportunity to witness a ‘real-world’ installation and understand the complexities of their interactions. ASSA ABLOY is again hosting their annual USO Bag Build. Attendees can stop by the booth on March 19 from 1- 4 p.m. to pack supplies for military personnel leaving for or returning from deployment, awaiting the arrival of their personal luggage. ASSA ABLOY’s sister companies will also be onsite, including HID Global (booth# 11063), Alarm Controls (booth# 9077), Ameristar (booth# 9073), Abloy Security (booth# 7055) Traka (booth# 7041), August Home / Yale (booth# 32081), and LifeSafety Power (booth 14115).

Wireless access control sees major growth in 2016
Wireless access control sees major growth in 2016

The shift from wired to wireless access control was expected to gather pace in 2016—and that has happened. This year we at Assa Abloy surveyed a large cross-section of security professionals, seeking their insight into the changing market. Comparing our data with research we did in 2014 showed a clear trend towards wireless access control.   Wireless access data Our 2014 survey found 23% of commercial properties using a wireless or hybrid wired/wireless access control system. By 2016, that was 29%, with 5% of premises already fully wireless. We know we’re on the right track: ASSA ABLOY has invested heavily in market and product research, and we will continue. More card- and key-based wireless access control products are releasing through 2017 and beyond. We see a parallel trend in the residential market. Connected smart door locks, as part of smart homes, are becoming more high-profile, vindicating our investment in this sector. Our Yale brand has the largest range of smart door locks on the market.Efficient security solutions In 2016, more efficient security solutions have been right at the top of the agenda. Corporate and public sector budgets are tight, and that is likely to continue. On the commercial side, customers increasingly demand access control solutions that integrate with their current building management systems, even if those are made by different manufacturers. That’s why our Aperio wireless locks, cylinders, and escutcheons are built to open standards, for example. On the domestic side, connected living is taking off Connected living solutions Solutions must be easy to manage with low installation and maintenance costs, which is a major benefit of wireless access control. On the domestic side, connected living is taking off. More service providers in the domestic market—from energy suppliers to telecoms and security providers—are offering smart door locks as part of connected living solutions to their customers. Access control in 2016 Looking ahead to 2017, interoperability and compatibility will be increasingly important in commercial access control, as customers expect multiple systems to integrate seamlessly. In smart-home technologies, too: Platforms like Samsung SmartThings, the UK’s O2 Home, innogy SmartHome in Germany and many others are critical to the growth of smart-home security. We also see a growing role for access control solutions in small and medium-sized businesses. Wireless access systems like our SMARTair or CLIQ Go product line make it more affordable and easier to install and run than ever. See the full coverage of 2016/2017 Review and Forecast articles here Save

Dispatches from Security Essen 2016: Four-day show targets Europe
Dispatches from Security Essen 2016: Four-day show targets Europe

There was another big trade show last week –  the four-day Security Essen event in Germany. I didn’t attend, but several of my SourceSecurity.com colleagues report it was a busy show from start to finish, with the halls devoted to video/CCTV and access control dominating the show. The other halls were quieter, with smaller stands. Hot topics included big data, machine learning, mobile credentials, storage and an emphasis on solutions (rather than products). The exhibit hall was a bit of a maze, but attendees managed to find their way to the various stands. Three big companies – Bosch, Siemens and Honeywell – were conspicuously absent from their usual large role at Security Essen, and there was mixed feedback about the impact of their absence on the larger show. Without three gigantic stands to concentrate the footfall, attendees seemed more spread out than clustered. Hands-on, technical displays Hands-on displays with plenty of technical detail were the norm, encouraging attendees to interact with the products. The ASSA ABLOY stand, huge as always, reflected the continuing popularity of key systems in the German, Swiss and Austrian markets. ASSA ABLOY’s Yale also featured a home automation zone. Hands-on displays with plentyof technical detail were thenorm, encouraging attendeesto interact with the products Hikvision envisions cameras coming very soon with “deep learning” capabilities. These cameras, combined with big data applications, are the future of smart traffic systems, for example. Deep learning systems will replace traditional licence plate recognition (ANPR) and analyse electronic data about cars, rather than relying on number plates, says the company. Hikvision also highlighted multi-sensor cameras that can cover a large area and reduce the cost-per-channel – they have big projects in China and Southeast Asia. Hikvision’s privacy masking functionality is popular in Europe because of privacy regulations. Fujifilm demonstrated its impressive zoom lens series, featuring 60x zoom, long focal length and full HD quality, for use in airports and perimeter protection. Stabilisation is important with zoom because even slight movement can have a large effect, says the company. In Fujifilm lenses, the stabilisation is optical-based (in the lens), rather than software-based. Another stand that drew attention was Nedap, where a tiered seating area was provided for visitors to view video projected on a back wall. New laws in the Netherlands and France require that no information can go outside government buildings, thus requiring closed security systems, according to Nedap. It’s a trend likely to follow in the European Union, with similar laws potentially impacting hospitals and banking as well as government, says Nedap. This is why they are working with partner AET Europe to ensure that encrypted communications are secure between all elements of an IT-based access control system. Solutions – not just products The need to provide solutions rather than “just products” was a repeated theme. One solutions provider is MOBOTIX, which highlighted a new corporate design with fresher and more unified branding. The solutions approach includes analytics and people counting embedded for inventory optimisation and business intelligence. MOBOTIX is releasing new plug-and-play bundles to combat the perception that the company’s technology is not easy to use. There is also a 4K bundle with NAS (network attached) storage – all preconfigured; just power it up and it will run. MOBOTIX is releasing new plug-and-play bundles tocombat the perception thatthe company’s technologyis not easy to use Sony also offered solutions, including their intelligent approach to 4K, which they say overcomes traditional concerns with the higher-resolution technology. Sony also displayed “glass-to-glass” technology, streaming 4K cameras directly to a screen with no PC in between. Even with the company shifting to end-to-end solutions, their cameras are still at the core of the portfolio, including an accent on low-light and changing light conditions. Adding ROI was another hot topic for exhibitors. MOBOTIX emphasised its process monitoring capabilities, as did Geutebrück. VIVOTEK highlighted combining a people-counting solution with other retail data for business intelligence. Contrary to the focus on solutions was LTV Europe, a video company that keeps the attention on products. LTV emphasises personal service and a fresh approach rather than competing with bigger providers. Focus on storage and automation The themes my colleagues heard at Security Essen were not unlike those we heard recently at ASIS and earlier this year at IFSEC and even ISC West. More companies are looking to expand into non-traditional applications beyond security, such as asset tracking and logistics/delivery. Another example: Sony suggested using video to monitor rivers and lakes water levels for flood warnings. Quantum is keeping itsattention on storage, whileaddressing the IT department’sneed for data protection Quantum is keeping its attention on storage, while addressing the IT department’s need for data protection. The new StorNext scalable storage system, which can handle 4K, integrates various tiers of storage appropriate to varying workflows and business needs. For example, retrieval can be faster for more valuable data, thus maximising value while minimising the overall cost. Allegion is rolling out products that combine electronic and mechanical locks from subsidiary SimonsVoss and the Allegion portfolios. Allegion wants to position itself as electronic access control expert. Paxton highlighted a building automation system, Paxton net10, which is aimed at small and medium enterprises (SMEs) and works on mobile credentials as well as cards. They’re looking to build this kind of technology into future products. Another company, AxxonSoft, is pushing strongly to establish its brand in the United States – something to watch in 2017. SALTO also highlighted cloud-based mobile access control: They have developed a Keys as a Service system, SALTO KS, which allows businesses to grant access remotely while viewing a video of the door. Four busy days in Germany Security Essen is an international show, but the emphasis was on German, Austrian and Swiss companies and larger companies targeting those markets. There was more of a continental Europe “flavour” compared to IFSEC’s focus on the U.K. market. Four days is a long time for a trade show – my feet are shot after two and a half days! But my colleagues agree it was time well spent, if for nothing else than getting to watch an 8-foot-tall robot dance around Hall 3.

Related white papers

10 top insights in access, cloud and more

Protecting dormitory residents and assets

Top 5 ways to ensure visitor safety and security