Your reliable partner for all

Biometric door Access Control Systems


fingerprint readersBiometric door access control units attach to the network and measure a person’s unique physiological characteristics. Fingerprints, finger veins, palms, retinas, irises, faces and voice are examples of some of the biometrics that are read. Biometrics provides far better security than RFID card credentials. It is better than cards or pin numbers because you are identifying a person rather than something the person is carrying. Many of the readers available Have multiple access keys. They can read biometrics as well as RFID cards and pin numbers. Take a look at the biometric readers available.

Fingerprint Readers

FIngerprint readers detect the raised pattern on your finger.

These fingerprint IP readers actually encode the pattern that they detect into key data points. These minutiae points reduce the total amount of data stored. Since the information is encoded the data can’t be used to reconstruct the actual fingerprint.

We have readers that just read fingerprints, and some that are multi-biometric and read both fingerprints and finger vein patterns, and those that read fingerprints and do facial recognition. These multi-modal readers increase reliability, yet don’t cost much more than conventional fingerprint readers.

Facial Recognition

facial-recognitionThe latest facial recognition systems are self-contained units that attach directly to the network. These IP Facial readers are very easy to install.

Facial recognition readers connect to the network and identify a person’s face from a template that has previously been recorded. These integrated units contain all the intelligence, allowing enrollment as well as door control.

Finger Vein

The Finger vein reader captures an image of the vein patterns which exist beneath the surface of the finger. In this case the vascular pattern is detected using a near-infrared LED. The system detects the hemoglobin in the blood stream, providing a distinct pattern.

Multi-Biometric Readers

Multimodal readers read a number of different biometrics. For example they can read both fingerprint and / or finger vein, or fingerprint plus facial recognition.

The multimode biometric system below uses a combination of facial features, and the way a person walks towards the camera. These system operate very quickly and improve the accuracy. See more about this special system

Biometric Facial and Body Motion Door Access Control

The FST biometric door access control system dramatically increases identification accuracy by adding full body motion analytics to facial recognition. It quickly identifies authorized people as they approach the door. It gradually learns more about the person’s body motion becoming more accurate as time goes on. This sophisticated identification system is the latest in biometric recognition.

Finger vein readerIdentifying people is one of the best ways to control access to your facility. You are granting access to the person rather than a RFID credential card they carry.

The FST intelligent recognition system not only authenticates a person, it can also be used to monitor and control guests.

By adding optional voice recognition and IP security camera systems you can dramatically increase your security and safety.

Console Management Station Software

The management console software runs on a Windows computer and allows you to control your access points, receive alerts, control the system in real time and manage the systems database.

A single station can manage hundreds of doors and buildings, and aggregate the databases to provide redundancy and advanced management of authorizations on a single or multiple sites.

Here are some of the things you can do with this access control management software.

Notifications of Exceptions and Alarm Conditions
You are notified when:

  • an unathorized person is viewed at the door for a number of seconds, and does not respond as a visitor
  • a person is identified as on the black list
  • a door is left open for more than a number of seconds
  • a technical problem is detected
  • an alarm event is detected. Alarms events include:
  • A person was allowed entrance and an unauthorized person followed through the open door
  • Emergency exits that should normally remain closed have been opened
  • If the system is set to alert when a registered and a unregistered person approach the door together
  • When a fraud attempt is detected
  • motion-recognitionRemote Management and Control of Access System
    From any remote computer station you can control view and control various aspects of the system.

  • Open remote doors
  • Speak to a person at the door
  • Run analytics on the system performance
  • View pictures of all the people that have been registered into the system database
  • and much more.

    System Administration
    The administrator of the system can control various system behavior, and provide database management.

  • Tenant and guest permissions
  • Register biometrics
  • Monitor system health
  • Backup site data
  • Logging of operator actions
  • Visitor Access and Management

    The FST access control system includes a full visitor management system that allows you to grant access to people who are not registered in the system. The system takes advantage of smart phone technology using the QR-code display as the control credential.

    The IMID Visit Access software module creates and sends a virtual personal and encrypted key called V-Key™ directly to the visitor’s qr-code examplesmartphone. The V-Key™ is a special qr-code that can be created from your standard calendar or from an app on your smartphone. You simply create a meeting invite, set the security access level from a list of options, and email it to your visitor. When your visitor arrives, they need to display the V-Key™ on their smartphone to the camera. The system will detect the V-Key™, identify the guest, and only then access is allowed based on the security level you set. The host will be notified that the visitor has arrived; and the visit will be logged into the system, including host information and a picture of the visitor’s face from the actual entry time.

    Technical Support

    Biometric security systems can be complex because they include many different components that have to work together. Kintronics is a resource for engineering and integration of all your security projects. We can design your complete system so don’t hesitate to contact us for assistance.

    fst21-screen-450 Emerging-Technology people-data Security


    Share this article





    Related Posts



    Latest Posts
    System Controls Technology Solutions Pvt Ltd
    System Controls…
    Bosch Chassis Systems India Pvt. Ltd…
    Sequential control definition
    Sequential control…
    Summary: In interface design favor direct…
    Solar system controller
    Solar system…
    What follows is a summary of our white…
    Types of Electrical control Systems
    Types of Electrical…
    Before I introduce you the theory of…
    Adaptive Cruise control Systems
    Adaptive Cruise…
    Two companies are developing a more advanced…
    Search
    Featured posts
    • Paxton Access Control Systems
    • What is Access Control Systems?
    • Security Access Control Systems
    • Access Control Systems UK
    • Parking Access Control Systems
    • Card readers Access Control Systems
    • Electronic Access Control Systems
    • S2 Access Control Systems
    • Residential Access Control Systems
    Copyright © 2024 l www.oliver-control.com. All rights reserved.