Challenges in selecting an industrial computer to control an access gate
Weaknesses in older security access measures, like shared keys or passwords, have been eradicated through the use of smart cards and facial recognition. The result is better overall security that utilizes 2-factor authentication to ensure that the person looking to gain entry not only has the key but is the person to whom that key was issued. With the increased complexity of multiple layers of checks, the access points require more component parts combining multiple items into a single device.
To integrate facial recognition into their access control system, our client needed a control computer for the access gate and a backend server for the facial recognition software to verify identity. Our team analyzed our client's requirements and chose a combination of hardware that would be suitable for their application. This case study takes a closer look at the solution that we achieved.