Building Access Control System
We offer access control systems that can be linked seamlessly to other systems that we offer. These include intruder alarms, CCTV, fire detection systems, and Building Management. A popular request often comprises of a CCTV camera for monitoring the door which access control systems identified as a security risk.
EFFICIENT ACCESS CONTROL
Access control, Time and Attendance.
- Anti-passback: At times people with access to a building use their cards to let-in unauthorized persons. This function prevents such activity.
- First Card: Other cards can only have access after the first card is used to open the door. By using First Card Authorisation, will employees have access to an office after authorised persons have gained access (like managers, security, etc.).
- Lockdown: With a single click can an administrator recover or lock all doors. This function may be used for both mobile clients and control clients. This way users can secure any area at any time and from anywhere.
- Easy Authorization Management.
- Access Levels: Different access levels are time-specific and location-specific authorizations.
- Access Groups: individuals from one “access group” may be given the same access levels.
- Access Control and Video Linkage.
Face Recognition Terminal
When it is used with the Hikvision Swing Gate.
- The Face recognition terminals offer access controls and function just like card readers.
- The terminals promote gate controls like entering, exit mode and also event configurations if used alongside 3rd-party gates.
- The terminals can grant or deny access based on facial information.
- The access control is shared with a 3rd-party gate using I/O output.
Electrified Lock Types
This option offers different locks that can be used on doors with access control and each has its own uses.
- Electric strike
An electric strike is used instead of a strike plate on a door’s frame (that metal plate onto which the door latches), and can unlock when there is power applied on it.
- Electromagnetic lock
The most popular lock used for controlling building access. It uses mags locks, electromagnetic locks that are made of a wire coiled around a metal core, that gives off a strong magnetic field once it is energized. When locked, the magnet stays energized, therefore magnetising the plate onto it. On unlock, power is cut, so the door releases.
- Electrified hardware
This method is the most unobtrusive when locking a door electronically. The electrified hardware places the locking mechanism within the door by itself. These come in either cylinder or mortise lockset forms, and in the exit panic hardware. Also, these locks can build DPS and request-to-exit into the hardware, thus needing fewer locks at the door.
Reader Selection Criteria
Readers let users request for doors to be opened. These are available in different varieties. Generally, reader selection starts by choosing from units that are compatible with the main credential format being used.
And from our Selecting tutorial for Access Control Readers, credential readers are available in various forms, from oversized to miniature ones, depending on the use.
Keypads
A rather simple type of access control, that allows users to input their PIN number on a keypad device in order to open doors.
Credential Readers
Currently, there are many card/fob technologies being used in the industry, and both are either contact and the contactless option.
Contact Readers are PINs, magnetic stripe, barcodes, and certain biometrics. Although they aren't being used as much, magnetic stripe readers will often be used on college facilities and in facilities where cards are for other purposes besides access. But, the big drawback in contact readers is they easily get damaged by vandals, through inserting of gum and other foreign objects into the slot. For this reason, contactless proximity cards popularity has increased.
Multi-Factor Readers
When your door entry reader uses proximity cards, keypad codes, and fingerprint scans, for 'multi-factor' support then 2 or more credentials will be needed for entry, and not just any credential option that is convenient for users to present at any time.
What else can I use at the door?
Activation of sensors alerts the access control system that someone is going out. Typically, motion sensors are preferred on access control devices, for their convenience although some other forms of such devices may be used.
An important part of RTE use is logic programming. For example, when the door opens (a DPS switch indicates open state) without first sending an RTE. So, the control system understands this to be a forced door alarm. Door devices can be powered using three methods and these are:
- Centralised power supply through the access control panel.
- Power over Ethernet.
- A power supply localised to the door.
Since door position switches are used in various systems, there are numerous options available.
And just like other access factors, selecting the appropriate door position switch will significantly depend on the door - the type of door used, how frequently it is used, and the direction it faces.
Elevator Access
Restricting access to elevators can be done in two methods:
(1) Calling the elevator car when a valid card is read, instead of using a push button. Users have to use their individual credentials to call the elevator car, one at a time. Once you are in the elevator, you have access to any floor you chooses. This option is cost effective and simple in restricting access, as only one card reader has to be installed, but might not work in all scenarios, when you need access to an individual floor.
(2) Allows choosing of individual floors depending on the credential given. Meaning, when you enter the elevator, the floors you are restricted to will be lit, and those you have no access to will remain unlit. So you can only take the elevator to all floors you have access to.
This method has several drawbacks, although it could be unavoidable when this level of security is needed. First, a card reader must be installed in the car, that necessitates interfacing with that elevator’s cable, or wireless transmission may be used. Second, this needs input and output for every floor to deactivate and activate each of these buttons, and this can be labor intensive based on the number of floors in that building.
Harsh Environments
When using access control systems in harsh environments, each of the devices used must basically be as such be safe, also known as explosion proof.
So this means that the device cannot spark or possibly create an explosion. Although there are specially designed card readers for these environments, normally they made like the regular card reader then it is mounted on an explosion-proof enclosure. These are readily obtainable from electrical distributors and are easily made in the industry.
Mustering
This is a function of specific access control systems, and it counts employees that are exiting a building through a group of readers or a designated reader. So, should you have an emergency, safety and security staff are able to see the number of employees and visitors, for some systems, are remaining in the facility.
Also, specialized wireless readers can be utilised for mustering, and in such a situation, the security officer will carry a reader and will have each employee swipe their credentials upon reaching the mustering point.