Have any questions? +49 221 6778932-0 or sales@flexypage.de

 

Access Restriction

As an alternative for the old-fashioned use of keys there are multiple access restriction systems available today. In a lift such an access control system makes sense if specific floors or areas are to be accessible only for selected persons. These floors would appear on the display only after activation with a card, a tag, or a fingerprint scan. If a passenger without identifier enters the lift and wants to visit the doctor on the second floor, the third floor with private apartments remains invisible on the display and therefore inaccessible.


Sensors

For the authentication of the users sensors are necessary. Depending on the type of authentication they can be very different. Additional functions can become possible with the evaluation of other sensors. For example, in a hospital the approval to enter a certain floor could occur only after a sensor in the lift has detected a bed or the load measuring sensor registers certain values. 

Via different ports different sensors can be connected. The flexyPage displays can be equipped with a touch sensor for PIN input, for example, and access the data of load measuring sensors, RFID readers and similar devices. 


PIN-Input

If the display is equipped with a touch sensor the authentication can be realized via a PIN number. In order to do so a numeric keypad can be portrayed on the display. Only after succesfully entering a PIN a predetermined output signal or button on the display will be unlocked. A disadvantage of this procedure is that the PIN number can be spied upon by third persons during the input.

If the displays are connected the management of the PIN numbers and functions can occur via a central database. 


Tags

Another procedure to authenticate users or to unlock functions is the use of tags in combination with the respective readers. There are a multitude of varieties, for example, RFID tags with a fixed unambiguous number, or tags where data can be saved. The communication protocols to evaluate or write on the tags differ a lot between the varieties as well. 

Unambiguous Number

An easy procedure is the use of RFID-Tags, which only contain an unambiguous number. This number will be read by the reader and, by assigning it to a specific person or function, a specific action can occur. The advantage of this procedure is the low price of the tag, and the fact that it only has to be deleted from the target system if lost, to remain safety. 

Programmable Tags

Programmable tags provide a storage space in which individual data can be saved. This way a specific authorization can be saved on the tag as well. However, if the tag gets lost the new "user" can use it as well. 

Often combinations of both procedures are used. An unambigous number for identification and the programmable area, for example, for reloadable payment systems. 

The flexyPage displays can evaluate external sensors that provide the tag data via CANopen-Lift protocol or via TCP/IP. After receiving the tag data programmed outputs can be set or defined widgets or buttons can be unlocked on the display. 


Fingerprints

Fingerprint sensors are increasingly inexpensive and also increasingly common. Many laptops and the first smartphones are already equipped with such a sensor for quick authentication.

The fingerprint sensors evaluate the fingerprint and compute an unambiguous hash value. This value is comparable to the unambiguous number as used in RFID tags. A definite assignment of a user can be realized this way. The advantage of this solution is the fact that nobody can 'forget' his fingerprint somewhere or lose it, and therefore it is always 'at hand'. The disadvantage is the slower speed of reading it, when compared to RFID tags, as well as the fact that the sensors are contact-based and can become dirty or can be destroyed by vandalism. A certain trust in the manufacturer is also a prerequisite, to feel assured that the fingerprints or hash values are only used for the intended purpose. 


Connection

By using a well planned connection the access control can be made even better. By connecting various systems the same tags can be used for different applications. The reloadable payment card can be used for access control in a building, for login with a PC and for access to the lifts.