{"id":5891,"date":"2024-03-21T11:24:37","date_gmt":"2024-03-21T09:24:37","guid":{"rendered":"https:\/\/security-robotics.de\/?p=5891"},"modified":"2024-04-22T15:11:57","modified_gmt":"2024-04-22T13:11:57","slug":"access-control","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/glossary\/access-control","title":{"rendered":"Access control"},"content":{"rendered":"\n<p><a rel=\"popover\" data-title=\"access control\" data-post-id=\"5891\" class=\"sr-glossary-link\" aria-label=\"Access control\" href=\"https:\/\/security-robotics.de\/en\/glossary\/access-control\">Access control<\/a> refers to the measures used to monitor and regulate access to certain rooms, buildings or areas. This can be done using various technologies such as RIFD, key cards, biometric scanners or passwords to ensure that only authorised persons are granted access. Robotic systems can automate these processes or enable autonomous <span data-title=\"access control\" data-post-id=\"5891\" class=\"sr-glossary-link\" aria-label=\"Access control\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/access-control\">access control<\/span>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Access control refers to the measures used to monitor and regulate access to certain rooms, buildings or areas. This can be done using various technologies such as RIFD, key cards, biometric scanners or passwords to ensure that only authorised persons are granted access. Robotic systems can automate these processes or enable autonomous access control.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[388],"tags":[398,399],"class_list":["post-5891","post","type-post","status-publish","format-standard","hentry","category-glossary","tag-access-control-2","tag-access-control-system"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Access control - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/glossary\/access-control\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Access control\" \/>\n<meta property=\"og:description\" content=\"Access control refers to the measures used to monitor and regulate access to certain rooms, buildings or areas. This can be done using various technologies such as RIFD, key cards, biometric scanners or passwords to ensure that only authorised persons are granted access. Robotic systems can automate these processes or enable autonomous access control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/glossary\/access-control\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-21T09:24:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T13:11:57+00:00\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/access-control\",\"url\":\"https:\/\/security-robotics.de\/en\/glossary\/access-control\",\"name\":\"Access control - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"datePublished\":\"2024-03-21T09:24:37+00:00\",\"dateModified\":\"2024-04-22T13:11:57+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/access-control#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/glossary\/access-control\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/access-control#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Access control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Access control - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/glossary\/access-control","og_locale":"en_US","og_type":"article","og_title":"Access control","og_description":"Access control refers to the measures used to monitor and regulate access to certain rooms, buildings or areas. This can be done using various technologies such as RIFD, key cards, biometric scanners or passwords to ensure that only authorised persons are granted access. Robotic systems can automate these processes or enable autonomous access control.","og_url":"https:\/\/security-robotics.de\/en\/glossary\/access-control","og_site_name":"Security Robotics","article_published_time":"2024-03-21T09:24:37+00:00","article_modified_time":"2024-04-22T13:11:57+00:00","author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/glossary\/access-control","url":"https:\/\/security-robotics.de\/en\/glossary\/access-control","name":"Access control - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"datePublished":"2024-03-21T09:24:37+00:00","dateModified":"2024-04-22T13:11:57+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/glossary\/access-control#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/glossary\/access-control"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/glossary\/access-control#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Access control"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/5891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=5891"}],"version-history":[{"count":1,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/5891\/revisions"}],"predecessor-version":[{"id":5911,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/5891\/revisions\/5911"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=5891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=5891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=5891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}