Access control

from Wikipedia, the free encyclopedia

An access control is a system that has the task of checking the access authorization of people to buildings, parts of buildings or areas. The system must be able to derive a sequence of actions from this test (grant access / prevent access).

Frequently, access control (or access control) and access control synonymous with each other is used. However, this is controversial, since the term access control is often understood to mean all technical and organizational measures that belong to the control and billing of the use of services, whereas access control is limited to security. Access controls usually regulate access to sensitive systems such as laboratories .

development

In almost all large and international companies, companies or on industrial sites, access controls play a decisive role. Most companies have areas such as finance departments, data centers, research laboratories and development departments that need to be protected and where it is necessary to ensure that only authorized persons have access to these rooms. There are different methods of how access can be regulated.

Methods of access

Automatic access controls must ensure that employees reach their workplaces on time and that the end of work is not delayed by queues and congestion at the access controls. One challenge is that the system must not disrupt the daily internal processes in companies, banks, laboratories and in industry. Even if several controls have to be crossed and passed within halls, the process must be straightforward or without delays. A smooth and uncomplicated process not only promotes system acceptance by employees, but also ensures that no attempt is made to bypass access controls. If the system acceptance decreases due to congestion and complications, a control system usually cannot be maintained. In addition, the organizational measures and the introduction of the system must be planned and announced at an early stage. The more technically complex and complex the division into authorized and unauthorized persons, the longer the control system times and the technical complexity of a control system increases. It is also important that the security levels can always be individually adapted to the current circumstances.

Types of access controls

The types of access control differ, depending on the extent of the necessary security requirements, in the companies and industrial plants according to the way in which they are controlled. In high-security areas such as chemical laboratories or embassies, it is not uncommon for an access control to be used in which only one person can be infiltrated at a time. This is made possible by a forced separation. The person concerned must first open a door, then wait in a space and only when the first door is closed does the second door open. This type of access can be made possible by technical aids (e.g. chip card), but it is also possible for security personnel to control the access. A lock system with two interdependent doors is used here. The second door is only released once the security personnel have identified the person. Another method is the turnstile. The advantage is that a turnstile is economical in terms of personnel resources. In addition, the number of people can be recorded by the system through a turnstile. This is particularly important when a regulation specifies the number of people who are allowed to be in halls or certain areas (e.g. in a swimming pool). Such a regulation can e.g. B. based on fire safety rules. If the number of people is exceeded, the turnstile will only let people through again when other people have left the room. In areas where the highest level of security is required, a turnstile must prevent the access control from being bypassed.

Identification procedure

Access controls vary in the form of personal identification procedures. It is possible that access is regulated via property. ID cards, keys, digital service cards or chips can be used for this purpose. This assumes that the items are always carried with you. It is also possible that access controls are based on personal knowledge such as B. by entering passwords or codes. The advantage of access controls that detect people through possessions is that the creation of objects such as an ID card, a key or a chip is relatively cheap compared to other methods. The disadvantage is that carried items, such as. B. a key on the one hand can be lost, on the other hand it can also be stolen or imitated or falsified. With passwords or secret codes there is a risk that they will be forgotten or passed on to third parties.

Another type of access control can be achieved using biometric techniques, e.g. B. by scanning the iris or fingerprint. In the case of biometric methods, original characteristics of a person are recorded, which can only be assigned to a single person. Iris recognition is a very reliable process for biometric identification, as it is an unchangeable, personal characteristic. The pattern of the iris can only change through injury. In addition to the iris, the fundus and the fingerprint, the hand geometry and the signature dynamics are also original features. Original features have the advantage that they are inextricably linked to a person and can neither be stolen nor imitated. In addition, biometric control technologies have the advantage that it is neither necessary to carry objects with you nor to remember passwords, nor can they be lost or stolen.

With biometric techniques, a distinction is made between explicit and implicit authentication. In the case of explicit authentication, the user is asked to identify himself (e.g. by placing his finger in a place provided for this). In the case of implicit authentication, the user is not prompted, but the identification happens casually z. B. through the gait, which is automatically recorded by cameras. It is necessary here that data protection is not violated and that personal rights are not disregarded.

Original features offer a very high level of security, since they cannot be manipulated and cannot be imitated. It is disadvantageous that the checking of original features requires a higher expenditure of time than is the case when recording objects in possession. In addition, the development and installation of access control systems based on biometric techniques are expensive and time-consuming. Only when the prices for the necessary hardware fall can nationwide use in the private sector be discussed. That is why in the vast majority of control systems, where top security does not apply, property is used.

Individual evidence

  1. Stange, Lutz: Access and admission to the IKA. RZ-Mitteilungen No. 22, 2001 Access and admission to the IKA .
  2. Access control in companies ( Memento of the original from May 28, 2015 in the Internet Archive ) Info: The archive link was inserted automatically and has not yet been checked. Please check the original and archive link according to the instructions and then remove this notice.  @1@ 2Template: Webachiv / IABot / www.gisorga.de
  3. ^ Walz, Georg: Handbook of safety technology. Outdoor security, access control, intrusion and hold-up alarm technology. Springer: 1992 Safety Technology Manual .
  4. Rappert, Nikolaus: The future has begun. An interview about buildings, use and new technologies in the Library and Learning Center of the Vienna University of Economics and Business. Announcements from VÖB 67 No. 2. 2014 THE FUTURE HAS BEGUN .
  5. Heuberger, Britta; Lück-Schneider, Dagmar: The employees of the Federal Employment Agency were provided with digital ID cards, pp. 146–153. In: Networked IT for an Effective State. Joint specialist conference on administrative informatics (FTVI) and specialist conference on legal informatics (FTRI). Koblenz: 2010 Networked IT for an Effective State .
  6. Steindl, Maximilian: Alternatives to password and pin. In: Fun, Secure, Embedded. Advances in Embedded Interactive Systems. Technical Report. Volume 2, Issue 3. Stockinger, Tobias et al. (Ed.) Passau: 20141 Alternatives to password and PIN .