Access controlW
Access control

In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Airport securityW
Airport security

Airport security refers to the techniques and methods used in an attempt to protect passengers, staff, aircraft, and airport property from accidental/malicious harm, crime, terrorism, and other threats.

Apache FortressW
Apache Fortress

Apache Fortress is an open source project of the Apache Software Foundation and a subproject of the Apache Directory. It is an authorization system, written in Java, that provides role-based access control, delegated administration and password policy using an LDAP backend.

AuthenticationW
Authentication

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

Block (Internet)W
Block (Internet)

On the Internet, a block or ban is a technical measure intended to restrict access to information or resources. Blocking and its inverse, unblocking, may be implemented by the owners of computers using software. Some countries, such as China, Iran, India, Russia and Turkey, tend to block access to certain news information that are not directly controlled by state media. In the United States, the Children's Internet Protection Act requires schools receiving federal funded discount rates for Internet access to install filter software that blocks obscene content, pornography, and, where applicable, content "harmful to minors".

CardkeyW
Cardkey

Cardkey was a producer of electronic access control products and was based in Simi Valley, California. They were the first company to develop and widely distribute "Electronic Access Control Systems".

Covenant Aviation SecurityW
Covenant Aviation Security

Covenant Aviation Security, LLC (CAS) is a Chicago company that provides security services to the aviation industry. Michael Bolles has been its President since July 2012.

WristbandW
Wristband

Wristbands are encircling strips worn on the wrist or lower forearm. The term can be used to refer to a bracelet-like band, similar to that of a wristwatch, to the cuff or other part of a sleeve that covers the wrist, or decorative or functional bands worn on the wrist for many different reasons. Wristbands are often worn and used similarly to event passes such as lanyards to information or allow people entry to events. These wristbands are made from loops of plastic that are placed around the wrist and are used for identification purposes.

Exit control lockW
Exit control lock

An exit control lock, also known as an exit control device, exit lock, or simply an exit control, prevents or deters unauthorized exit.

Gated communityW
Gated community

In its modern form, a gated community is a form of residential community or housing estate containing strictly controlled entrances for pedestrians, bicycles, and automobiles, and often characterized by a closed perimeter of walls and fences. Similar walls and gates have separated quarters of some cities for centuries. Gated communities usually consist of small residential streets and include various shared amenities. For smaller communities, these amenities may include only a park or other common area. For larger communities, it may be possible for residents to stay within the community for most daily activities. Gated communities are a type of common interest development, but are distinct from intentional communities.

IP access controllerW
IP access controller

IP access controller is an electronic security device designed to identify users and control entry to or exit from protected areas. A typical IP access controller supports 2 or 4 basic access control readers. It may have an internal web server and support configuration via a browser or via software installed on a host PC.

IP readerW
IP reader

IP reader is an electronic security device designed to identify users and control entry to or exit from protected areas.

MultiOTPW
MultiOTP

multiOTP is an open source PHP class, a command line tool and a web interface that can be used to provide an operating system independent strong authentication system. multiOTP is OATH certified since version 4.1.0 and is developed under the LGPL license. Starting with version 4.3.2.5, multiOTP open source is also available as a virtual appliance - as a standard OVA file, a customized OVA file with open-vm-tools, and also as an Hyper-V downloadable file.

OmronW
Omron

Omron Corporation , styled as OMRON, is a Japanese electronics company based in Kyoto, Japan. Omron was established by Kazuma Tateishi (立石一真) in 1933 and incorporated in 1948.

Organisation-based access controlW
Organisation-based access control

In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003. The current approaches of the access control rest on the three entities to control the access the policy specifies that some subject has the permission to realize some action on some object.

Piggybacking (security)W
Piggybacking (security)

In security, piggybacking, similar to tailgating, refers to when a person tags along with another person who is authorized to gain entry into a restricted area, or pass a certain checkpoint. It can be either electronic or physical. The act may be legal or illegal, authorized or unauthorized, depending on the circumstances. However, the term more often has the connotation of being an illegal or unauthorized act.

TurnstileW
Turnstile

A turnstile is a form of gate which allows one person to pass at a time. It can also be made so as to enforce one-way human traffic, and in addition, it can restrict passage only to people who insert a coin, a ticket, a pass, or similar. Thus a turnstile can be used in the case of paid access, for example to access public transport, a pay toilet, or to restrict access to authorized people, for example in the lobby of an office building.

Two-man ruleW
Two-man rule

The two-man rule is a control mechanism designed to achieve a high level of security for especially critical material or operations. Under this rule all access and actions require the presence of two authorized people at all times.

UniKeyW
UniKey

UniKey Technologies is an alternative access control company based in the United States that designs and licenses keyless entry technology worldwide. Its first product in partnership with Kwikset is Kēvo, a Bluetooth-enabled deadbolt door lock.

Video door-phoneW
Video door-phone

Video door-phone is a stand-alone intercom system used to manage calls made at the entrance to a building with access controlled by audiovisual communication between the inside and outside. The main feature of video door entry is that it enables the person indoors to identify the visitor and, if they wish, engage in conversation and/or open the door to allow access to the person calling.

Von DuprinW
Von Duprin

Von Duprin is a brand of security products. It was the producer of the first "panic bar" style door mechanism that allows a door to a public building to be locked from the outside but still easy to exit from the inside.