TITLE

IP Access Control System

PUB. DATE
March 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p81
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article features the Internet Protocol-based (IP) access control system called the Edge ACS from Edge. Each IP Controller communicates securely over the Internet to a central server. The EdgeWeb management software is used to management the system via a web browser. The said system supports biometric fingerprint readers and common Wiegand devices.
ACCESSION #
20081158

 

Related Articles

  • VARIOUS METHODS FOR EMPLOYEES' AUTHENTICATION AT SMES. Juszczyk, Marta; Milosz, Marek; Milosz, Elzbieta // Actual Problems of Economics / Aktual'ni Problemi Ekonomìki;2015, Vol. 164 Issue 2, p474 

    The paper presents the study results on the level of acceptance of different authentication methods in computer systems. The research was conducted among employees of small and medium-sized enterprises (SMEs). The research has demonstrated the ways of getting access to resources by the methods...

  • BIOMETRIC BASED INDUSTRIAL MACHINE ACCESS CONTROL SYSTEM USING FPGA. MURALI KRISHNA, B.; MADHUMATI, G. L.; SIVA RAMA GANESH, M.; BHARGAV, Y.; MOHAN VAMSEE KRISHNA, V.; MANOJ KUMAR, O. // Journal of Theoretical & Applied Information Technology;Sep2015, Vol. 79 Issue 1, p76 

    Biometrics has become the widely used technology for enhancing security in most of the areas like research centers, organizations, hospitals, industries, home security etc. Biometrics is related to rhythms of human characteristics like face recognition, fingerprints, retina scan, palm prints...

  • COMPARATIVE STUDY OF AUTHENTICATION TECHNIQUES. Ullah Khan, Hafiz Zahid // International Journal of Video & Image Processing & Network Secu;Aug2010, Vol. 10 Issue 4, p9 

    The Internet has emerged as one of the most convenient and widely used media for exchanging information. The Internet of today is faced with many challenges. One of the most daunting challenges is to ensure security. Pursuing authentication through appropriate mechanisms becomes a complex issue....

  • Secure Face Authentication Framework in Open Networks. Yongjin Lee; Yongki Lee; Yunsu Chung; Kiyoung Moon // ETRI Journal;Dec2010, Vol. 32 Issue 6, p950 

    In response to increased security concerns, biometrics is becoming more focused on overcoming or complementing conventional knowledge and possession-based authentication. However, biometric authentication requires special care since the loss of biometric data is irrecoverable. In this paper, we...

  • DESIGNING A NOVEL APPROACH FOR FINGERPRINT BIOMETRIC DETECTION: BASED ON MINUTIAE EXTRACTION. Jadidoleslamy, Hossein // International Journal on Bioinformatics & Biosciences;Dec2012, Vol. 2 Issue 4, p11 

    People authentication based on fingerprint is one of the most important people authentication techniques which it used biology specifications. The main purpose of this paper is discussing on minutiae-based extraction methods for fingerprints comparison and presenting a new pattern matching...

  • Fingerprint Hiding in True Color Image. Hasso, Shahd Abdul-Rhman; Hasso, Maha Abdul-Rhman; Saad, Omar // International Journal of Computer Science & Information Security;Aug2012, Vol. 10 Issue 8, p22 

    With the progress of the times and the use of technology the importance of the use of biometric is appear to get to the regulations that require identification of persons before using to reduce the risk of security attack. One of the oldest, most prominent and commonly used of these biometrics...

  • Spurious Fingerprint Minutiae Detection Based on Multiscale Directional Information. Popović, B. M.; Mašković, Lj.; Banđur, M. V. // Electronics & Electrical Engineering;2007, Issue 79, p23 

    Amongst available biometrics, personal identification based on fingerprints is still considered for one of the most reliable identification method. Most AFIS available today uses distinctive fingerprint features called minutiae for fingerprint comparison. Conventional feature extraction...

  • Card Access Control System.  // Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p81 

    The article features the CFN-2000 Fingerprint and RF Card and RF Card Access Control System Series from CVE. These innovative biometric solutions are designed for physical security, corporate data and network access control. The Internet Protocol-addressable product can store up to 9,500...

  • AWID CBio.  // Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p91 

    The article features AWID Inc.'s CBio Fingerprint Verification reader. It can easily be installed and is used for retrofit applications. It is also compatible with all access control systems. Fingerprint templates can be stores on ISO cards or adhesive Bio Wafers for greater system flexibility.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics