Access Control
Access Control
INTRODUCTION
Access Control Technologies is to be used during the planning and design of
access control systems. This technology is intended for use by emergency response
personnel, disaster control personnel, civil disaster administrators, and local,
state, and federal security and law enforcement agencies. This provides basic
information to organizations whose primary functions may not encompass
designing, evaluating, or installing access control systems, but need introductory
level information related to the purpose, operation, and application of these types
of systems.
Any organization seeking to implement an access control system should do
so only with the assistance of personnel or organizations that specialize in
designing and installing such systems. Establishing an access control system
involves not only design, installation, integration, and testing, but also the long-
term issues of operation, training, and maintenance.
Door Controller
Controller Should supports most third-party access control read heads conforming
to the physical Wiegand / Mag Stripe (data/data, clock/data) interfaces, covering
a range of technologies from RF Proximity to Biometric devices.
Controller Should supports two door configurations. It can either be configured for
two read heads on two separate doors, with optional Exit push buttons, or can be
configured to support two reader heads (an Entry/Exit configuration) for bi-
directional control on a single door. The same configuration can be applied to
turnstiles, one bi-directional or two uni-directional turnstiles.
Biometric Finger Print Reader with Smart card (iCLASS Card: Up to 4” (10.2 cm)) &
PIN Pad Reader, Fingerprint sensor type-Optical, Resolution 500 dpi, 256-bit gray
scale, 18 x 22 mm sensor area, Timing- Card read < 0.5 sec Fingerprint capture < 2
sec, typical 1 sec, False Accept/ Reject Rate FAR < 0.01%, FRR <
0.01%,Certifications-UL294/UL (US), FCC Certification (US), IC (Canada), CE (EU),
C-tick (Australia, New Zealand), SRRC (China), MIC (Korea), NCC (Taiwan), MIC
(Japan), iDA (Singapore), RoHS, Mounting-Mounting plate attaches to US/EU/ Asian
back box, 52-60 mm screw hole spacing (vertical or horizontal). LCD/Keypad
reader housing latches onto mounting plate; fingerprint module secured to reader
with a screw RoHS.
The contactless smart card shall function as an access control card, used with
access readers to gain entry to controlled portals and to hold identification
information specific to the user.
The contactless smart card shall be a passive device, with an operating frequency
of 13.56 MHz, and shall meet ISO 15693 and ISO 14443B2.
The card shall contain a 64 bit unique serial number.
The contactless smart card shall have 32 Kbits (2Kbytes) EEPROM memory
configured with 16 application areas.
Each application area shall contain a unique 64 bit diversified authentication key
to reduce the risk of compromised data or duplicate cards. The contactless smart
card and card reader shall require matching keys in order to function together. All
radio frequency (RF) communication between card and reader shall be encrypted,
using a secure algorithm.
The contactless smart card will support programming and updating of custom
applications after issue, using an appropriate HID iCLASS reader/writer or
authorized HID iCLASS enabled reader/writer.
The contactless smart card shall meet the following physical characteristics:
Dimensions, per ISO 7810: 2.125” x 3.375” x 0.030” (53.98mm x85.60mm x
0.76mm).
Weight: 0.20 oz. (5.7 g)
Internal antenna configuration shall allow a single slot punch on the vertical (short)
side of card.
The card may be marked with an external ID number, either in nkjet or laser-
etched numbering, which may match the internal Programmed ID number. If the
external number does not match the internal number, a cross-reference list is
provided to detail the internal/external numbering sequences.
Optionally, the card may be printed with custom graphics, may be built to a
custom thickness and may contain security and anti counterfeiting features.
The Visual Imaging Pass Production System (VIPPS) is fully integrated with
Software allowing users to produce permanent and temporary ID badges. VIPPS can
be used to enrol fingerprint biometric templates onto the SOFTWARE system.
Biometrics Support
Access Levels
An “Access Level Changes” report has been added to the SOFTWARE Web suite of
reports. This lists access level changes for SOFTWARE Personnel, Visitors and
Vehicles and is useful for System Administrators and the ID Enrolment unit to track
the history of cardholder access rights.
The report can be configured using criteria such as Date/Time, Cardholder, and
Company. The report can then be viewed on the screen, printed, saved as a CSV
file or emailed.
Soft Anti-Passback
With Soft Anti-Passback, access is granted but an alarm is sent to the Alarm Event
Display (AED). This can be configured on a reader by reader basis which is applied
to all cardholders, or on a cardholder by cardholder basis.
Ultimately, if the cardholder’s CURRENT ZONE is not the same as the OUT ZONE
and the timeout period has not expired, then a Passback failure outcome is given.
This allows stricter control of how cardholders move within the building or a zone,
making sure that the proper sequence or route is followed and the rules regarding
tailgating (not swiping) are enforced.
Zonal Control is configured using a new SOFTWARE WEB application allowing the
administrator to quickly and easily implement a new Zonal Control and Anti-
Tailgating configuration.
Threat levels
Additionally, for added security SOFTWARE Threat Levels can require the
authorization of 2 operators who must enter their login credentials before the
threat level can be changed.
Image Storage
All digitized imaging data for each pass is passed from the operator’s workstation to
the central computer database. Lost/expired badges can be reproduced on demand
without the need to re- photograph employees or regular visitors. The data can
simply be recalled, the expiry or visit
date entered, and the pass printed. Passes are produced as and when required.
The “Previous Card” tab will display all the basic information as well as the Date
Returned and Return Reason. Also, the”Hotstamp History” tab will display
information about any user who has used, and returned, the same card as the
current Personnel record. Details include all changes to access levels for the
specified card holders.
SOFTWARE has the ability to automatically disable Cards, Passes or Tags after a
pre-defined period of inactivity known as ‘Card Parking’. SOFTWARE checks the
date the tag was last used and if inactive for more than a pre-set period, access is
denied only to selected “restricted” readers.
System administrators can easily add a visitor record to include information such as
visitor details, reason for visit, and scheduled time of appointment along with the
name of the sponsor responsible for the visitor.
Trace Visitors
A visitor card can have a Trace added allowing the visitors movements to be
visually tracked using the
Alarm Event Display (AED) graphical maps application.
Vehicle passes/tags can be issued and returned for reuse on other vehicles;
providing a cost effective use of technology tags.
Integrated into the SOFTWARE system, T&A provides a very powerful, configurable
tool that allows the administrator to run reports on the number of hours worked by
staff. Rather than installing a separate timekeeping system, existing pass cards
and readers can be used for both Access Control and Time and Attendance.
Easy to read reports are generated to provide an overview of employee IN and OUT
times by individual, group or company over a specified period of time.
If an employee has activated any of these problem settings, the report highlights
these in red next to the corresponding employee profile
Configure Broadcast Zones to send a signal to one or more outputs located on any
online CEM card reader or input/output controller. Broadcasts are typically sent to
lock outputs or sounders, to activate or de-activate the connected device.
Keypad Commands
Selected Card holders using a four digit PIN can activate/deactivate a Broadcast on
the SOFTWARE system; a Broadcast shall trigger outputs on SOFTWARE field
devices. Also Selected Card holders using a four digit PIN can activate/deactivate
alarm filters; alarm filters shall halt alarm conditions from display on one or more
Alarm Monitoring workstations.