This article has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
A mantrap, security mantrap portal, airlock, sally port or access control vestibule is a physical security access control system comprising a small space with two sets of interlocking doors, such that the first set of doors must close before the second set opens. [1] [2] [3] [4] Airlocks have a very similar design, allowing free ingress and egress while also restricting airflow.
In a manual mantrap, a guard locks and unlocks each door in sequence. An intercom and/or video camera are often used to allow the guard to control the trap from a remote location.
In an automatic mantrap, identification may be required for each door, sometimes even different measures for each door. For example, a key may open the first door, but a personal identification number entered on a number pad opens the second. [5] Other methods of opening doors include proximity cards or biometric devices such as fingerprint readers or iris recognition scans. Time of Flight sensors are used in high security environments. Newer stereovision detection systems are often employed.
Some security portal mantraps use dual authentication, employing 2 separate readers (security card plus biometrics, for example). This is very typical in the data center security entrance control environment.
Security mantrap portals typically offer options for all steel construction and BR (bullet/ballistics) or RC (burglar protection) construction including thick laminated curved glass.
Metal detectors are often built in to prevent the entrance of people carrying weapons. This use is particularly frequent in banks and jewelry shops.
Turnkey systems are sometimes provided by some suppliers due to the need for specially trained installers.
Fire codes [ where? ] require that automatic mantraps allow exit from the intermediate space while denying access to a secure space such as a data center or research laboratory. [6] A manually-operated mantrap may allow a guard to lock both doors, trapping a suspect between the doors for questioning or detainment. [7]
A door is a hinged or otherwise movable barrier that allows ingress (entry) into and egress (exit) from an enclosure. The created opening in the wall is a doorway or portal. A door's essential and primary purpose is to provide security by controlling access to the doorway (portal). Conventionally, it is a panel that fits into the doorway of a building, room, or vehicle. Doors are generally made of a material suited to the door's task. They are commonly attached by hinges, but can move by other means, such as slides or counterbalancing.
In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.
A proximity card or prox card also known as a key card or keycard is a contactless smart card which can be read without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and contact type smart cards. The proximity cards are part of the contactless card technologies. Held near an electronic reader for a moment they enable the identification of an encoded number. The reader usually produces a beep or other sound to indicate the card has been read.
An airlock is a room or compartment which permits passage between environments of differing atmospheric pressure or composition, while minimizing the changing of pressure or composition between the differing environments.
Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both of the irises of an individual's eyes, whose complex patterns are unique, stable, and can be seen from some distance. The discriminating powers of all biometric technologies depend on the amount of entropy they are able to encode and use in matching. Iris recognition is exceptional in this regard, enabling the avoidance of "collisions" even in cross-comparisons across massive populations. Its major limitation is that image acquisition from distances greater than a meter or two, or without cooperation, can be very difficult. However, the technology is in development and iris recognition can be accomplished from even up to 10 meters away or in a live camera feed.
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing transactions such as wire transfers.
The common access card, also commonly referred to as the CAC, is the standard identification for active duty United States defense personnel. The card itself is a smart card about the size of a credit card. Defense personnel that use the CAC include the Selected Reserve and National Guard, United States Department of Defense (DoD) civilian employees, United States Coast Guard (USCG) civilian employees and eligible DoD and USCG contractor personnel. It is also the principal card used to enable physical access to buildings and controlled spaces, and it provides access to defense computer networks and systems. It also serves as an identification card under the Geneva Conventions. In combination with a personal identification number, a CAC satisfies the requirement for two-factor authentication: something the user knows combined with something the user has. The CAC also satisfies the requirements for digital signature and data encryption technologies: authentication, integrity and non-repudiation.
In computers, logical access controls are tools and protocols used for identification, authentication, authorization, and accountability in computer information systems. Logical access is often needed for remote access of hardware and is often contrasted with the term "physical access", which refers to interactions with hardware in the physical environment, where equipment is stored and used.
HID Global Corporation is an American manufacturer of secure identity products. The company is an subsidiary of Assa Abloy, a multinational door and access control conglomerate. Björn Lidefelt was appointed CEO on 27 January 2020. He succeeded Stefan Widing, who led HID Global for over four years.
An electronic lock is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and to unlock.
An interlock is a feature that makes the state of two mechanisms or functions mutually dependent. It may consist of any electrical or mechanical devices, or systems. In most applications, an interlock is used to help prevent any damage to the machine or to the operator handling the machine. For example, elevators are equipped with an interlock that prevents the moving elevator from opening its doors and prevents the stationary elevator from moving.
A card reader is a data input device that reads data from a card-shaped storage medium and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including: optical scanning of printed text or barcodes or holes on punched cards, electrical signals from connections made or interrupted by a card's punched holes or embedded circuitry, or electronic devices that can read plastic cards embedded with either a magnetic strip, computer chip, RFID chip, or another storage medium.
A contactless smart card is a contactless credential whose dimensions are credit card size. Its embedded integrated circuits can store data and communicate with a terminal via NFC. Commonplace uses include transit tickets, bank cards and passports.
An optical turnstile is a physical security device designed to restrict or control access to a building or secure area. Optical turnstiles are usually a part of an access control system, which also consists of software, card readers, and controllers. Optical turnstiles operate much like regular mechanical turnstiles, except that they rely primarily on electronic (infrared) beams, and audible/visual interfaces to control entry. Rather than physically restraining a person, the optical turnstile uses sounds and lights to alert others to attempted entry by unauthorized individuals. The advent of the Americans with Disabilities Act (ADA) drove optical turnstile development because physical barriers for access were no longer legal for public access due to the fact that persons in wheelchairs or with other disabilities could not use them as access points. For this reason, they are not likely to be used in subways and stadiums, as they are suited for settings where design and aesthetics are deemed important, such as lobbies. These include high rise buildings with a single path through the lobby and staffed reception. The rate of people passing through the optical turnstile is high, with less delay than other methods. They are also suitable for the handicapped, as they are barrier-free.
Biometrics refers to the automated recognition of individuals based on their biological and behavioral characteristics, not to be confused with statistical biometrics; which is used to analyse data in the biological sciences. Biometrics for the purposes of identification may involve DNA matching, facial recognition, fingerprints, retina and iris scanning, voice analysis, handwriting, gait, and even body odor.
Biometrics are used by the South African government to combat fraud and corruption and to increase the efficiency of service delivery to the public.
School security encompasses all measures taken to combat threats to people and property in education environments. One term connected to school security is school safety, which is defined as the sheltering of students from violence and bullying, as well as exposure to harmful elements such as drugs, guns and gang activity. Along with other public places, schools are at risk for invasion from outside as well as attacks from students or faculty because of the high traffic of potential assailants and availability of victims.
Automated border control systems (ABC) or eGates are automated self-service barriers which use data stored in a chip in biometric passports along with a photo or fingerprint taken at the time of entering the eGates to verify the passport holder's identity. Travellers undergo biometric verification using facial or iris recognition, fingerprints, or a combination of modalities. After the identification process is complete and the passport holder's identity is verified, a physical barrier such as a gate or turnstile opens to permit passage. If the passport holder's identification is not verified or if the system malfunctions, then the gate or turnstile does not open and an immigration officer will meet the person. E-gates came about in the early 2000s as an automated method of reading the then-newly ICAO mandated e-passports.
{{cite book}}
: CS1 maint: multiple names: authors list (link)