1 / 8

ACCESS CONTROL DEVICES

Access control systems provide end-to-end control on who can be allowed and who cannot be allowed to enter the office or premises. Access control systems authorize, recognize and authenticate entry of people/staff into the premises.

Pawan15
Download Presentation

ACCESS CONTROL DEVICES

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ACCESS CONTROL DEVICES

  2. Agenda INTRODUCTION MODELS OF ACCESS CONTROL ACCESS CONTROL MATRIX ADVANTAGES

  3. INTRODUCTION Access control systems provide end-to-end control on who can be allowed and who cannot be allowed to enter the office or premises. Access control systems authorize, recognize and authenticate entry of people/staff into the premises. Beneficially, the access control system not only tracks and records data of visitors and employees, but also helps in integrating the payroll software, to produce automated and system generated attendance system. Each access control system biometric helps in saving time and resources that happens with the manual attendance system, and increases the productivity and profitability of the organization. The proximity access control system deployed in offices and factories allow for time zone settings, and ensure an absolute safety environment.

  4. Getting started with access control can be overwhelming at first with so many technical terms and things to wrap your head around. But understanding access control systems is really an achievable goal - especially after reading this guide. This is really a 101 crash course guide for access control systems. If you want to get a relatively quick idea of how access control works, you’ve come to the right place. Why do we need access control? The purpose of access control is to provide quick, convenient access control for authorized persons, while at the same time, restricting access for unauthorized people. Here are more reasons why access control is playing a significant role in your organization: Access Control Infrastructure Access Control infrastructure is to most people the most mysterious aspect of access control systems. Obviously there are electronic locks installed - but what most people don’t know: Those locks are all centrally wired to your IT room. This means: A power or signal cable runs from the lock through the walls into your IT room where the access control panel sits. The access control panel gives the lock the signal to unlock when it receives the request to do so by the card reader. There are different topologies (as people call it) but for the basic understanding of access control systems let’s just assume this described flow for now.

  5. MODELS OF ACCESS CONTROL  A card which stores the data in a magnetic strip or a chip. This type of card sometimes called as swiping card. Electromagnetic locks are used to secure the door in conjunction with push bars, request-to-exit devices or credential readers for fail-safe applications when code compliance permits. Access Cards Electromagnetic Lock •  A plastic card which contains a magnetic strip or a chip  • It contains encoded data that is read by passing the card through or over an electronic device, used to provide access to restricted or secure areas or systems.

  6. MODELS OF ACCESS CONTROL • Bio Proximity Time and Attendance System • Proximity Access Control Reader • Biometric Access Control Reader • Proximity is a wireless technology, which can easily read the data from the near by card to interact with each other wirelessly. This systems will  run on low-frequency RFID technology. A device that reads the identity of a person by comparing some attribute of their physiological being or behavioral traits against a sample database is called a Biometric Reader.  A device which stores employee’s daily attendance via fingerprints. This will helps the organization to track the attendance of its employee systematically

  7. ACCESS CONTROL MATRIX • Instantaneous protection state of a system • Dynamically Changing! • How can we extend this model? Objects A B C D alice bob subjects charlie dave

  8. THANK YOU FOR MORE DETAILS 9885888835 seo@brihaspathi.com

More Related