RU  KZ 

Identification using barcode

Ask a question

With Sigur, it is possible to use barcodes as access credentials. This is one of the most inexpensive identification methods to control access to a territory without the need to collect badges at the end of the visit.

Use of barcodes in a access control system

Barcodes are extra convenient and useful for non-recurrent access events such as entertainment and sports events: barcodes can be printed on almost any surface, sent via e-mail and read from a visitor’s smartphone screen.

However, they have a number of disadvantages, including lack of protection from copying and fraud, therefore, they are not used as a primary credential at sites with high security requirements.

Barcode types overview

Today, we use a variety of barcode types. However, the major difference is in the type and volume of data a barcode can store.

In a ACS, a barcode usually is not required to contain a large amount of data, therefore, simple linear barcodes are generally used for identification purposes.

Connection of barcode scanners

НThere is a large number of barcode scanners in the market. They differ in scanning technologies and styles and can be manufactured as a standalone device or built into a turnstile or multi-format reader.

Sigur offers two connection options:

  • to the workstation via USB in a keyboard emulation mode. In this case, the scanner will operate as a desktop reader, which means that you will be able to enter codes into the database, search through the database, etc.
  • to a controller via RS232 to Wiegand converter. For this purpose, Elsys-IC-BarCode/WG interface converter can be used. This will help organize access control with barcodes as identifiers. In this case, the decision on whether to grant access or not will be made by the controller independently without reference to the server.
  • directly if the reader supports Wiegand interface (e.g., Tantos S-RDR-QR)