U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

COMPUTER-CONTROLLED ACCESS SYSTEM - OPERATIONAL CONSIDERATIONS (FROM CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES - PROCEEDINGS, 1976, BY JOHN S JACKSON SEE NCJ-57707)

NCJ Number
57720
Author(s)
C L WHITTEN; R E ANDERSON; R A VICTOR
Date Published
1976
Length
7 pages
Annotation
A COMPUTER-CONTROLLED PERSONNEL-ACCESS SYSTEM IS DESCRIBED ALONG WITH SOME OF THE OPTIONS AVAILABLE AND SOME LOGICAL EXTENSIONS OF THE SYSTEM TO SAFETY AND ADMINISTRATIVE APPLICATIONS.
Abstract
IN 1966, THE LAWRENCE LIVERMORE LABORATORY (LLL) DESIGNED AND IMPLEMENTED THE CONTROLLED ACCESS BY INDIVIDUAL NUMBER (CAIN) SYSTEM WHICH IS CAPABLE OF MANAGING THE ACCESS OF SOME 12,000 PEOPLE TO A VARIETY OF AREAS INVOLVING DIFFERENT SECURITY REQUIREMENTS FOR ADMISSION. THESE CRITERIA WERE DEVELOPED FOR THIS SYSTEM, AND WITH FEW EXCEPTIONS, MET: (1) EACH EMPLOYEE'S BADGE MUST HAVE AN INDIVIDUAL CODE HAVING NO RELATIONSHIP WHATSOEVER TO THE EMPLOYEE'S NUMBER OR ANY OTHER IDENTIFYING INFORMATION; (2) THE CODING FORMAT USED MUST BE VIRTUALLY IMPOSSIBLE TO DEDUCE, AND THE CODING METHOD MUST NOT BE DETECTABLE BY CASUAL VISUAL INSPECTION; AND (3) THE CODE SHOULD BE IMPOSSIBLE TO CHANGE WITHOUT PRODUCING OBVIOUS PHYSICAL DAMAGE TO THE BADGE. SPECIFICATIONS FOR THE OVERALL SYSTEM INCLUDE THE FOLLOWING CAPABILITIES: (1) PROVISION OF POSITIVE ACCESS TO ALL AUTHORIZED, PROPERLY BADGED PERSONNEL WITHIN A REASONABLE AMOUNT OF TIME (I.E., 1 TO 5 SECONDS); (2) SIMULTANEOUS ACCESS CONTROL AT MULTIPLE ENTRY POINTS; (3) THE MAINTENANCE OF AN ACCURATE RECORD OF TRANSACTIONS OCCURRING IN THE SYSTEM, ESPECIALLY UNAUTHORIZED-ENTRY ATTEMPTS; (4) PREVENTING OF UNAUTHORIZED ENTRY THROUGH CONTROLLED POINTS (EXCEPT FORCIBLE ENTRY); (5) RELIABLE COMMUNICATIONS WITH A CENTRAL CONTROL POINT IN CASE OF ENTRY DIFFICULTIES; (6) SIMPLE ENOUGH IN OPERATION SO THAT BADGE-OFFICE PERSONNEL CAN, WITH MINIMAL TRAINING, OPERATE THE SYSTEM EFFECTIVELY WITHOUT THE CONSTANT PRESENCE OF SKILLED COMPUTER PERSONNEL; AND (7) EXTREMELY RELIABLE. HARDWARE AND SOFTWARE WERE DESIGNED TO PROVIDE A HIGHLY COMPATIBLE, SECURE, AND VERSATILE SYSTEM. THE THREE MAIN SOFTWARE FUNCTIONS ARE TO CONTROL BOOTH ACCESS, LOG OFF-HOUR ACCESSES BY NAME AND TIME, AND ENABLE BADGE-OFFICE MODIFICATION OF ACCESS FILES. THE SPECIAL PURPOSE FUNCTIONS OF THE HARDWARE ARE TO READ THE BADGE, CHECK FOR PARITY ERRORS, RECEIVE AND STORE NUMERICAL COMBINATION DATA, MEASURE AND STORE BOOTH WEIGHT, ACT AS ACCESS-BOOTH CONTROLLER, AND TRANSMIT DATA AND STATUS ON A DEMAND BASIS. LLL ALSO DESIGNED THEIR OWN LOCKING DEVICES. AMONG THE CRITERIA FOR THE LOCKS WAS THAT THEY BE THE DEAD BOLT TYPE, OPERATE USING LOW VOLTAGE AND LOW CURRENT, AND UNLOCK EASILY UNDER EMERGENCY CONDITIONS. ALSO PRESENTED ARE CONSIDERATIONS FOR BOOTH DESIGN, AND HUMAN FACTORS IN SYSTEM CONTROL AND OPERATION, A DESCRIPTION OF THE SYSTEM OPERATION WITH DIAGRAMS, AN EXPLANATION OF OPERATIONAL MODES, AND THE RELATIVE COSTS AND BENEFITS. (AUTHOR ABSTRACT MODIFIED--MHP)