Showing posts with label SEMI PROXOMITY DOOR ACCESS STSTEM. Show all posts
Showing posts with label SEMI PROXOMITY DOOR ACCESS STSTEM. Show all posts

Wednesday, March 17, 2010

About ACCESS CONTROL SYSTEM

ACCESS CONTROL SYSTEMS
This door won't open for everyone-that's the idea behind Door Access Systems. In other words, through these systems only authorized persons are allowed access to a particular area / or areas of a building.
Door Access Systems are extremely cost effective way to provide a high level of security in homes and offices.

PROXIMITY ACCESS CONTROL SYSTEMS
The core of Proximity system is the Proximity Reader and Proximity Card. There are two types of readers in the market - One that has an inbuilt controller with capability to authorize access with or without being connected to a PC. The other kind requires a PC to be connected at all times.

Depending upon the configuration of the premises, one or more readers may be used. If more than one reader is used then it is called a Networked system, which is usually connected to a PC. Some systems use a 8 core or a 16 core wire for connecting all the Readers while some systems use only 2 core wire, thereby reducing the cost of wiring and maintenance.

The better systems have readers that can be used interchangeably in a standalone or a networked configuration. Also, some systems have bulky controllers attached to the readers that require a separate source of power as well as add to the cost. The current day readers have built-in controllers and can be directly connected to a PC.

Another use of Proximity systems is to record attendance for employees. For recording attendance, minimum two readers are required - one for IN and one for OUT. The employees are supposed to show their cards to the appropriate Reader upon arrival or exit. These transactions of IN and OUT are recorded in the attached PC. From the PC various reports can be printed.

Most of the Access control systems come with ready made attendance software as an option.

The advanced Proximity Based systems come with inbuilt Password Based system too. It is possible to specify if the employees can enter using Password alone or Proximity Card alone or Both are required. Such an option gives additional flexibility to define the Access Policy for the organization. Some other features of such systems are:

* Possible to define times of the day when the card is valid. Access granted if a valid Card is flashed and/or correct password is entered, provided the access is being attempted during the pre-authorized hours of the day.
* If an employee is under Duress to open the door then the Duress Entry option allows the opening of the door with alarm on the PC (if connected)
* Powerful software based on Windows OS that does not require a dedicated PC.
* Each Reader (one for each door) can be designated as an Incoming Door or an Outgoing door or an Internal door or Exit on Duty door.
* Capacity Upto 1000 users (employees)
* Each user can be assigned a Password and/OR a Proximity Card
* Users are assigned to groups and privileges are declared at Group level for easy administration
* Possible to define IN/OUT time for a Group on the day of the week basis. Beyond the defined times the Controller will not grant access and will record the event in the PC as Access denied to .
* User Groups can be restricted to certain Controllers and the valid time zones can be defined for each day of the week
* Special alarm events (e.g. Forced entry) can be monitored on the PC
* Option to lock out Controller for one minute if three wrong attempts are made in one minute
* Changes in configuration settings can be easily downloaded to all Controllers easily for the PC.
* Even after Power failure, the Controller retains the last properties defined/downloaded on it.
* Even in case of PC failure, the Controller can continue to operate the Access control system using the last properties defined/downloaded for that Controller. However, recording of events in not possible in such a case
* Access denied events (e.g. employee trying to enter at odd hours) can also be recorded
* Duress entry option allows entry like normal entry but logs an alarm event on the central PC.

GENERAL FEATURES
* Relay output for connection to door strikes/latches
* Independent NO/NC (programmable) input for connection to a switch for opening the door from inside.
* Elaborate Audio and Visual signals in response to commands
* Programmable duration for Time to open the door and Time to close the door, if connected with a magnetic switch
* Tamper switch output separately available
ADDITIONAL REQUIREMENTS
The Readers/Controllers have to be connected with electromagnetic latches/strikes to control the doors. Also, wiring could be a significant cost.

Magnetic Swipe Card System
Here one has to insert a tamper-proof photo ID card into a reader, which scans it, and only then the person can enter the premises. These systems can work with or without computer connectivity and can be further used for Time Attendance with Pay Roll Accounting facility.

SEMI PROXOMITY DOOR ACCESS STSTEM
Functionality same as the proximity door access system, except that here the range is up to 6 inches (approx).

NUMERIC LOCK WITH PIN FACILITY
These locks which are used widely in brief cases, can also be installed at the door. Here the person has to enter a particular code like 123 and only then the can opened.

BIOMETRIC FINGERPRINT ACCESS CONTROL SYSTEMS
In recent times, there are large number of Biometric Systems that are commercially available. Such Biometric systems are based on unique characteristics of human being. The most common, reliable and successful system is the one based on Finger Prints. Users are supposed to put their thumb/index finger (or any specified finger) in the finger reader. The system then compares the finger print that is read with that in the central database for authentication.

Most of the Biometric Systems do not keep an image of the fingerprint but a template. A template is basically a number that is calculated based on various characteristics of the fingerprint. Such an approach is desirable so that unauthorised persons may not sneak in unauthorised images of finger print in the database. When a Finger print is to be matched, it's 'template' number is computed and compared with that stored in the database. Most systems allow for dry, greasy, chaffed and minor cuts on the fingers.

RETINA BASED DOOR ACCESS SYSTEM
A biometric security system isn’t limited to reading only an individual’s fingerprints, it could also read that person’s retina. A retinal scan involves analysing the blood vessels at the back of the eye. Low intensity light is used to scan the unique patterns of the retina. This is a very accurate system if the individual being scanned cooperates properly with the technology and focuses on the given point.

BIOMETRIC FACIAL RECOGNITION SYSTEM
Facial recognition, a further biometric characteristic which can be employed as the basis for an entry system, analyses facial characteristics. A digital camera will develop a file of a user’s face for authentication. This type of recognition is still quite complex and thus reserved for a niche market. It has become quite popular in casinos where it has been employed to create a facial database of scam players for quick detection by security personnel.

VOICE RECOGNITION SYSTEM
A voice recognition system is based on a voice-to-print authentication. Technology transforms voice into text which is then compared with a stored sample. This identity system requires a microphone and could shortly be seen to have replaced security systems used currently such as pins and passwords. Although it is quite an accurate technology, people feel safer if this authentication method is combined with finger-scan technology in their identity systems as this is believed to be much more accurate.

PALM BASED DOOR ACES SYSTEM
Here the person has to place his palm over the reader which on finding it similar to the one stored allows the person's entry.

AUTOMATIC SLIDING GATES BARRIERS OR AUTOMATIC SLIDING DOORS
These are used I airports, railways and big hotels and in those industries where sanitized and dust free environment is very essential e.g. pharmaceutical, software, food packaging etc.

PC BASED ACCESS CONTROL SYSTEMS
The systems currently being offered in the market come in with variety of features to cater to different types of requirements. Along with the basic security functions of validating and controlling access, the PC based systems offer optional features like Time and Attendance, MIS Reporting etc., providing the management with a lot of value- added benefits. Some of the most useful features include:

Multiple entrance/exit monitoring. The capacities ranging from a few users to hundreds of users - easily configurable for organization of any size.

The system can interface with the personnel information files that may be there already in a computerized environment. This makes the installation quick and reduces the data-entry errors.

Flexible Time zones - highly useful for controlling entry / exit as per shift timings; Basically, the PC based systems offer the possibility of programming the rules of entrance and exit.

PC based systems are very user friendly and offer unmatched flexibility in setting up various parameters.

PC based systems also keep the record of the transactions on the hard disk for extended periods of time.
User selectable personal identification numbers - provides additional security.