0% found this document useful (0 votes)
114 views87 pages

Matrix Presentation COSEC ACM V2R2

The document discusses COSEC access control solutions. It describes the need for access control to restrict unauthorized access and integrate with other devices. It then summarizes COSEC's access control capabilities including real-time notifications, user access restrictions, and third party integration. Various COSEC access control products are presented including standalone and network access controllers, as well as solutions for data centers, elevators, and mobile access control. Key access control features like enterprise structures, authentication modes, and occupancy controls are also highlighted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views87 pages

Matrix Presentation COSEC ACM V2R2

The document discusses COSEC access control solutions. It describes the need for access control to restrict unauthorized access and integrate with other devices. It then summarizes COSEC's access control capabilities including real-time notifications, user access restrictions, and third party integration. Various COSEC access control products are presented including standalone and network access controllers, as well as solutions for data centers, elevators, and mobile access control. Key access control features like enterprise structures, authentication modes, and occupancy controls are also highlighted.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 87

COSEC Access Control

Right People in Right Place at Right Time


Why Access Control?
• Still Relying on Physical Security
• Using Traditional RFID System
• Basic Access Control Functionality
• Taking Actions After Incident Happens
• Managing Devices of Multiple Locations
• Required Integration with Other Devices
Access Control
• Restrict Unauthorized Access in Secured Area
• User Access on Advanced Biometric Technology
• Restrict User Access based on User, Zone and Time
• Advanced Access Control Features
• Centralized Monitoring and Control
• Real-time SMS and E-mail Notifications
• Other Device Integration for Fool-proof Security
Matrix COSEC Access Control
Access Control Process

Credentials: Palm Denied: Alarm Report Generation


User Identification
Vein, Fingerprint, Generation, and Real-time
and Verification
RFID Card Notification Notification

Show Credential User Allowed or


User Enrolment Output
on Device Denied

Assign Access Access Policies Allowed: Door Centralized


Policies Validation Lock, Turnstile, Monitoring and
Tripod Control
Security
Protects Dimension of Time, Organization Hierarchy and Asset
Classification

• Restricts Unauthorized Access


• Intact Security of Multiple Locations in Single Software
Multiple Credentials
Multiple Credential Access

• Palm Vein, Fingerprint and RFID Card


• Multispectral and Optical Sensors
Scalability
Scale As and When Required

• Upto 65,000 Devices


• 1 Million Users
Flexibility
Third Party Integration and Real-time Notifications

• Third Party Integration with Video Surveillance, Turnstile, Boom


Barrier, Tripod etc.
• SMS and E-mail Notification on Exception
Reliability
A Comprehensive Solution Enterprises, SME and SOHO

• Conglomerates Multiple Branches into One Platform


• Rich Functionality with Simple Configuration
Advanced Features
Feature-rich Software that Protects and Secures Organization’s
Manpower and Assets

• Anti-pass Back, Door Interlock, Guard Tour, etc.


• 25+ Advanced Features
Application
COSEC Access Control

Standalone Mode Network Mode with


With COSEC SIGMA COSEC CENTRA/
COSEC VYOM

Access Control for Elevator Access Mobile based Access


Data Centres Control Control
Standalone Mode
with COSEC SIGMA
Architecture

COSEC SIGMA

Direct Access from


PANEL GUI
Benefits
Advantages Benefits
Control up to 255 Doors and 25,000
Eliminate Need for Multiple Panels
Users from a Single IP Panel
Standard Structured Cabling, Higher
Leverage IP Technology
Reliability
Connect Existing Third Party Readers Protects Investment in Existing Readers
PoE Door Controller for Powering
Simplified Installation, Higher Reliability
Readers and Lock
Standalone Operation Without Server Eliminates Server Cost

Scalable for Future Expansion Optimum Investment


Network Mode
with COSEC CENTRA/ COSEC VYOM
Architecture
COSEC SERVER

COSEC SIGMA COSEC SIGMA


Benefits
Advantages Benefits
Integration of All Locations Complete Visibility and Better Control
Centralized Management with Local Facilitate Centralized Process As Well As
Execution Local Activities Like Enrolment
Real-time Dashboard Views, SMS and E- Faster Response to Exceptional
mail Notifications Situations
Connect Third Party Readers Protects Existing Investment

Advanced Access Control Features Additional Security for Sensitive Areas


Tighter Integration for Value-added
Integration with Third Party Hardware
Functions and Enhanced Security
Difference
Standalone Network

For SME, SMB and SOHO Enterprises and SME

Location Single Location Multiple Locations

Web Based with COSEC


Software Built-in with COSEC SIGMA
CENTRA/ COSEC VYOM
65,000 Devices, 1 Million
Capacity 255 Devices, 25,000 Users
Users
Access Control for Data
Centers
Access Control for Data Centers

Time Based Rack User Based Rack


Access with Single Access with Multiple
Biometric Device Biometric Device
Time based Rack Access

Data Center Authentication Data Center Access Allowed Rack Authentication

Rack Access Allowed Rack Selection


Advantages
Centralized Biometric Authentication
First Punch: Access to Data Center
Second Punch: Access to Data Racks

Pre-defined Rack Access


Display List Shows Rack Accessible to That Particular
Individual Only

Rack Access for a Defined Time Period


Admin Sets Duration of Racks Accessible to an Individual
Connectivity Diagram

COSEC SIGMA
User based Access
Advantages
Centralized Biometric Authentication
First Punch: Access to Data Center
Second Punch: Access to Individual Data Racks

Pre-defined Rack Access


Display List Shows Rack Accessible to That Particular
Individual Only

Integration with Video Surveillance


Takes Snapshot of User During Authentication to Data Center

Rack Access for a Defined Time Period


Admin Sets Duration of Racks Accessible to an Individual
Connectivity Diagram
Benefits
For Data Centers For Companies
Easy Maintenance of Diverse Data Complete Security of Company’s Data
Accurate Records of Access Allowed/ Accurate Records of Who Accessed Data
Denied in the Software at What Time
No Manual Security Required
Easy Data Rack Management of Various
Companies in a Single Location
Elevator Access Control
COSEC ARC IO800
• 8 Input Ports with Four State Supervised Inputs
• 8 Output Ports with Form C Dry Contact Relays
• PoE, Ethernet, RS-485
• Elevator Control
• LED Indication for Device and Network Status
Process

COSEC SIGMA COSEC Door Controller IO Linking

• Creating Users, Groups, and • User Shows his Enrolled • Integration of Hardware
Floors Credentials Like Fire Alarm and Buzzer
• Enrolling User Credential • Floors which are Accessible • Buzzer Sets ON, if
• Assigning Group of Users to will be Enabled Inside Unauthorized User Tries to
their Accessible Floors Elevator Access the Elevator

Single Panel Controls Up to 32 Floors


Process
Connectivity Diagram
Mobile based Access Control
Mobile based Access Control

QR Code Based Bluetooth Based


Access Control Access Control
QR Based Access Control
Connectivity Diagram
DIRECT ACCESS
FROM COSEC
SIGMA GUI
Features
• Scan QR Code for Identity
• Mobile as User’s Credential
• Contactless Identification
• Server Encrypted QR Code
• Customer Created QR Code
• 24 bit Encryption for Mobile to Server Communication
Bluetooth based Access Control
Connectivity Diagram

COSEC VEGA FAX

Twist Phone
Through COSEC
APTA App
Features
• Twist Mobile to Identify
• Mobile as User’s Credential
• Contactless Identification
• Process Multiple Users Simultaneously
• Encrypted Communication
• Beacon Enabled Functionality (Range: Up to 10m)
• Add Multiple Beacon with Single COSEC Door Controller to
Track Location
COSEC Hardware
COSEC Door Controllers

VEGA Series DOOR Series PATH Series ARC Series


COSEC Exit Readers

Fingerprint and Card Based Card Based


Access Control Features
Enterprise Structure
• Define Organization Hierarchy
• Create Various Entities:

 Organization Grade
 Designation  Department
 Branch  Category
 Section
Access Mode
• More than One Mode for Higher Security

 Card Biometric + PIN


 Biometric Card + PIN
 PIN + Card + Biometric Any
Card + Biometric
2-Person Rule (Dual Authentication)

Access Allowed Only When Two Authorized Users Punch


Within a Specified Time
First-in User

Restrict Users Till an Authorized User Enters First


Guard Tour

Enforce Vigil Patrol of Security Guards. Any Deviation Triggers Alarm


or Notifications for Instant Security Action
Guard Tour in Healthcare
Occupancy Control

Occupancy = 6

Control the Number of Occupants in a Designated Area


Minimum Occupancy Control

Occupancy = 2

Control the Number of Occupants in a Designated Area


Relative Occupancy Control

Allows Entry in Presence of Security Guards Only


Man-Trap (Door Interlock) – Zone Based

Second Door Opens Only After the First Door Gets Closed Completely
of That Particular Zone
Man-Trap (Door Interlock) – Door Based

Second Door Opens Only After the First Door Gets Closed Completely
of That Particular Door Group
Anti-Pass Back
• Prevents Card Holder from Passing his Card to a Second Person
to Gain Entry in Controlled Area
• Second Entry Using the Same Card is Allowed Only After an Exit
is Registered for Every Entry
Anti-Pass Back
• Local Anti-Pass Back: Restricts For a Specific Zone
• Global Anti-Pass Back: Restricts For All Zones
• Hard Anti-Pass Back: The system restricts entry/exit of a
person in case of Anti-Pass Back violation.
• Soft Anti-Pass Back: The system does not restrict the person
from re-entering/leaving on an Anti-Pass Back violation but
reports the same and maintains a Log
Time based Access

Restrict User Based on Time


Zone based Access
Zone 1 Zone 2 Zone 3

User Assigned Zone 3

Define Zone for Users and Restrict Accordingly


Access Cluster

Can’t Access for


2 Hours

Restrict or Limit Access of Users to Some Specific Region for a


Defined Time
Duress Detection

Dials with Access


Code Followed by a
Secret Code

System Opens the Door and at the Same Time Notifies Concerned
Person Without Giving Any Local Alarm
Do Not Disturb (DND) Zone
• User Entry is Restricted in a DND Zone
• Zone Access Level is Changed to Highest
• VIP User Can Override the Rule
• Useful for Business Meeting, Seminar, Operation Theatre, etc.
Blocked User – Zone

Block User based on Zone


Blocked User - Attempts

Block User based on Number of Attempts


Blocked User - Time

Block User based on Time


Live Monitoring Window
• Real-time Event Monitoring and Control
• Live Status of Door Controllers and Site Controller
• Alarm Monitoring and Control
• Temporary Deactivate Function/ Features
• Auxiliary Input and Output Status
• Automatic Events Download
Live Monitoring Window
Tail Gaiting
• Integration with Beam Detector
• One Access Allowed Event with Cut Beam for One Time Only
• Prevents Proxy Access
• Provides Real-time Notification in Case of Rule Violation
Through Alarm
Tamper Detection
• System Generates Alarm on Detection of Any Tampering
• Generates Alarm for Instant Security Actions
• Alarm can be Disabled Temporarily for Maintenance Purpose
Access Level

Zone Level = 8 Zone Level = 8

User Level >= 8 User Level = 7

Allow User If User Access Level is Higher or Equal to Zone Access


Level

*Up to 15 Access Levels for Users and Zones


Access Route
• User can Access Devices in a Specific Sequence (Route) Only
• Route Information is Stored in Smart Card
• User Cannot Access Devices Which Are Not Part of His
Route or Out of Sequence
• Useful for Large and Sensitive Areas Like Ports, Mines,
Pharmaceutical Labs, and R&D Centers
VIP Access
• Highest Level of Access Privilege
• Allows Access to Any Controlled Area Without Checking Access
Rights
• Any Person Holding VIP Access has Highest Access Level
• Useful for Directors, CEO and VIP Guests
Dead-man Zone

User Shows Credential at Pre-defined Time to Ensure His Presence


Additional Security Code (ASC)

Additional Security
Code

• Unique Number Encoded in Smart Card


• System Identifies User Based on His Basic Identity (ASC)
• Prevents Duplication or Fraudulent Use of Card
Smart Identification
Firstly, User Shows RFID Card in which
Fingerprint Template is Stored Device Temporarily
Stores the Fingerprint
Template

User Punches after Showing Device Matches the


the RFID Card Punch against the
Temporarily Stored
Fingerprint Template

User First Shows Smart Card, Followed by His/ Her Credentials


Hardware Integration
Video Surveillance Integration
IP-PBX Integration
Fire Alarm Integration
Wiegand OUT Interface

*Available with Selected COSEC Door Controllers


Trigger Device
• Automatically Trigger Output Device on Specified Time
• Useful for Time Based Applications
• School Bell, Siren, Camera Recording, Door Unlock Can be
Activated Without Any Manual Involvement
SMS and E-mail Notifications

Door Kept Open Door Forcefully Opened Threats and Dead Man Zone Violation
For More than Casualties
Normal Time …And More!

SMS and E-mail Alerts to Respond Quickly on Situations


Reports

MS-Excel PDF XML Rich Text RTP MS-Word


MS-Excel Data Format MS-Word Editable

• Access Zone • First-In User


• Time Zone • 2-Person Access
• Access Group • Who Is In
• Functional Group • Guard Tour
• 2-Person Group • Emergency Evacuation
• Input Port Group • Door Held Open
• Output Port Group • Alarm Details
…And More!
Contact Us

Email [email protected]
Contact No +91 9374474302
Website www.MatrixAccessControl.com
Address 394-GIDC Makarpura, Vadodara-390010, Gujarat, India

Matrix Access Control and Time-Attendance – COSEC ACTA

Matrix Access Control and Time-Attendance

@Matrix_COSEC

You might also like