We use cookies to make your experience better. To comply with the new e-Privacy directive, we need to ask for your consent to set the cookies. Our Policy.
Standalone access
The essence of standalone is when the access point and processor is all on the door post.
Standalone is not high security if a door could be opened by breaking into wiring on the un-secured side of the door. Although most devices are standalone, and so low security, simple wiring and convenience makes them the most common access control.
Probably the most common door access control, mostly for low security applications. Simple codes or PINs (personal ID numbers) are easily passed from person to person.
Card access is more secure than keypads. A card or tag is required, but could be loaned. Some access controls use both card and PIN for extra security.
Other personel access controls for doors and gates that qualify as standalone are....
Moving the processor to a secure area makes wiring more diffucult which can lead to reliability issues.
Controllers connect to any access point with a Wiegand standard output. That can include
Mini controllers serve two doors, or an in and out reader on the same door. Some versions are programmed through the access poiy, some are set via a WiFi connection.
Network controllers are controlled via a server, and potentially from an off site location. A laptop or desktop loaded with the editing tool connects to the network controller via TCP/IP. The database is held within the controller, so runs independantly.
Wiegand is a hardware and software data standard for an input device to connect to a controller.
There are several variations, the most important being data length. Most are 26 or 34 bits.
Technologies that use mobile phones for access control are increasingly popular. Phones have sophisticated means of identifying their own, by PIN or biometrics. It only requires wireless transmission to the access controller.
Access control devices have a smartphone app for editing, monitoring and to activate the internal relay.
This GSM relay has a network SIM to receive calls from a mobile phone or land line. When the call is received, the relay drops the line so as not to incur a caller charge. If the call is from an authorised number, the relay is activated. The unit can also send a text message to an 'admin' number.
A WiFi relay makes a 2 way connection to a smartphone via a dedicated app. The app has buttons to operate the relay, and can read an input status such as if the door is open or not.
As artificial intelligence (AI) becomes a standard feature in cameras, the processing power is employed to identify faces, finger prints, irises, and car number plates.
HR sensors are the first of a new class of devices using advanced video AI processing. HR sensors are taught Human the gait. Applications are intruder detection, and activation by humans only.
A unique application for the Human Recognition Sensor (HRS) is to monitor the area around an automated gate for human safety.
A facial recognition camera stores facial data of each of the users. The realy output can activate a door or turnstile when the live face matches the data points stored.
Users naturally look up to the camera as they approach, as they did when their image was stored. The camera can store 500 users.
The ultimate vehicle recognition technology is NPR, because it identifies the vehicle, not the driver, or an ID device inside the vehicle.
NPR is accurate when it makes a positive ID, but some poor plates will come back with no positive ID. The security is underwritten by the state's intollerance of missing, damaged, or false plates.