Access control simply put is the ability to control who gets entry through a door opening. Access control offers you much more than a standard lock can ever do. It gives you the ability to set time zones, restrict which personnel can enter an area, remote unlocking, audit trails and quick deletion of users when access is no longer needed. Access control can facilitate a rapid lockdown in case of workplace violence or a threat and can integrate with your surveillance system for visual verification prior to reentry.
York Lock & Key Inc. along with its electronic security partner York Security Solutions can provide access control solutions for your security and convenience. York Security Solutions can work together with your IT department to network your system locally or nationwide. We have partnered with some of the leaders in access control manufacturing and can offer you solutions from enterprise level systems to simple single door units that carry many capabilities.
We offer the following types of access control peripherals :
Keypads have combinations can be easily changed when required. However, keypad combinations can be given to an unauthorized person – making it a less secure but the least expensive access control method. Keypads are available with user tracking capabilities to identify the person entering.
Bar Code Cards
Bar code cards have an average life of 18 to 30 months. The technology is very common in low security applications but is seldom used for high security purposes since cards can be duplicated
Stripe cards are the most widely used technology world-wide for access control applications – commonly used in banks and credit card operations. This technology provides a medium level of security because it is possible, with the right equipment and proper knowledge, to duplicate cards. But, lower cost for both readers and cards makes it an attractive choice for many users. The cards are economical and have an average life of 18 to 30 months.
Wiegand cards were the most common technology in high security application before the advent of lower cost magnetic stripe technology.
Proximity readers are the fastest growing technology for card access control applications. Advantages are there are no moving parts, no mechanical wear, no slots and no read heads to maintain. The reader can be concealed inside walls or special enclosures and, even when the reader is surface mounted, it has no openings to jam or tamper. The card is the most secure and practically impossible to duplicate. Cards can usually be read through a purse or wallet and through most other non-metallic materials. Since proximity cards are less prone to physical damage or loss, there are great savings in reduced card replacement costs.
The key fob is one of the best known forms of access control. The key fob is made from a plastic device to hang on a key ring and contains the electronics in or on it. The user holds it to the reader for access to a door. It is capable of reading and writing information to the system, so the chip itself can be used to carry new information to a location rather than running wires throughout the building.
Medeco Electronic Keys
Medeco Electronic Keys are shaped like keys yet contain electronic information in them. The user inserts the key into a lock and operates it like a regular key. No other devices are necessary, and electronic keys can usually be used with existing locks. They’re cost-effective to install and maintain, easy to use, and require minimal hardware replacement.
Remote controls can open doors from several feet away. They are convenient and eliminate the need for keys or cards, but the cost of the remote and battery should be taken into account.
Biometric readers are able to verify the identity of the person who entered a code. There are many different types of biometric readers, including eye retina scanner, voice recognition, signature recognition, hand identification, fingerprint identification. These types of readers can be used both in high-security installations and in low security installations where the users do not want to carry any credentials.