skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 122233 Find in a Library
Title: Access to Utopia
Journal: Security Management  Dated:(July 1989)  Pages:8A,11A-12A,14A,58A,61A,63A
Author(s): L R Suneborn
Date Published: 1989
Page Count: 7
Type: Issue Overview
Format: Article
Language: English
Country: United States of America
Annotation: The research and development of access control has resulted in a frenzy of new systems, user identification methods, integration of alarm point monitoring, control functions, and features that only ten years ago were thought of as utopian.
Abstract: Largely responsible for this development is the computer that enables access control devices to create systems of tremendous power and flexibility, incorporating functions that in the past required several separate systems. As a result, the security office has been transformed into a high-tech area with vital information instantly available to the security staff, as well as a place from which security professionals can control and manage facilities in an efficient manner. In a card-based system, the card reader reads the data on the card, transforms this data into a number, and sends it to a control unit (an ACP -- access control panel). The panel analyzes the number and verifies that all conditions to grant access are satisfied before the door is released. To increase the security level and flexibility of such systems, many manufacturers are adding a keypad to the card reader, requiring the user to use both a card and a code to gain access. Other developments include programming the access control system to let in only a certain number of persons in areas monitored for loading, and using cards, pins, biometric devices, and even scales to weigh users and their belongings.
Main Term(s): Personnel identification systems
Index Term(s): Facility security; Industrial security; Personnel security procedures
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.