ACCESS CONTROL SYSTEMS

Organizations of any size require dependable, innovative access control systems to secure their facilities. An access control system is the first step in protecting your people, property and assets, by tracking and restricting door, gate or other entry point access to a property, building or room to authorized persons. With an access security system, you know exactly who enters a building or room, when they enter and what door they use. Access systems include analytics that allow you to track where your employees are and receive reports of suspicious activity, such as attempts to access restricted areas.

Key card-, key fob-, biometric- (finger print, retina scan, and etc.) or PIN-based access control systems provide you the ability to lock and unlock doors. Many organizations utilize technology cards for employee badges to track and authorize access to restricted areas.

User Benefits

Open, reliable access control technology that improves user convenience and security.

Flexible support for the widest range of credential technologies.

Innovative solutions that scale organizations for existing and future threats.

Smart ID Card Access

What is a smart card?

A smart card is a typical plastic card that contains an embedded computer chip which is either a memory or a microprocessor type. The data that the chip is responsible for storing and transmitting pertains to either value, information or a combination of both. This data is both stored and processed within the card’s chip. The card data is transmitted via a reader, which is the outward facing component of the smart card security computing system. Several systems across a wide range of commercial sectors, like banking, healthcare, finance, entertainment, and media nowadays use smart card security systems in their applications. Applications using smart cards benefit from the several security features that these chip cards provide. The efficiency of the systems is elevated to a large extent due to the smart cards.

Structure of the Chip of a Smart Card

The chips of the smart cards are manufactured from silicon wafers, attached with aluminium contact areas, coated in an epoxy resin and embedded inside the plastic cards. The efficiency of the smart card depends on the proper functioning of the chip.

Internal Structure of a Smartcard

Smart cards operate on the power supplied from an electrical connector inside a card reader or indirectly from the radio frequency transmission of contactless readers. A smart card consists of the following functional components:

Central processing unit: It interprets and delivers on the instructions delivered by the operating system.

  • Read-only memory: This type of memory stores data that once written cannot be changed or deleted. Hence manufacturers of the card’s chips fit the card’s OS along with various diagnostic functions on the ROM component.
  • Random Access memory: The RAM is capable of storing and modifying data and can be accessed as long as its power is being supplied.
  • Application memory: Electrically programmable read-only memory (EEPROM) enables in the storing and modification of data well.

Smart Card Security Technology

The chips of the smart cards are manufactured from silicon wafers, attached with aluminium contact areas, coated in an epoxy resin and embedded inside the plastic cards. The efficiency of the smart card depends on the proper functioning of the chip.

Markets that have been traditionally using machine readable card technologies like barcode and magnetic stripe, are increasingly adopting the use of smart cards. This conversion is done after the return on investment is accounted by each card user year after year. Smart cards are most often being used in application which strictly needs security and substantiation.

With an electronic card swipe system, you can secure your building by managing who gains entry and remove the risk of lost or misplaced keys.

These smart cards are individually programmed to provide restricted access around a site through gates, doors, turnstiles, traffic barriers, etc.

General Computer Services Limited offers real-time protection for both property and employees through one of the channels of access control systems and that is Contact and Contactless Smart Card Technologies or simply the integration of smart cards into access control systems.

Smart Cards Access Control is a system designed to allow companies to stay in charge of their security using smart cards. With selective access, building access systems allow your premises to appear welcoming while offering maximum protection outside threats and from internal challenges such as shrinkage.

An access control system proactively monitors, manages access and secures multiple points of entry and exit in real-time, for individuals, vehicles and materials, all from a single location. Door control can simplify flow, reduce costs and liability, manage staff changes and provide ongoing actionable intelligence while reducing security staff. Searchable and stored data reports that are admissible in court, can aid post-incident investigation.

Necessity and Application of Smart Card Security Technology

The need for convenience and security of any transaction has made the deployment of smart cards highly relevant. One of the primary uses of smartcards is to provide safe storage of confidential information of users like account identity. In general, smart cards are preferred to other machine-readable cards as they incur a much lower cost of maintenance. Also, unlike other card security systems like magnetic stripe cards, smart card security systems put all the necessary information and functions on the card itself. Magnetic stripe cards divide the information and function load between themselves and the reader or the central server. Thanks to this, the user does not need access to obscure databases during transaction processes.

Smart cards also facilitate the secure transaction of data through any type of virtual network. Unlike the magnetic stripes which store negligible amounts of read-only data, smart cards are fitted with microprocessors which enable the cards to receive, store, update, and make decisions about data. This means that if you’ve been issued a smart card, but your information gets updated, you don’t need a new card, but rather can update the information straight on your existing card. This greatly reduces the risk of losing your card or misplacing the old one and compromising your security.

Also, in terms of security, smart cards protect against a wide array of security threats starting from careless storage of user passwords to intricate system hackings. In a fully online system, you’ll need some method of storing and remembering all your passwords, but users are often careless and misplace or share their passwords, meaning that they have to change them often or risk getting hacked. Resetting password is a highly expensive task for an organization. Thus, smart card security systems offer a highly cost-effective solution for this issue. The most relevant and prominent applications of smartcard can be categorized in the following way:

  • SIM Cards and telecommunication: Subscriber identity module, which is required by all phone systems under the global system for mobile communication, is the most commonly used application of smartcards. The smart cards are consumed to enable the unique identifier, which is stored in the SIM card, to protect the rights and privileges of each mobile subscriber.
  • Loyalty and stored value: Smart cards are used as a tool of stored value, particularly, in loyalty programs across various sectors like transportation, parking, retail that track data and offer incentives to hold onto their customer bases.
  • Securing digital content and physical assets: In addition to providing information security, smartcards are also used to safeguard services and equipment by restricting access only to permitted users. Delivery of digital information and entertainment services is encrypted and decrypted via the smart card per of each subscriber base. Smart cards have also proved to be useful tools for machine and equipment settings in sensitive laboratories.
  • Building Access: Systems can increase productivity and is particularly suitable for compliance. It may be structured to be automatic or to utilize a controller. It may offer free flow of traffic or require documentation by utilizing a system uses of tamper-proof credentials. They may be physical or digital, using key cards, pin cards or biometric scanners. Most frequently, key or access cards are used to authenticate identity, especially for apartment security systems. Access Control may be supported by alarms and video surveillance. The more levels involved, the greater the management opportunities.
  • Ecommerce: Smart cards facilitate the process of e-commerce transaction by enabling consumers to securely store relevant information about purchases. For instance, the smart card stores details of personal account like credit balance as well preferences and purchasing trends of consumers. The smart cards can be used for micro-payments as well as for management of expenses.
GCS access control card

Access control is continually evolving and smart card technology keeps up with changes in compliance, functionality and security. Featuring 13.56 MHz read/write contactless smart card technology, smart card systems provide versatile interoperability and supports multiple applications.

Smart card readers and credentials – printable PVC cards, clamshell cards, key fobs and tokens – make access control more powerful, more versatile, and most important of all, offers enhanced security through encryption and mutual authentication.

Many organizations utilize 13.56 MHz smart card​ technology – iCLASS Seos®, iCLASS SE, standard iCLASS®, MIFARE®, MIFARE DESFire® and more – for employee photo ID badges to track and authorize access to restricted areas, but smart card​s are used in various controlled access and other security, identification, admission, and toll applications.

Some other applications that utilize Access Control Systems in conjunction with other Security Systems are:

General Computer Services Limited has unparalleled experience with ​​smart card access and security. Whether you need to control access to a single door or a complex multi-site facility, General Computer Services Limited ​provides complete end-to-end solutions and service.

Types of Smart Cards

Smart cards can be divided broadly into three categories, depending on the technology of the security chip they contain (the rest of the card is just a piece of plastic!)

  • Integrated circuit Microprocessor cards: Also known as chip cards, microprocessor cards offer far greater memory storage and data security than traditional magnetic cards. The current generation of these cards operates on an eight-bit processor, 16 kb ROM, and 512 bytes of RAM. These cards have built-in data processors, all included in the smart chip. As a result, these smart cards are primarily used for security digital identities (identification cards) and are implemented in applications that require manipulation of large quantities of data. That means that if you need to store and update real-time a large amount of data on a card, like all the particular identification data of an employee, this is an appropriate smart card security system. This particular card can add, delete and alter information on the card. Some of the examples of this card are store value cards or cards that safeguard cell phones against fraud.
  • Integrated circuit memory cards: These cards can hold up to 1 to 4 kb of data, but have no data-manipulating processors on them. Thus, these cards rely on an accessory card-reading device for the purpose of processing data. The memory card can be used only in the case of a pre-established task. Prepaid phone cards are the most common example of this type of smartcard, as their sole purpose is to add a fixed amount of value to a phone with a fixed hardware inside of it. It doesn’t need to be updated or have its data changed. As a corollary of this feature (or lack thereof), these smart cards are not often used for security systems.
  • Optical memory cards: Optical memory cards look store up to a 4 mb of data, or several orders of magnitude more than integrated circuit cards. However, once the data is written it cannot be deleted or replaced. This makes them optimal for storing large amount of data that you want to access in the future, but that you will not need to modify in any way. Optical memory cards are ideal for applications that entail recordkeeping like medical files.

User Authentication

Security using smart cards like Proximity Cards is enhanced with the addition of PIN and Biometric controls with the cardholder’s fingerprint stored in the card or on a central database as part of multi-factor authentication.

Upgrade from Legacy Access Control Technology

Older access control systems may work without issue, but they also present security issues and vulnerabilities in today’s threat landscape. Upgrading to more modern technology not only better fortifies your organization today, but helps it prepare for tomorrow.

Touchless Access Control

Enable a safer workplace with touchless access control.

Touchless Access Control Solutions.

As organizations around the world decide how and when to safely return to the workplace, one common factor is clear – reducing touchpoints between people and objects is key to their strategy.

To accelerate this return and speed economic recovery, access control solutions can be used to:

Explore the solutions below to learn how your organization can leverage or supplement existing systems to make touchless access control a reality.

Touchless Applications Powered by Seos Credential Technology.

Seos® is the next generation of credential technology that provides the ideal mix of security and flexibility for any organization. Powered by highly advanced encryption and a software-based infrastructure, Seos secures trusted identities on any form factor and can be extended for contactless applications beyond physical access control.

Touchless applications powered by Seos include:

Choice matters when it comes to credential technology. This is why General Computer Services Limited offers the industry’s widest selection of open, secure credentials. Browse our extensive offering to choose what best meets your organization’s needs – from technology to form factor and beyond.

Top-Tier, Multi-Application Credentials

Seos®

Highly secure, convenient and mobile-ready credentials.

MIFARE® DESFire® EV3

The most feature-rich implementation of DESFire EV3 available

Extended Use Case Credentials

Crescendo®

Authentication for converged physical and logical access

Additional High-Frequency Credentials

iCLASS SE®

High and ultra-high frequency SIO-enabled credentials

iCLASS®

High-frequency contactless smart card credentials

LEGIC®

Smart card credentials for use with LEGIC prime

FlexSmart®/MIFARE® DESFire® EV1

High-frequency contactless smart card credentials

Legacy, Low-Frequency and Other Credentials

HID Prox

Support legacy HID Prox credential populations

Indala® Proximity

Support legacy Indala Prox credential populations

HITAG

Solution for contactless smart card credentials

UltraCard™

Non-technology ID cards

Contact Us

General Computer Services Limited

Plot 9, 24 Nambi Rd, Naguru Kampala, Uganda

Mob: +256-772-592-660 | +256-755-101-422

Email: sales@gcsug.com

© 2023 General Computer Services Limited | All Rights Reserved