How the access control system (ACS) works

Share and save

An access control and management system (ACS) is a set of hardware and software tools designed to regulate the entry and exit of personnel, identify individuals, and record events. The main purpose of the ACS is to ensure facility security by controlling access to premises and keeping track of people at the enterprise.

u-prox access control system

Depending on the size and complexity of the facility, stand-alone or networked solutions are used.

Standalone systems are best suited for small facilities, usually for single door control. Such a system does not require a local or cloud server for configuration, and access rights information is stored directly in the controller.

Standalone systems are easy to install and maintain, but have limited functionality and basic access levels. They do not provide event monitoring, reports, centralized management of identifiers and access rules. To configure such controllers, you need to visit the facility and be physically present at the site.

Network access control systems, in turn, are more complex solutions that run specialized software on a central server or cloud platform. Such ACSs allow you to manage multiple access points, remotely change settings, maintain centralized registration, generate reports, analyze events, and generate time sheets.

Regardless of the type of ACS, the first thing that meets a person at the entrance is the readers, which are directly related to the type of identifiers used.

u-prox access control system

Readers are responsible for transmitting information from the identifier to the access controller to make a decision and record the event and then to the server. They can support different types of identification:

  • RFID cards and key fobs are the most common types of identifiers that work using radio frequency identification.
  • Secure identifiers Mifare Desire, Mifare Plus, Mifare Classic – allow you to protect against card cloning and substitution. They also include bank cards.

After receiving information from the reader, the controller independently decides to grant or deny access according to the access rules and identifiers loaded into it and controls the actuator: an electric lock or turnstile, gate, barrier.

Connection to the actuators is carried out using a controller relay.

Proper connection and high-quality ACS components ensure stable and reliable operation of the system.

Want to find the best security solution for your facility? Contact our technical specialists for advice.

You may also like