Columns on Access Control/Face Recognition

What is Security Gate?
Price and Benefits

 

Contact

Breadcrumb navigation

Table of Contents

In the past, access control in offices and warehouses was generally based on authentication using PINs or ID cards. In recent years, however, various methods have been adopted, such as “face recognition,” which offers high security strength and convenience. Security gates (flapper gates) are introduced in conjunction with such access control systems. This section describes security gates (flapper gates) in detail.

1. What is Security Gate (Flapper Gate)?

A security gate (flapper gate) is a gate that is installed at the entrance or exit of a place where security is required. By linking security gates with ID cards, biometrics, etc., only authorized people can enter and exit. This makes it possible to prevent unauthorized intrusion and restrict entry.

Types of Security Gate

There are different types of security gates, such as "flapper type" and "arm type (rotary type/cross type)". It is important to use them properly depending on where they are used. The flap type is a gate with a plate called a "flap" between the gates. When authentication is complete, the flap opens automatically and you can pass through. The feature of the flap type is the high authentication speed. Since it can authenticate about 50 people per minute, it is suitable for crowded places such as train stations, airports, and large office buildings.

The arm type is a gate that passes through while rotating the bar attached between the gates. It is also called rotary or cross. Unlike the flap type, after authentication is completed, the bar is manually moved to pass. Therefore, it takes longer to pass than the flap type, and the authentication speed is about 30 people per minute. Since the gate always closes every time one person passes, it is used for entrances of companies where it is highly necessary to prevent accompaniment. This gate is often used at the entrances of companies, museums, and amusement facilities that require high security.

2. Why are more security gates being installed?

In recent years, an increasing number of companies have been reviewing their traditional security measures and introducing security gates.
There are three reasons for this:

  • Raising Security Awareness

    With the enforcement of the Personal Information Protection Law and the My Number system, it has become necessary to manage personal information and corporate information more strictly. In recent years, the increase in confidential information that should not be leaked has led to an increase in the security awareness of companies themselves. Therefore, the introduction of security gates for the purpose of preventing unauthorized intrusion and internal fraud and preventing information leakage to the outside is increasing.

  • Complicated attendance management can be streamlined

    The 2019 work style reform established a maximum limit on overtime work, which required companies to accurately track the working hours of their employees. Therefore, the demand for security gates that can accurately manage access control has increased. In addition, it is useful for accurate attendance management of each employee because it prevents employees from clocking in fraudulently, such as increased overtime work and unrequested holiday work.

  • To prevent disasters and infectious diseases

    In the event of a disaster, records of entry and exit will lead to safety confirmation. For example, in the event of an evacuation due to a fire in the office, it is possible to identify the people who are stranded in the office and provide appropriate evacuation guidance. In addition, even in situations where it is difficult to return home due to a major earthquake, it is useful for grasping the safety of employees, and it is a very effective system in Japan, where disasters are common. In addition, it is useful for controlling body temperature and preventing the spread of infection.

In this way, more and more companies are introducing security gates to use them for many purposes, not just security.

3. Benefits of Introducing Security Gates

Security gates can be used in a variety of places, including offices, factories, entertainment venues, and medical settings. It has the following benefits.

Prevent trespassing

In authentication by security gates, information is registered in the database in advance, and each person is checked based on it. Therefore, it will be possible to prevent "escorting" of unauthenticated people entering the room at the same time as authenticated people and reverse traffic.
In addition, by preventing the passage of only those who have been authenticated, it is possible to prevent the leakage of information to rival companies.

Labor costs can be reduced

As a general security measure, some companies have security staff. In crime prevention, it is naturally effective to have the eyes of an actual person. However, sufficient security requires labor costs, which can be problematic in terms of expenses. In the case of security gates, there is an initial cost, but once installed, authentication can be performed automatically, which leads to a reduction in labor costs for security staff.

Easy to use for employees and visitors alike

Security gates have also been introduced at train stations, airports, and amusement parks. Therefore, it is easy for users to understand how to use it, and there is no need to explain how to use it to visitors. There is no need to make all users aware of the operation, and it can be introduced smoothly.

4. Estimated price of security gates

Security gates can be installed for several hundred thousand yen per unit if they are simple gates. Higher-grade models, such as those equipped with biometric authentication systems, are typically around 2 million yen per unit.

5. Points to Note About Security Gates

While security gates offer many benefits, there are also points to be aware of. Before deciding to install them, make sure to check the following three points.

High Installation Cost

Some security gates are expensive and have a significant implementation cost. If the installation is in a place with many users, the number of gates required will increase, and the cost will increase accordingly. However, since labor costs can be reduced by introducing it, it can be expected to have an effect that is worth the cost by using it in the long term. In addition, some equipment manufacturers allow you to rent security gates for a low price. If you are hesitant to introduce it due to cost, it is also recommended to use rental.

Weak in the event of a natural disaster

A security gate is a device that uses electricity to operate. Therefore, in the event of a power outage in the building, it will not be able to operate until electricity is restored. During this time, security is suspended, creating a risk of outsider intrusion and information leakage. In some cases, the entry and exit data may also be lost. It is necessary to think in advance about how to respond in the event of a power outage.

Not Fully Secured

Simply implementing security gates is not foolproof.
A typical security gate is authenticated with an ID card or QR code. Therefore, even if you are not authenticated, you can "spoof" if you get an ID card. In addition, if your ID card is stolen or lost, your security will be compromised, and there is a good chance that identity theft will actually occur. Therefore, in order to further strengthen security, it is necessary to combine it with biometric authentication as well as authentication such as ID cards. In the case of biometric authentication, authentication is based on the biometric information of each person, so spoofing can be prevented.

6. Enhanced Security Gate! Introducing Face Recognition Packaged Software Bio-IDiom KAOATO

To maximize the effectiveness of security gates, it is essential to also focus on the authentication systems used in conjunction with them. Here, we introduce the facial recognition system “Bio-IDiom KAOATO,” which can be integrated with security gates.
“Bio-IDiom KAOATO” is a highly accurate facial recognition system that uses a facial recognition engine that has repeatedly ranked No. 1 in facial recognition benchmark tests conducted by the U.S. National Institute of Standards and Technology (NIST). This groundbreaking system can perform high-precision authentication regardless of whether a mask is worn, and it can accurately log “who entered and exited when” as facial image logs. By recording facial images in a database, it also has the potential to deter fraud.

Additionally, “Bio-IDiom KAOATO” can be integrated with many security gates, including:
  • Security gates manufactured by Kumahira, Co., Ltd.
  • Security gates manufactured by Nihon Halcon Co., Ltd.
  • Existing swing doors and automatic opening/closing devices manufactured by Locksystem Co., Ltd.

Therefore, it can flexibly meet various needs depending on the installation location and budget.

Bio-IDiom KAOATO

“Bio-IDiom KAOATO” performs facerecognition upon entry, preventing unauthorized access and enabling contactless door unlocking. It is a facial recognition package software equipped with an industry-leading facial recognition engine, achieving high authentication accuracy.

Operation Image

"Bio-IDiom KAOATO" is equipped with three systems, and can be operated in a variety of ways according to requests.

  • Face Recognition Visitor Detection System

    It is a system that detects the arrival of a specific person. People who have been registered in the database in advance can be detected from multiple cameras at the same time. This system operates automatically 24 hours a day, 365 days a year, so there are no omissions other than the blind spots of the camera. It is used in commercial facilities such as supermarkets and department stores, as well as public institutions such as schools and hospitals.

  • Face Recognition Access Control system

    It is a system that verifies identity in two stages, a QR code and a face image, to prevent spoofing. Since it uses a smart device that is a multifunctional terminal, there is no need to register a database in advance or install a camera, and you can easily verify your identity anywhere. It is operated at the reception desk of the event venue and the test site.

  • QR Code based Face Recognition System

    This system that verifies identity in two stages, a QR code and a face image, to prevent spoofing. Since it uses a smart device that is a multifunctional terminal, there is no need to register a database in advance or install a camera, and you can easily verify your identity anywhere. It is operated at the reception desk of the event venue and the test site.

7. Security Gate Use Cases Cooperating with Bio-IDiom KAOATO

Let us introduce specific examples of how "Bio-IDiom KAOATO" and security gates are operated in cooperation with actual sites.

[Case 1] Factories and Construction Sites

Factories and construction sites with a lot of people coming and going make it difficult to accurately verify and manage the identity of each person. Especially at construction sites, the composition of personnel is completely different depending on the work process, so it takes a lot of time and effort to grasp the whole thing. Therefore, by introducing "Bio-IDiom KAOATO" and security gates, it will be possible to manage "who came to the site (or left) and when", and to accurately confirm the identity and manage entry and exit. In addition, since it is possible to record the number of visitors to the site with a face image, it also leads to improved visibility of entry and exit record management.

Face Recognition Use Cases for Manufacturing Industry

Bio-IDiom KAOATO, face recognition packaged software, helps customers working in the office solve their problems, such as "I am looking for a new access control system due to the establishment or relocation of an office," "I want something that is highly secure and easy for employees to use," and "I want to register attendance at the same time as authentication."

[Case 2] Office

In the office, in addition to managing access and attendance at the entrance/exit, security can be strengthened by restricting access to specific areas. For example, a place that handles sensitive information increases the risk of information leakage if all employees are allowed to enter. Therefore, it is possible to increase the security strength by accurately approving only some people with "Bio-IDiom KAOATO" and security gates. In this way, by recording "who, when, and where they entered (or left)" along with their face images, attendance management and office security can be achieved at the same time.

Face Recognition Use Cases at Office

Bio-IDiom KAOATO, face recognition packaged software, helps customers working in the office solve their problems, such as "I am looking for a new access control system due to the establishment or relocation of an office," "I want something that is highly secure and easy for employees to use," and "I want to register attendance at the same time as authentication."

In addition, depending on the office building, there are situations where it is necessary to prohibit employees from entering and leaving the room on Saturdays, Sundays, and holidays due to maintenance of the building itself. Even in that case, "Bio-IDiom KAOATO" can prevent problems on days when entry and exit is prohibited by stopping face recognition on the specified day and time of the week. In this way, the ability to operate according to the user's own schedule is also an attractive feature of "Bio-IDiom KAOATO".

  • *
    Here is a detailed explanation of why face recognition is chosen for access control, and why Bio-IDiom KAOATO is chosen among them. Please take a look.
The reason that Face Recognition is chosen for Access Control.

8. Summary

In today's world, which requires strong security and efficient time and attendance management, security gates (flapper gates) are very effective. It is easy to use and can be used in various situations such as emergencies, so it is recommended as a new method of access control in offices and factories. When introducing it, please consider linking with "Bio-IDiom KAOATO", which can achieve stronger security.

Bio-IDiom KAOATO

Bio-IDiom KAOATO performs face recognition when entering a room to prevent unauthorized entry and to unlock the door without contact. Equipped with an industry-leading face recognition engine, this face recognition package software achieves high authentication accuracy.