Machine Learning to Improve Access Control: Part 2

Whether it be an office, hospital, university campus or industrial plant, compliance requires either eliminating manual door activation, for example a hand pressing a switch or using a handle to open a door, and replacing with an automated “no-touch” solution or, when that isn’t desired or possible, enabling the manual door activation to be done with another part of the body (i.e., arm, elbow, hip, knee or foot), which is referred to as a manual ‘low-touch’ solution.
The use of touchless switches (also referred to as “no-touch” or “hands-free” switches) to activate automatic door operators or de-energize locking devices is increasing at an unprecedented rate. It’s very likely that touchless switches could become more common than push plate switches in the not too distant future.
D’Agostino sees the convergence of AI into security spaces, not known for their reliance on analytic data, reshaping the landscape. AI can be used as a proactive step against intrusion at a security entrance like a swing door or turnstile and integrated into the access control and video security systems to provide rich analytics and situational awareness.
“It has long been known that there are often patterns to humans, and to the same extent, enterprise behavior. Access control, surveillance, and intrusion detection systems collect large amounts of data that is often stored and then deleted without much analysis.
Enterprises are now more attuned to the ability to leverage this ‘big’ data. These are evolving now to common data formats, real-time analytics and predictive tools. There seems like there would be a similar evolution in the capabilities of physical security systems where it is not so much what is happening at a turnstile, swing door or entryway, but what is going to happen,” D’Agostino said. “This would leverage the existing systems, sensors and data collection capabilities and use big data, and analytics to drive management and monitoring. The more that physical security systems adopt standard data types, sets and structures (using syslog for logging is a simple example) and the more intelligent these systems become, the more intelligence can be put into predictive analytics.”
——————————
Security Technology of South Texas is a local leader in access control, video surveillance, and community management systems in the South Texas area. Get in touch with us today to see what we can do to help secure your location.
Or by phone at 210-446-4863 24/7

![]() |
|