The three systems are keypad locks, card locks and biometric locks. Keypad locks have a numbered keypad near the...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
doorknob, where the user has to enter a PIN code to open the door. Card locks, which are used at most hotels, require a card with a magnetic stripe, like a credit card, to open the door. Biometric systems usually have a fingerprint reader for a lock, where the user swipes his or her finger to gain access.
Although all these systems are basically mechanical, they do require some sort of centralized control, which can usually be done through a computer network. The greatest perk of card readers is that the magnetic strip could be activated to only allow access to certain employees. When those employees leave, the card can be turned off or deactivated without having to physically access the lock.
Keypad door locks come in both electronic and mechanical varieties, both of which cost between $100 and $150 per lock, depending on the brand. Schlage, a well-known general lock maker division of the Ingersoll-Rand Company, has the Camelot deadbolt, which requires a 9V battery for operation. The Codelock 290 from Codelocks LLC is another keypad lock, but is fully mechanical.
One precaution: Make sure mechanical keypads have a sufficient number of easy-to-change code combinations. This type of lock is ideal for low-traffic areas, like a school server room where the keypad won't wear out quickly from over-use.
For more information:
Dig Deeper on Information Security Policies, Procedures and Guidelines
Related Q&A from Joel Dubin
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
If a hacker gains control of a router and then uploads a new configuration opening ports up for communication, it may be possible to place a rootkit ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.