SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Using advanced access technologies to improve the
functionality and physical security of self-service systems
BEYOND BARRIERS
www.southco.com info@southco.com 1.610.459.4000
In the world of kiosks, ATMs, self-service terminals,
vending machines and electronic lockers, software is
typically a top design priority. However, hardware components
that control access to the enclosure can be just as critical
to the system’s functionality and physical security. OEM
engineers and system integrators can enhance their products
and gain a competitive advantage by integrating advanced
access technology.
New materials and manufacturing techniques have
antiquated conventional cylinder locks and transformed
latches, hinges, handles, and levers from purely functional
elements to devices that can actually enhance an enclosure’s
operation and physical security.
Electronic access systems are no longer just locks and
latches that simply provide barriers. They are intelligent
systems linked to the system’s software that can provide
advanced “vending” functionality. Activated by purchase
requests, these devices enable products and services to
be dispensed appropriately. Beyond simple inventory that
is uniform in size and shape (think beverage containers),
intelligent systems can manage complex transactions that
require multiple steps for goods of various dimensions, as
well as the return of used stock to the machine. Thus, these
systems make it possible to expand self-service units into
markets previously unimagined.
The devices can also control access to the enclosures by
service and maintenance personnel and provide audit trails
to document all of the service activity. With this kind of
intelligence, owners can manage their self-service systems
more efficiently, and it can even be done remotely.
From Functional to Formidable
Hardware, such as hinges, latches and handles should be
evaluated by how they can contribute to the enclosure’s
functionality and security because the two are intertwined.
Obviously, hardware must contribute to security by reducing
opportunities for vandalism and theft. Internal and flush-
mounted hardware help eliminate pry points. New materials
and manufacturing processes have created hardware that
can resist damage from the vandal’s favorites tools —
screwdrivers, cat’s paws, scrapers, pry bars, etc.
Enclosures are most vulnerable during regular replenishment
and repairs. Improving the way service personnel and
maintenance technicians interact with an enclosure (the
ergonomics) can shorten the time that it is open, and thus
reduce security risks.
For example, some gasketed latches and handles can satisfy
NEMA 4 and IP-65 standards for protecting the unit against
water and dust penetration. Less water and dust means fewer
service calls and, thus, fewer chances for security breaches.
Detent hinges will hold access panels, doors and cover
plates securely open or closed — not swinging in between.
Constant-torque position-control hinges, on the other
hand, securely hold at any desired position in the hinge’s
operational arc — not just in the fully opened position. Both
of these specialty hinges allow service technicians to work
without having to hold panels open. For outdoor systems, it
means that panels will remain open in windy conditions. On
indoor systems, these hinges will keep panels open even if the
enclosure is off-kilter or the slab is not level.
The Call for More
With advances in technology, the average price-point of kiosk
and vending transactions is creeping upward. This is closing
the gap between their traditionally lower security needs and
the high-level security used on ATMs. That growing price
point is causing many vending and kiosk owners to specify
the latest ATM-style electronic access technology — and
justifiably so. Regardless of the application, having a good
understanding of electronic access technology options will
help engineers and other system designers incorporate the
right solution into the enclosure design.
The heart of the most robust electronic access systems is
a reliable, electromechanical lock or latch (EML). The EML
design ultimately influences system electrical requirements,
physical security, installation options and the industrial
design of the overall system. Today’s EMLs are robust, vandal-
resistant devices with built-in intelligence and mechanical
www.southco.com info@southco.com 1.610.459.4000
override options. For example, in a kiosk that “rents” chargers
for electronic devices, the EML responds to the consumer’s
purchase request, unlocking a specific “locker” compartment.
It also knows to secure the compartment door when the
consumer retrieves their fully charged device and shuts
the door.
A high-quality EML provides added security over mechanical
latches and adds tremendous possibilities for access-control
monitoring. EMLs can transmit latch status with a simple
indicator light or a sophisticated networked monitoring
system, depending on the desired level of security and the
sensitivity of the enclosure’s contents.
Today’s advanced EMLs feature gear motor drives that
provide higher load capabilities using less power than
previous latches, reducing the kiosk’s overall energy
consumption. It is important to design the latch to overcome
unforeseen loads as in the case of jam conditions.
Human Touch Points
After selecting the most appropriate EML, engineers should
select suitable access control devices for their specific
application. The human interface is an important component
because it controls the way both customers and service
personnel interact with the self-service system. Fortunately,
there is a wide variety of access-control devices available
— from simple stand-alone keypads to radio frequency (RF)
remote-control systems and sophisticated biometric readers.
Customers typically need only enough entry into the machine
to retrieve their product or service. The EML controls that
entry through the software interface, and their access is
restricted to the one compartment or “locker” that contains
their purchase. On the other hand, repair technicians,
money handlers and inventory managers have very different
requirements. Owners may not want all of these service
personnel having access to all parts of the enclosure. Access
control technology exists to limit access to specific parts of
the self-serve system. For example, the instrument panel
door could use an electronic rotary latch that responds
to the technician’s key fob, while the latch on the product
compartment doors could respond to a biometric reader.
Both interfaces are easily reprogrammed when personnel
change, safeguarding the kiosk from theft.
Stand-alone keypads are convenient plug-and-play solutions
that do not require software or network administration. They
are also convenient because employees and service personnel
do not have to carry a physical key or card. With this type
of system, operators can manage and monitor unique
user access codes and change codes without physically
distributing new keys or access devices to employees.
Another option is the electronic key. Personnel press this
tiny device against the remote sensor to gain entry to
an enclosure. Electronic keys are especially suited for
applications where there are many users with different
access privileges across a large number of enclosures. An
electronic key system is easy to program and access can be
added or removed without having to change the lock plug.
Other access control options include proximity-based and
remote RF control systems, which are wireless and non-
contact solutions that can open locks and latches without
physical contact.
Security from a Distance
A remote monitoring or a networked solution is the final
piece to a full electronic access solution. Remote monitoring
provides an added level of security for sensitive and high-
value assets. Each time that an EML opens or closes, a signal
is sent to a remote monitoring system to confirm and log
access, leaving an “electronic signature” and creating an
audit trail of the event.
For example, electronic locking rotary latches or swing
handles contain sensors and multiple output signals that
provide data for both local and remote monitoring, making the
system ideal for ATMs and vending machines with high-value
inventory, such as MP3 players and cell phones, that are
appealing to criminals.
A service employee could call a special number at
headquarters when he is in front of the machine, and
headquarters could initiate the release of the electronic latch.
www.southco.com info@southco.com 1.610.459.4000
Retrofitting for Intelligence
Serving as both a locking/latching device and intelligent
access interface, an EML offers a full range of retrofit options
to update the security and control of existing enclosures.
Many EMLs are also backward compatible with existing EAS
infrastructure, such as card readers, fingerprint readers and
PIN pads. This means that past investments can be scaled up
as the organization expands. Keeping all or part of an existing
system can significantly reduce deployment costs and enable
faster integration.
Retrofitting is also an issue in the continuing development of
EML technology. Flexible EML designs simplify the integration
with existing access solutions, mechanical or electrical. This
includes how the EML works with the physical environment
(such as mounting hardware and the EML’s engagement
with the physical enclosure), and with the existing electrical
wiring, controls and power systems.
While wireless options are in development, the majority of
near-term innovations are focused on minimizing wiring and
broadening compatibility. Retrofitting an EML with a user’s
current access control system means that the EML must
accommodate existing power and control systems, which can
cover a wide range of current and voltage requirements.
Locking in on the Future
As with any energy-consuming device, efficiency is an area
for continuous improvement. The goal is to use minimal
power while releasing under higher mechanical operating
loads (i.e., resistance from stiff gaskets) and resisting higher
mechanically applied loads from vandals. More efficient
electro-mechanics have enabled battery-operated solutions
that minimize wiring and reliance on separate power supplies.
Optimum security solutions provide all relevant information
about the status of the locked compartment to remote
monitoring locations. Defining the lock’s electronic and
physical states, as well as data on potential tampering, jam
conditions and door closure status, gives the operator the
best information possible. For example, is the latch locked,
but door panel open? If a more intelligent system could
recognize the difference, it could take security to a whole new
level, all the way down to the actual point of access.
Designers of self-service systems should give careful
consideration to hardware that controls and affects access to
the enclosure. Attention to these details can provide owners
a greater return on an investment through improved control,
increased functionality and reduced asset loss.
About Southco
Southco has a dynamic history of growth and transformation spanning three centuries. The company was founded in 1899, as
a specialty pipe manufacturer for the burgeoning Pennsylvania oil industry. In 1945, Southco, Inc. was created with the entry into
the specialty fastener and latch business. Over the past 60 years, we have transformed and grown through innovation, strategic
acquisitions and overseas investments into a global leader in Engineered Access Hardware.
Southco solutions are a key part of products you and thousands of others interact with every day. Our engineered access
hardware solutions include key “touch points” such as locks, latches, captive fasteners, hinges, handles and other innovative
products. Our application universe is immense and covers industries such as marine, automotive, off-highway/construction,
RV/caravan, industrial machinery, enclosures, HVAC, medical equipment and network, telecommunications and computers.
For more than 100 years Southco has helped customers solve and overcome engineering challenges. Our passion, vision and
focus today is to help customers differentiate the engineered “touch points” of their products so they become easier to sell
and use by the end users. We strive to realize this vision by investing in a strong technical sales and marketing team backed
by engineering and operational excellence.
Southco is an industry leader of today and prepared for the possibilities of tomorrow.
Please visit www.southco.com to view our complete range of solutions.
www.southco.com info@southco.com 1.610.459.4000

Más contenido relacionado

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Improving Kiosk Security with Electronic Locks

  • 1. Using advanced access technologies to improve the functionality and physical security of self-service systems BEYOND BARRIERS
  • 2. www.southco.com info@southco.com 1.610.459.4000 In the world of kiosks, ATMs, self-service terminals, vending machines and electronic lockers, software is typically a top design priority. However, hardware components that control access to the enclosure can be just as critical to the system’s functionality and physical security. OEM engineers and system integrators can enhance their products and gain a competitive advantage by integrating advanced access technology. New materials and manufacturing techniques have antiquated conventional cylinder locks and transformed latches, hinges, handles, and levers from purely functional elements to devices that can actually enhance an enclosure’s operation and physical security. Electronic access systems are no longer just locks and latches that simply provide barriers. They are intelligent systems linked to the system’s software that can provide advanced “vending” functionality. Activated by purchase requests, these devices enable products and services to be dispensed appropriately. Beyond simple inventory that is uniform in size and shape (think beverage containers), intelligent systems can manage complex transactions that require multiple steps for goods of various dimensions, as well as the return of used stock to the machine. Thus, these systems make it possible to expand self-service units into markets previously unimagined. The devices can also control access to the enclosures by service and maintenance personnel and provide audit trails to document all of the service activity. With this kind of intelligence, owners can manage their self-service systems more efficiently, and it can even be done remotely. From Functional to Formidable Hardware, such as hinges, latches and handles should be evaluated by how they can contribute to the enclosure’s functionality and security because the two are intertwined. Obviously, hardware must contribute to security by reducing opportunities for vandalism and theft. Internal and flush- mounted hardware help eliminate pry points. New materials and manufacturing processes have created hardware that can resist damage from the vandal’s favorites tools — screwdrivers, cat’s paws, scrapers, pry bars, etc. Enclosures are most vulnerable during regular replenishment and repairs. Improving the way service personnel and maintenance technicians interact with an enclosure (the ergonomics) can shorten the time that it is open, and thus reduce security risks. For example, some gasketed latches and handles can satisfy NEMA 4 and IP-65 standards for protecting the unit against water and dust penetration. Less water and dust means fewer service calls and, thus, fewer chances for security breaches. Detent hinges will hold access panels, doors and cover plates securely open or closed — not swinging in between. Constant-torque position-control hinges, on the other hand, securely hold at any desired position in the hinge’s operational arc — not just in the fully opened position. Both of these specialty hinges allow service technicians to work without having to hold panels open. For outdoor systems, it means that panels will remain open in windy conditions. On indoor systems, these hinges will keep panels open even if the enclosure is off-kilter or the slab is not level. The Call for More With advances in technology, the average price-point of kiosk and vending transactions is creeping upward. This is closing the gap between their traditionally lower security needs and the high-level security used on ATMs. That growing price point is causing many vending and kiosk owners to specify the latest ATM-style electronic access technology — and justifiably so. Regardless of the application, having a good understanding of electronic access technology options will help engineers and other system designers incorporate the right solution into the enclosure design. The heart of the most robust electronic access systems is a reliable, electromechanical lock or latch (EML). The EML design ultimately influences system electrical requirements, physical security, installation options and the industrial design of the overall system. Today’s EMLs are robust, vandal- resistant devices with built-in intelligence and mechanical
  • 3. www.southco.com info@southco.com 1.610.459.4000 override options. For example, in a kiosk that “rents” chargers for electronic devices, the EML responds to the consumer’s purchase request, unlocking a specific “locker” compartment. It also knows to secure the compartment door when the consumer retrieves their fully charged device and shuts the door. A high-quality EML provides added security over mechanical latches and adds tremendous possibilities for access-control monitoring. EMLs can transmit latch status with a simple indicator light or a sophisticated networked monitoring system, depending on the desired level of security and the sensitivity of the enclosure’s contents. Today’s advanced EMLs feature gear motor drives that provide higher load capabilities using less power than previous latches, reducing the kiosk’s overall energy consumption. It is important to design the latch to overcome unforeseen loads as in the case of jam conditions. Human Touch Points After selecting the most appropriate EML, engineers should select suitable access control devices for their specific application. The human interface is an important component because it controls the way both customers and service personnel interact with the self-service system. Fortunately, there is a wide variety of access-control devices available — from simple stand-alone keypads to radio frequency (RF) remote-control systems and sophisticated biometric readers. Customers typically need only enough entry into the machine to retrieve their product or service. The EML controls that entry through the software interface, and their access is restricted to the one compartment or “locker” that contains their purchase. On the other hand, repair technicians, money handlers and inventory managers have very different requirements. Owners may not want all of these service personnel having access to all parts of the enclosure. Access control technology exists to limit access to specific parts of the self-serve system. For example, the instrument panel door could use an electronic rotary latch that responds to the technician’s key fob, while the latch on the product compartment doors could respond to a biometric reader. Both interfaces are easily reprogrammed when personnel change, safeguarding the kiosk from theft. Stand-alone keypads are convenient plug-and-play solutions that do not require software or network administration. They are also convenient because employees and service personnel do not have to carry a physical key or card. With this type of system, operators can manage and monitor unique user access codes and change codes without physically distributing new keys or access devices to employees. Another option is the electronic key. Personnel press this tiny device against the remote sensor to gain entry to an enclosure. Electronic keys are especially suited for applications where there are many users with different access privileges across a large number of enclosures. An electronic key system is easy to program and access can be added or removed without having to change the lock plug. Other access control options include proximity-based and remote RF control systems, which are wireless and non- contact solutions that can open locks and latches without physical contact. Security from a Distance A remote monitoring or a networked solution is the final piece to a full electronic access solution. Remote monitoring provides an added level of security for sensitive and high- value assets. Each time that an EML opens or closes, a signal is sent to a remote monitoring system to confirm and log access, leaving an “electronic signature” and creating an audit trail of the event. For example, electronic locking rotary latches or swing handles contain sensors and multiple output signals that provide data for both local and remote monitoring, making the system ideal for ATMs and vending machines with high-value inventory, such as MP3 players and cell phones, that are appealing to criminals. A service employee could call a special number at headquarters when he is in front of the machine, and headquarters could initiate the release of the electronic latch.
  • 4. www.southco.com info@southco.com 1.610.459.4000 Retrofitting for Intelligence Serving as both a locking/latching device and intelligent access interface, an EML offers a full range of retrofit options to update the security and control of existing enclosures. Many EMLs are also backward compatible with existing EAS infrastructure, such as card readers, fingerprint readers and PIN pads. This means that past investments can be scaled up as the organization expands. Keeping all or part of an existing system can significantly reduce deployment costs and enable faster integration. Retrofitting is also an issue in the continuing development of EML technology. Flexible EML designs simplify the integration with existing access solutions, mechanical or electrical. This includes how the EML works with the physical environment (such as mounting hardware and the EML’s engagement with the physical enclosure), and with the existing electrical wiring, controls and power systems. While wireless options are in development, the majority of near-term innovations are focused on minimizing wiring and broadening compatibility. Retrofitting an EML with a user’s current access control system means that the EML must accommodate existing power and control systems, which can cover a wide range of current and voltage requirements. Locking in on the Future As with any energy-consuming device, efficiency is an area for continuous improvement. The goal is to use minimal power while releasing under higher mechanical operating loads (i.e., resistance from stiff gaskets) and resisting higher mechanically applied loads from vandals. More efficient electro-mechanics have enabled battery-operated solutions that minimize wiring and reliance on separate power supplies. Optimum security solutions provide all relevant information about the status of the locked compartment to remote monitoring locations. Defining the lock’s electronic and physical states, as well as data on potential tampering, jam conditions and door closure status, gives the operator the best information possible. For example, is the latch locked, but door panel open? If a more intelligent system could recognize the difference, it could take security to a whole new level, all the way down to the actual point of access. Designers of self-service systems should give careful consideration to hardware that controls and affects access to the enclosure. Attention to these details can provide owners a greater return on an investment through improved control, increased functionality and reduced asset loss.
  • 5. About Southco Southco has a dynamic history of growth and transformation spanning three centuries. The company was founded in 1899, as a specialty pipe manufacturer for the burgeoning Pennsylvania oil industry. In 1945, Southco, Inc. was created with the entry into the specialty fastener and latch business. Over the past 60 years, we have transformed and grown through innovation, strategic acquisitions and overseas investments into a global leader in Engineered Access Hardware. Southco solutions are a key part of products you and thousands of others interact with every day. Our engineered access hardware solutions include key “touch points” such as locks, latches, captive fasteners, hinges, handles and other innovative products. Our application universe is immense and covers industries such as marine, automotive, off-highway/construction, RV/caravan, industrial machinery, enclosures, HVAC, medical equipment and network, telecommunications and computers. For more than 100 years Southco has helped customers solve and overcome engineering challenges. Our passion, vision and focus today is to help customers differentiate the engineered “touch points” of their products so they become easier to sell and use by the end users. We strive to realize this vision by investing in a strong technical sales and marketing team backed by engineering and operational excellence. Southco is an industry leader of today and prepared for the possibilities of tomorrow. Please visit www.southco.com to view our complete range of solutions. www.southco.com info@southco.com 1.610.459.4000