Access Control for Gyms and Pools
The need to control
people’s access to buildings or enclosures is as old as human
civilization itself. Security and protection deployments against the
access of intruders or unauthorized persons have as a critical point the
natural accesses that those who are authorized to enter the restricted
areas must use. Therefore, the identification of the individuals who
intend to access is the first premise to determine whether or not they
are authorized.
Security begins in access control
From
the archaic “saint and sign” of military use to the most modern
credentials, we witness an evolution of the modes of identification
classified as we know in three different modes, independent or combined.
The first mode, that of the password or key, is the oldest and is based
on information that the access applicant must know. The second and most
widely used mode is that of the key in any of its versions, mechanics,
card, or even as a credential contained in a personal device such as a
telephone. The third mode is the apparently newest, the biometric based
on identifying personal characteristics of the individual. Although we
quickly associate it with the most advanced systems of facial
recognition, voice, fingerprint, iris of the eye, etc., we must not
forget that this method is the most natural from the beginning of the
story, see who wants to access , or hearing his voice has been the way
to authorize a more basic access used by human beings.
The three modes are valid today, and technology allows us to minimize the limitations that each of them entails when making a quick, accurate and flexible identification to be used in a general and automated way. However, the demands of our society and way of life require access control systems that are increasingly scalable and flexible, without losing intrinsic security. Today, in addition, we want to control the access not only of people, but also of the vehicles that transport them. Additionally, we have added access control to devices and cyberspace, that is, applications, computer files and networks that contain information or are restricted.
People access: The video intercom
If
we think about direct identification, the one in which someone calls
(requests access) and another person with the necessary attributions
facilitates access once their identity is proven, the most common is the
use of intercoms and even more video intercoms. The limitations of
these devices are known, on the one hand, a high quality of the video is
required in any light condition (and it is very common to suffer strong
backlights or over exposure given to the location of the devices) in
order to make a good identification. On the other hand, the process
requires the availability of an operator that authorizes access,
something expensive and not always feasible, and in any case it depends a
lot on that operator knowing the people to whom the entry must be
authorized.ent to answer calls, which can be solved if the video intercom
has the ability to read QR codes. In this way, we can send a QR
credential to the mobile of the person who will access and program the
device so that when it presents that code in front of the camera of the
video intercom, the access authorization is automatically produced,
without operator intervention. Obviously we can program that the video
of the access is also registered, to have the record of who was the
holder of the credential, as well as limit in days and hours when or
until when that credential will be valid. This procedure makes the use
of the video intercom much more flexible making it de facto a reader of
credentials, but credentials that are not physical and that therefore
allow its sending by message, mail, etc.
No hay comentarios:
Publicar un comentario