U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Leading Edge of Access

NCJ Number
101812
Journal
Security World Volume: 23 Issue: 6 Dated: (June 1986) Pages: 32-37
Author(s)
R A Bajackson
Date Published
1986
Length
6 pages
Annotation
Due largely to research sponsored by the Defense Department, electronic access control has improved through enhancements in computer, software, card, and personal identification and verification (PIV) technology.
Abstract
Microcomputer access control systems have increased due to cost-reduction competition, and associated software is more user friendly. Software can provide graphic representation to guide personnel through the steps required during shift assignments, card reader mapping, and card user zoning. Software options include the ability to identify two or three events pinpointing an intruder before alarm, emergency message services upon access attempts, and time tracking of an entrant. Keypads have been improved to reduce the risk of unauthorized entrance by scrambling number locations from use to use and by designing a light baffle that cannot be seen by persons not in direct line with the display. Regarding card entry, high-energy magnetic stripe card readers are most effective since they have field programmability, the capacity to specify the type and amount of data encoded on the stripe, and the availability of unencoded cards from multiple sources. PIV's have become more reliable in identifying authorized personnel through fingerprint comparison, hand geometry comparison, voice print, eye retina scan, and signature comparison. Photographic illustrations.

Downloads

No download available

Availability