{"id":7425,"date":"2024-01-18T10:06:15","date_gmt":"2024-01-18T10:06:15","guid":{"rendered":"https:\/\/ciborius-gruppe.de\/unkategorisiert\/which-technologies-systems-are-used-for-access-control"},"modified":"2024-02-18T10:15:32","modified_gmt":"2024-02-18T10:15:32","slug":"which-technologies-systems-are-used-for-access-control","status":"publish","type":"post","link":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control","title":{"rendered":"Which technologies \/ systems are used for access control?"},"content":{"rendered":"\n<p>In addition to the individual, analogue checking of personal documents \/ authorisations by employees, biometric methods such as fingerprint and facial recognition, as well as RFID cards, PIN codes and smart cards assigned to individuals are used for automatic access control systems, such as crossing barriers, opening doors, etc.<\/p>","protected":false},"excerpt":{"rendered":"<p>In addition to the individual, analogue checking of personal documents \/ authorisations by employees, biometric methods such as fingerprint and facial recognition, as well as RFID cards, PIN codes and smart cards assigned to individuals are used for automatic access control systems, such as crossing barriers, opening doors, etc.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crsspst_to_securityde":false,"cg_type":"","cg_schema_org":"","footnotes":""},"categories":[96,155],"tags":[],"class_list":["post-7425","post","type-post","status-publish","format-standard","hentry","category-faq-en","category-faq-access-controls"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.1 (Yoast SEO v23.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Which technologies \/ systems are used for access control? - CIBORIUS Gruppe<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which technologies \/ systems are used for access control? - CIBORIUS Gruppe\" \/>\n<meta property=\"og:description\" content=\"In addition to the individual, analogue checking of personal documents \/ authorisations by employees, biometric methods such as fingerprint and facial recognition, as well as RFID cards, PIN codes and smart cards assigned to individuals are used for automatic access control systems, such as crossing barriers, opening doors, etc.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control\" \/>\n<meta property=\"og:site_name\" content=\"CIBORIUS Gruppe\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CiboriusGruppe\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T10:06:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-18T10:15:32+00:00\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ciboriusgruppe\" \/>\n<meta name=\"twitter:site\" content=\"@ciboriusgruppe\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Which technologies \/ systems are used for access control? - CIBORIUS Gruppe","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control","og_locale":"en_US","og_type":"article","og_title":"Which technologies \/ systems are used for access control? - CIBORIUS Gruppe","og_description":"In addition to the individual, analogue checking of personal documents \/ authorisations by employees, biometric methods such as fingerprint and facial recognition, as well as RFID cards, PIN codes and smart cards assigned to individuals are used for automatic access control systems, such as crossing barriers, opening doors, etc.","og_url":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control","og_site_name":"CIBORIUS Gruppe","article_publisher":"https:\/\/www.facebook.com\/CiboriusGruppe","article_published_time":"2024-01-18T10:06:15+00:00","article_modified_time":"2024-02-18T10:15:32+00:00","author":"Michael Engel","twitter_card":"summary_large_image","twitter_creator":"@ciboriusgruppe","twitter_site":"@ciboriusgruppe","twitter_misc":{"Written by":"Michael Engel"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control#article","isPartOf":{"@id":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control"},"author":{"name":"Michael Engel","@id":"https:\/\/ciborius-gruppe.de\/en#\/schema\/person\/3ee12169f89bbbb3e0f4264493ea2982"},"headline":"Which technologies \/ systems are used for access control?","datePublished":"2024-01-18T10:06:15+00:00","dateModified":"2024-02-18T10:15:32+00:00","mainEntityOfPage":{"@id":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control"},"wordCount":56,"publisher":{"@id":"https:\/\/ciborius-gruppe.de\/en#organization"},"articleSection":["FAQ","FAQ: Access controls"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control","url":"https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control","name":"Which technologies \/ systems are used for access control? - CIBORIUS Gruppe","isPartOf":{"@id":"https:\/\/ciborius-gruppe.de\/en#website"},"datePublished":"2024-01-18T10:06:15+00:00","dateModified":"2024-02-18T10:15:32+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ciborius-gruppe.de\/en\/faq-en\/faq-access-controls\/which-technologies-systems-are-used-for-access-control"]}]},{"@type":"WebSite","@id":"https:\/\/ciborius-gruppe.de\/en#website","url":"https:\/\/ciborius-gruppe.de\/en","name":"CIBORIUS Gruppe","description":"CIBORIUS Gruppe: Service- &amp; Sicherheitsdienste, Facility Management","publisher":{"@id":"https:\/\/ciborius-gruppe.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ciborius-gruppe.de\/en?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ciborius-gruppe.de\/en#organization","name":"CIBORIUS Gruppe","url":"https:\/\/ciborius-gruppe.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ciborius-gruppe.de\/en#\/schema\/logo\/image\/","url":"https:\/\/ciborius-gruppe.de\/wp-content\/uploads\/2024\/02\/ciborius-logo-1.svg","contentUrl":"https:\/\/ciborius-gruppe.de\/wp-content\/uploads\/2024\/02\/ciborius-logo-1.svg","width":138,"height":33,"caption":"CIBORIUS Gruppe"},"image":{"@id":"https:\/\/ciborius-gruppe.de\/en#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CiboriusGruppe","https:\/\/x.com\/ciboriusgruppe"]},{"@type":"Person","@id":"https:\/\/ciborius-gruppe.de\/en#\/schema\/person\/3ee12169f89bbbb3e0f4264493ea2982","name":"Michael Engel","sameAs":["\/de\/wp-json\/wp\/v2\/users\/me"],"url":"https:\/\/ciborius-gruppe.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/posts\/7425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/comments?post=7425"}],"version-history":[{"count":1,"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/posts\/7425\/revisions"}],"predecessor-version":[{"id":7426,"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/posts\/7425\/revisions\/7426"}],"wp:attachment":[{"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/media?parent=7425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/categories?post=7425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ciborius-gruppe.de\/en\/wp-json\/wp\/v2\/tags?post=7425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}