Proximity
Proximity systems consist of the reader, locking mechanism, and a computer based controller. Obviously, the exact details of the system vary depending on the individual needs, and we will tailor the specific components to meet these requirements. The exact mechanism can be either electric strikes or magnets, the reader can be set to a varying ranges depending on how you want the system to operate.
The database of access details is under your control allowing you to maintian who can go where. Depending on which type of token or card you choose, the means of encoding the identification data varies, from card imprinting devices to registering the pre-defined code of a token to a specific user of the system. Regardless of which technology you opt to use in your access control system, the token contains an identifying code that the reader can interpret and associate with the person carrying it.
The benefits of this system are that the code itself is meaningless, the only benefit of it is that the system recognises it as unique. It contains no data about what access privileges it grants, or the identity of its owner. All information about the system users is held solely within the system. This protects the system and the users from even the most technologically gifted thieves.
|