Building Access Systems can increase productivity and is particularly suitable for compliance. It may be structured to be automatic or to utilize a controller. It may offer free flow of traffic or require documentation by utilizing a system uses of tamper-proof credentials. They may be physical or digital, using key cards, pin cards or biometric scanners. Access codes via smart phone are also used. Most frequently, key or access cards are used to authenticate identity, especially for apartment security systems. Access Control may be supported by alarms and video surveillance. The more levels involved, the greater the management opportunities.
By linking to video, a door control system can offer two-factor verification. Access control operators can verify the identities of people and things, tag events and allow or deny entry or exit in real time, adjusting access moment to moment in response to strategy or emergency. By tracking entries and exits, it is also possible to reduce heating or cooling costs when areas become unoccupied.
Door control can simplify flow, reduce costs and liability, manage staff changes and provide ongoing actionable intelligence while reducing security staff. Searchable and stored data reports that are admissible in court, can aid post-incident investigation.
Access Control may also access radio frequency identification (RFID tags) used most typically for supporting wildlife research and protection. The system may be linked to numerous technologies including Identity Management, Visitor Management, Intrusion and alarm panels, Biometrics (fingerprint, retina scan, etc.), Facial Recognition, Elevator Control, Mustering (person location in emergencies), Security Patrol Tracking, License Plate Recognition (LPR).