Anda di halaman 1dari 6



What is Door Access Control System?

Door access control systems provide authorized individuals safe and secure
access in and out of various parts of your business while keeping unauthorized people
out. They can range from electronic keypads that secure a single door to large
networked systems for multiple buildings. Access Systems also greatly simplify
management of your facility: no need to replace lost keys, hunt down old keys from
terminated employees, or wonder who has access to which areas.

What is the purpose of the system?

The most basic role of an access control system is to keep out anyone who is not
supposed to enter an area. This can be the front door, a parking garage, a server room,
a personnel records room, or any other sensitive area. You may also want to use an
access control system to track when employees come and go.
Door Access Control Entry Devices (How will I get in?)

Stand-Alone Locks as the name implies are an "all-in-one" access

control system for a single-door. The lock powered by replaceable internal
batteries can be unlocked by keypad, proximity card or a combination. The
advantages of stand-alone locks are they can be installed and operational
in minutes. Some offer hand-held readers that extract the audit trail from
the lock. The disadvantages of stand-alone locks are they are stand-alone
and not part of a broader network.
Proximity readers are the most popular option in commercial access
control. They are easy to use, and when cards are lost, it is a simple
matter to deactivate them and issue new ones. They can also be
combined with photo IDs for additional security. Proximity cards, which
can work from one inch to three feet from a sensor, are the most common.
Because there is no contact between the card and reader, they are very
reliable and suffer little wear and tear. They are also inexpensive. A
specialized type of proximity card is the automobile tag, which allows
access to a parking facility without requiring the driver to open their
window or get out of the car. Automobile tags can work at hundreds of feet
away from a sensor. Security access systems can use magnetic stripe or
barcode cards, as well, and these can be a moneysaving option if you
already use one of these technologies for employee ID cards.
Key switches offer electronic auditing through a network while continuing
to use a physical key to activate the lock.
Keypads are common for single door security access and less expensive
systems. They are easy to use but less secure, since users have a
tendency to write down the entry code or to "lend" it to others. They also
do not provide detailed audit trails until you provide unique codes to each
Biometric systems rely on physical characteristics of the users for
identification such as fingerprints, handprints, or even retinal scans. They
are by far the most secure methods of access control. However, they are
also considerably more expensive and can seem invasive to employees
forced to use them constantly. Early models proved less unreliable
outdoors, so they were not recommended for exterior security access.

Door Access Control Egress Devices (How will I get out?)

Push-To-Exit Buttons as the name implies Push-To-Exit buttons are wall

mounted near the exit point and contain directions on a large green or red
button. Depressing the button releases the door.
Push Bars attach across the inside of the door at the height of the door
latch. You exit the door by pressing against the bar. The action of pressing
the bar releases the latch and the door opens.
Emergency Exits attach on a wall near the exit point. Emergency exits
are available is two general types, the first is a 'break-glass' model. To
gain exit, you break the glass face. The action depresses a button inside
the switch and releases the door. The second type uses a pull down
handle to release the door.
Motion Sensors function by detecting a vehicle or person approaching an
exit and unlock the door. In addition to motion sensors, several other type
of free exit systems are available including: loop detectors and photo cells
or beams.
Delayed Egress function by starting a timer once the device is activated.
Delayed egress can include voice commands and sounds explaining the
door will open in 'x' seconds. For example, once depressed. a delayed
egress can count down from 15 seconds to zero and then release the
latch opening the door. Delayed egress devices provide the emergency
opening functional of a free exit system while providing a delay for
enhanced security.
Door Access Control Locking Devices

Magnetic Locks electromagnetic lock, magnetic lock, or maglock is a

locking device that consists of an electromagnet and armature plate. By
attaching the electromagnet to the door frame and the armature plate to
the door, a current passing through the electromagnet attracts the
armature plate holding the door shut.
1. Easy to install: Magnetic locks are generally easier to install than
other locks given there are no interconnecting parts.
2. Quick to operate: Magnetic locks unlock instantly when the power
is cut allowing for quick operation in comparison to other locks.
3. Suffer less damage: Magnetic locks may also suffer less damage
from multiple blows than conventional locks.
1. Requires continuous power: To remain locked, the magnetic lock
requires a constant power source.

Electric Strikes replaces the fixed strike faceplate often used with a latch
bar (also known as a keeper). Like a fixed strike, it normally presents a
ramped surface to the locking latch allowing the door to close and latch
just like a fixed strike would.
1. Fail-Secure: Also called fail-locked or non-fail safe. In this
configuration, applying electric current to the strike will cause it to
open. In this configuration, the strike would remain locked in a
power failure, but typically the knob can still be used to open the
door from the inside for egress from the secure side. These units
can be powered by AC which will cause the unit to "buzz", or DC
power which will offer silent operation, except for a "click" while the
unit releases.
2. Fail-Safe: Also called fail-open. In this configuration, applying
electric current to the strike will cause it to lock. In this
configuration, it operates the same as a magnetic lock would. If
there is a power failure, the door would open merely by being
pushed/pulled open. Fail safe units are always run using DC power.

Electric Deadbolts are recommended for high security interior door and
cabinet applications where electromagnetic locks are not required. Electric
bolt locks include long life solenoid driven direct throw mortise bolts, some
models offer right angle bolts for narrow frames and door stiles and
surface mounted bolt locks for door and cabinet applications. Compatible
with virtually any access control system, electromechanical bolt locks are
available in failsafe and fail secure modes.

Magnetic Shear Locks are recommended to provide superior failsafe

holding force and aesthetics for most types of doors, including high profile
frameless glass doors. Representing the latest evolution in the
development of magnetic locks, shear locks incorporate several features
to ensure that the door seamlessly locks and releases without hindrance.

Electrified Locksets look and function like a typical cylindrical or mortise

style mechanical lock. However, incorporate internal solenoids to enable
the lock and latch feature. Building and fire life safety code compliant for
fire rated office doors, corridor doors, lobby doors, exit doors and stairwell
doors. Whether failsafe or fail secure, controlled access and remote
control capability is provided while the door stays latched even when
unlocked, maintaining fire door integrity.
How does the system can be controlled?
One of the biggest differences between competing access control systems is the
computer software used to run them. The software lets you set access levels for each
ID and door, view reports, and conduct audits to see who used a door at a certain time.

Advantages of using "Door Access Control System"

Tracking - Any computerized access control system will do some basic tracking
of usage. Check out the available reports and see if they provide the level of
detail you need.
No need for more "Security Guards"