Simple, efficient and flexible access control

Access Control for Gyms and Pools
The need to control people’s access to buildings or enclosures is as old as human civilization itself. Security and protection deployments against the access of intruders or unauthorized persons have as a critical point the natural accesses that those who are authorized to enter the restricted areas must use. Therefore, the identification of the individuals who intend to access is the first premise to determine whether or not they are authorized.

Security begins in access control
From the archaic “saint and sign” of military use to the most modern credentials, we witness an evolution of the modes of identification classified as we know in three different modes, independent or combined. The first mode, that of the password or key, is the oldest and is based on information that the access applicant must know. The second and most widely used mode is that of the key in any of its versions, mechanics, card, or even as a credential contained in a personal device such as a telephone. The third mode is the apparently newest, the biometric based on identifying personal characteristics of the individual. Although we quickly associate it with the most advanced systems of facial recognition, voice, fingerprint, iris of the eye, etc., we must not forget that this method is the most natural from the beginning of the story, see who wants to access , or hearing his voice has been the way to authorize a more basic access used by human beings.

The three modes are valid today, and technology allows us to minimize the limitations that each of them entails when making a quick, accurate and flexible identification to be used in a general and automated way. However, the demands of our society and way of life require access control systems that are increasingly scalable and flexible, without losing intrinsic security. Today, in addition, we want to control the access not only of people, but also of the vehicles that transport them. Additionally, we have added access control to devices and cyberspace, that is, applications, computer files and networks that contain information or are restricted.

People access: The video intercom
If we think about direct identification, the one in which someone calls (requests access) and another person with the necessary attributions facilitates access once their identity is proven, the most common is the use of intercoms and even more video intercoms. The limitations of these devices are known, on the one hand, a high quality of the video is required in any light condition (and it is very common to suffer strong backlights or over exposure given to the location of the devices) in order to make a good identification. On the other hand, the process requires the availability of an operator that authorizes access, something expensive and not always feasible, and in any case it depends a lot on that operator knowing the people to whom the entry must be authorized.ent to answer calls, which can be solved if the video intercom has the ability to read QR codes. In this way, we can send a QR credential to the mobile of the person who will access and program the device so that when it presents that code in front of the camera of the video intercom, the access authorization is automatically produced, without operator intervention. Obviously we can program that the video of the access is also registered, to have the record of who was the holder of the credential, as well as limit in days and hours when or until when that credential will be valid. This procedure makes the use of the video intercom much more flexible making it de facto a reader of credentials, but credentials that are not physical and that therefore allow its sending by message, mail, etc.