|
What are site codes or families? And, how are they used?
Return 
|
|
Sites codes, or families, were originally created to increase card production to a larger number of 26-bit
cards by duplicating cards rather than increasing the available number of user codes. The cards were
ordered for a specific site and the manufacturers were initially keeping track of what had been shipped
where. When a new site was installed, it was provided with a site code that had never been shipped to that
specific geographical area, thus maintaining the level of security of the card. Furthermore, since all the
cards at a specific site had the same site code, the control equipment did not have to store the site code
in each of the user codes, reducing memory requirements of the hardware.
|
|
As the market for access control exploded, it became almost impossible to maintain such a strategy.
Although some manufacturers still work this way (the change represents considerable modifications to both
hardware and software), the trend is to provide cards with a greater number of bits, making obsolete the
notion of site codes. This new method also enables faster delivery of cards, even for add-ons to existing
sites, right out of the manufacturer's or the distributor's regular stock. As long as the card number is
unique, just like serial numbers on currency bills, security is maintained. Manufacturers should all be
requested to provide a written statement certifying that their cards are unique and will never be
duplicated. Kantech's ioProx, ShadowProx and HID-KSF cards are guaranteed to be unique and never
duplicated!
|
|
|
Should I use a reader, a keypad or both?
Return 
|
|
The selection of reader and keypad combination affects the level of security at an entry point.
|
|
Keypad Only
|
|
A keypad only installation is generally considered less secure than a reader only installation. The
reasoning is that users may illegitimately "lend" their codes to another person but cannot prevent further
use (in comparison to getting a card back) unless the code is changed. Moreover, a user's code can
sometimes easily be visualized and duplicated.
|
|
Reader Only
|
|
A reader only installation is the most common application but can be susceptible to illegal entry by a
person who has found a card outside the protected site, such as in a parking lot or in public transport.
Readers outside of a building may be more exposed.
|
|
Reader/Keypad Combination
|
|
Adding a keypad to a reader significantly increases the level of security. The user is now required to
provide both a card and a keypad PIN code (Personal Identification Number). Optionally, the PIN code
requirement can be scheduled for use only outside hours rather than during high traffic hours.
|
|
Long Range Proximity Readers
|
|
The most common uses for long range proximity readers are for parking entrances and per handicap facility
requirements. Although several users request long range proximity, they are seldom informed of the actual
"side effects" of these expansive readers. For an example, a long range reader installed at a door in a
corridor may read the cards of any users walking by the door who do not have any intention of unlocking and
entering that door. The door will actually unlock, and remain unlocked for the preset time, without the
user's knowledge. Here is another situation that happens frequently at a door: several users are outside
the door having a discussion and finally, one user goes in. Chances are that the system may erroneously
report the user having already entered. Therefore, make sure that readers are properly installed to prevent
such instances and that a voluntary action from the user is necessary to unlock the door. In most cases,
you may revert to a 10 cm (4 in) reading range! As far as parking lots are concerned, there are other
alternatives with wireless fobs and vehicle tags.
|
|
|
When would I want to use multiple technology cards?
Return 
|
|
Multiple technology cards are most often used on sites where a system, such as "Time and Attendance", is
already in place and uses magnetic stripe or bar code cards. If you want higher security proximity cards
for the access control system, existing cards can be replaced by dual-technology proximity cards, the
second technology being bar code or magnetic stripe. This is a more convenient alternative to asking
employees to carry two cards.
|
|
|
Should I use an exit button, exit detector or both?
Return 
|
|
Exit Detector
|
|
The purpose of an exit detector is to detect an individual's legitimate exit through a supervised door. The
detector must capture the individual's hand movement towards the door handle (or panic bar) and, prior to
the actual opening of the door, warn the system of a pending exit. When the door opens, the system is able
to discriminate between a valid exit and a forced entry. The exit detector can be used on both free exit
and controlled exit doors. The exit detector provides automatic and hands free operation.
|
|
Exit Button
|
|
The exit button can replace the exit detector on controlled exit doors. The user is forced to press the
exit button to actually unlock the door. Exit buttons cannot be used on free exit doors because if a user
opens the door without pressing the button, a door forced alarm will be generated by the system.
|
|
|