Abstract:
Systems and methods for time-bound homogeneous consecutive events triggering a procedure in an access control host system are provided. Some methods can include receiving notifications of a plurality of events occurring in an access control system, identifying an event trigger when at least some of the plurality of events are homogeneous, time-bound, and consecutive, and, responsive to identifying the event trigger, transmitting an instruction to at least one device in the access control system for execution of a procedure associated with the event trigger.
Abstract:
An anti-pass back capacity predictive system and method for an access control host processing system are provided. Some methods can include a host system identifying a number of APB status messages generated by the host system in connection with the host system monitoring a facility, the host system comparing the number of APB status messages generated by the host system with a baseline threshold value, when the number of APB status messages generated by the host system is less than or equal to the baseline threshold value, the host system determining that enabling an APB feature in the facility will be successful, and when the number of APB status messages generated by the host system is greater than the baseline threshold value, the host system determining that enabling the APB feature in the facility will fail.
Abstract:
Systems and techniques are presented for enabling fail-safe operation of an automatic pedestrian access control gate during a health and safety event. Gateline sensor data is received from at least one gateline sensor. The gateline sensor data indicates that an event concerning health and safety has occurred. An alert is generated in response to receiving the gateline sensor data. The alert is transmitted to a remote monitoring device that is remote from the access control gate. A determination is made that a preset amount of time has elapsed since transmitting the alert. A further determination is made that an acknowledgement of the alert has not been received. Based on determining that the preset amount of time has elapsed and determining that the acknowledgement has not been received, a predefined action is triggered.
Abstract:
The invention relates to a walk-through security gate (1), in particular for the use at airports for demarcation between a secured zone and an unsecured zone, wherein the gate can be opened in accordance with the checking of access data such as a flight ticket and a blocking element (6) that blocks the gate is pivoted from a blocked position into a walk-through position in the context. Corresponding fully automatic solutions are part of the prior art in the context. For various reasons, however, there is a need for being able to also operate such “self-boarding gates” semi-automatically, i.e. in conjunction with support staff, wherein in the context the problem of the operating personnel obstructing the gate delimited by guide elements (4) arises. According to the invention, the problems is solved in that a console (5) is associated with at least one of the guide elements (4) that delimit the gate, by means of which console (5) the access data can be automatically retrieved. At the same time, the console (5) is additionally provided with a manual scanner (8). When the manual scanner is put into operation, the scanner (7) of the console (5) used for the automatic checking is taken out of operation and thus the checking of the access data is possible in manual operation, and at least one blocking element (6) that blocks the gate is pivoted into a walk-through position only in accordance with the checking of the access data by means of a manual scanner (8).
Abstract:
An apparatus allows entry of an individual into an area responsive to data read from data bearing records. Data read from data bearing records such as user cards is evaluated for correspondence with stored data by at least one processor. The condition of at least one lock (26, 30, 48, 52) associated with an access structure (14) is changed responsive to correspondence of the record data and stored data. The structure (14) controls access to and exit from a facility. An operator terminal (12) provides visible outputs through a display (72) and is usable to control functional aspects of the structure as well as to enable the operator to receive indications of conditions associated with components that control access to and exit from the structure.
Abstract:
An access control system has at least two antenna coils (12, 13 and 14, 15) arranged one behind the other at an entrance lane (4) and connected to a reading device (20), which with a capacitance (40, 41) form an oscillating circuit (30, 31). Here either the one oscillating circuit (30, 31) with the in entrance direction (5) first antenna coil (12, 13) or the other oscillating circuit with the second antenna coil (14, 15) is actuated by the reading device (20), in order to read out data for the purpose of access authorization from a transponder (22) which is carried by a user and has a transponder coil (24) coupleable with the antenna coils (12 to 15). The oscillating circuit (30, 31) not actuated by the reading device (20) is detuned or short-circuited.
Abstract:
Method for automatically ascertaining the number of people and/or objects present in a gate (10; 50; 70) which has the following steps: detection of weight data for people and/or objects moving in the gate (10; 50; 70) by means of a plurality of weight sensors (18, 20, 22, 24) integrated in the floor of the gate (10; 50; 70) and evaluation of the detected weight data in order to ascertain the number of people/objects from their maximum values and from their dynamics and/or the number of detected centers of gravity and/or the position of the weight sensors (18, 20, 22, 24) which have detected the weight data, and/or the order in which the weight sensors (18, 20, 22, 24) have detected the weight data.
Abstract:
An access control apparatus has a blocking device (1) that is actuated by an actuator, and an authentication reader (7), upon reading a valid access authorization the blocking device (1) moving into the release position. For detecting a wheel chair (15) and/or pram in the area of the blocking device (1) a sensor (13) is provided, which does not activate the actuator for moving the blocking device (1) from the release position into the blocking position until the wheel chair (15) or pram has left its detection area.
Abstract:
Enhanced portal security is provided through stereoscopy, including a stereo door sensor for detecting and optionally preventing access violations, such as piggybacking and tailgating. A portal security system can include a 3D imaging system that generates a target volume from plural 2D images of a field of view about a portal; and a processor that detects and tracks people candidates moving through the target volume to detect a portal access event.
Abstract:
A system has a plurality of groups (A, B) of service facilities (1 to 4) at each of which an access control device (5 to 8) with a read/write device (13 to 16) for a contactless data carrier (20) is provided. The read/write devices (13 to 16) of each group (A, B) are networked with a database (17, 18). To reduce the read time for reading the data carrier (20), the application data (23) are stored on the data carrier (20). The data carrier (20) has an identification number (21) as well as a transaction counter (22) with a transaction number which is changed upon a change of the application data (23). The application data (23), the identification number (21) and the transaction number are stored in the database (17, 18) of the group (A, B) to which the user goes. Upon access to a service facility (1 to 4) of said group (A, B) only the identification number (21) and the transaction number are read out from the data carrier (20) by the read/write device (13 to 16) as long as the application data are unchanged. In case of a match of the read-out identification number (21) and transaction number with the identification number and transaction number stored in the database (17, 18), the application data are retrieved from the database (17, 18), and in case of a valid access authorization check the access control device (5 to 8) releases access.