U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

PLANNING YOUR CONTROLLED ACCESS SYSTEM

NCJ Number
36480
Journal
Security World Volume: 12 Issue: 8 Dated: (SEPTEMBER 1975) Pages: 18-19,48-50
Author(s)
X RUBIN
Date Published
1975
Length
5 pages
Annotation
DISCUSSION OF SOME APPROACHES TO IDENTIFYING INDIVIDUALS FOR ADMITTANCE TO LIMITED ACCESS AREAS, INCLUDING METHODS OF USER IDENTIFICATION AND THE RELATIVE DESIRABILITY OF LOCAL OR CENTRAL ACCESS CONTROL DECISIONMAKING.
Abstract
THREE TYPES OF USER IDENTIFICATION ARE CONSIDERED: THOSE INVOLVING MACHINE RECOGNITION OF PHYSICAL CHARACTERISTICS (FINGERPRINTS OR VOICEPRINTS); THOSE INVOLVING POSSESSION OF A PHYSICAL OBJECT, SUCH AS A METAL KEY; AND THOSE INVOLVING SOMETHING REMEMBERED BY THE USER (THE 'PASSWORD' CONCEPT). IT IS SUGGESTED THAT THE 'PERFECT' ACCESS CONTROL SYSTEM (ONE CONTAINING EQUALLY HIGH LEVELS OF SECURITY AND RELIABILITY) WOULD BE ONE COMBINING THE MAGNETIC STRIPE CARD AND LINKED MICRO-COMPUTER STATIONS.