Anti-Pass back is also called as re-tracking. In simple way, it is one entry and one exit for one individual. It is a security mechanism that helps in
preventing the misuse of access key. In case an individual gains access to the site using a specific access key then this key should not be passed to
be used by another individual to gain access to same site till the exit is not made by first individual.
By enabling the Anti-pass back function, the complete track of each individual is maintained and the site is secured to the maximum.
ANTI PASS BACK
Assume a small office access control management system with entry & exit device at the office door. When a person wants to enter an office, the access card used gains entry for him or her to the office. But if the same card is now passed by same employee to the other employee, then the card will not work at entry but will deny the access. Till the time the same card is not used for exit, hence prevents the misuse of the card.
Anti-pass back can be integrated and exclusive or inclusive feature of access control device and can be enabled and disabled as and when required as per site requirement.
Employee 1 shows card at the entry reader and gains access to enter the office.
Employee 1 passes the same card to Employee 2
Employee 2 uses the same card at the entry reader of the door
The card is rejected as Employee 1 is already in office and has not exited the office using exit reader.
So till the time card is not exited at the exit reader no person can use it to enter the office using entry reader.
TYPES OF ANTI-PASS BACK
Timed Anti Pass-back
Nested Anti Pass-back
Soft Anti Pass-back
|TIMED ANTI PASS BACK||NESTED ANTI PASS BACK||SOFT ANTI PASS BACK|
|The card is assigned certain period||Here the readers be used in only a||The violator can use the entry reader|
|of time that it can work with the||designated sequence to leave or||but same time the alert is received by|
|entry reader again without exit||enter the site. Access is denied if the||the operator and the person mis-using|
|cards are used out of sequence||the key can be persecuted.|
Prevention of card theft
Passing of credentials illegally
Accurate record maintenance
High security operation