🔐 ACS - access control: comprehensive protection against intrusions

Security is always one of the key moments of the normal functioning of the enterprise, production or office. Protection against theft, Robberies, acts of terrorism or kidnapping an important documentation should work stably and smoothly. Modern technologies allow automated defenses and to increase their effectiveness. So what is the ACS - the monitoring system and access control? We understand in this article.

ACS diverse and functional
ACS diverse and functional

Read article

  • 1 Access control system - it stands for and how
  • 2 Stand-alone and network access control types
  • 3 Automated access control function control
    • 3.1 Differentiation and access control
    • 3.2 Time and attendance
    • 3.3 protection system mode
    • 3.4 Other functions
  • 4 Technical means for controlling the movement of staff and visitors
    • 4.1 Electronic and biometric user IDs
    • 4.2 readers
    • 4.3 controllers
    • 4.4 Actuators - locks, turnstiles, lock the cabin
    • 4.5 Software ACS
  • 5 Features ACS for large corporations
  • 6 ACS features for small offices, hotels and shops
  • 7 Features ACS for schools

Access control system - it stands for and how

Decryption is simple - to control and access control. In general, the control system and access control - a set of hardware and software mechanisms to control access to the territory. Since the system is implemented using hardware and software solutions, the prospect is opened and to apply additional functionality. This could include time tracking, registration and management of users, integration with various adjacent systems - fire or security alarm, CCTVAnd even payroll. In general, the capabilities of the system are limited only by budget and imagination.

Stand-alone and network access control types

All security systems are divided into two broad categories - standalone and network. Autonomous as can be guessed, works only with the inner set of hardware and software that does not have a centralized control and monitoring means. But in this case a local hub may be present which connects the system devices and transmits data therebetween.

The simplest scheme autonomous ACS
The simplest scheme autonomous ACS

Stand-alone access control system is cheaper to have a fairly simple to operate and maintain the configuration, do not require the cost of cables and computer equipment. As a rule, this type of access control and Time Attendance is advantageous and convenient to use on small objects - warehouses or small-scale production.

Network access control - a large complex equipment, computers, controllers and software. Most often they are installed for access control in large enterprises, factories, offices or factories. They are relevant when it is necessary to implement a complex hierarchical access system, delimited areas. That is, people with a lower level of access thanks to the control system will not be able to get into the room with a high level. The centralized structure allows the network access control store data, process them, and monitor and analyze. They also have the easiest way to integrate and other protection systems - fire alarm or CCTV. Communication between the nodes of the system can be implemented in different ways - via cable, Wi-Fi or GSM wireless protocols.

Automated access control function control

ACS functionality is very large and is not particularly limited. You can quickly build a new module or a new rule implemented by the software. Consider the basic access control features.

Differentiation and access control

The original purpose of the ACS are still structuring control and access levels.

The key fob can be used as an identifier
The key fob can be used as an identifier

The main type of execution of this approach - the use of different identifiers. They can serve as magnetic cards, keyrings, labels, direct entry of a code on the keyboard, reading a fingerprint or retina. The system stores information about all employees or visiting a total basis. Each entry has its own level of access, due to which the system can compare whether a person may be held in a particular area. Computer, in the case of mounting the ACS network system also collects statistics of visits and cherishes it before subsequent use. In stand-alone systems to skip a person or takes no stand-alone controller. It has its own non-volatile memory, which made all the ID codes and their rights.

Password access - one of the types of access control
Password access - one of the types of access control

Directly for processing information from the ID readers meet. This can be contact and contactless embodiments. All the complexity of the design of the reader depends on the type of identifier.

Readers are installed directly in front of fence devices - turnstiles, electromechanical locks, gates and gateways. They prevent access to the visitor as long as the one with the help of an identifier can not prove their rights to visit the area.

Time and attendance

The access control system is all that is necessary for the implementation of Time Attendance. Why not use it? Every visitor or employee object has a unique identifier - the system can track the time of activation of the reader when entering and exiting.

Passing through the turnstile systems, the employee leaves the mark on the time of arrival
Passing through the turnstile systems, the employee leaves the mark on the time of arrival

These data are sufficient to establish and record in Time magazine, spent on the site. This means that the staff is more difficult to be late or to escape from work early, because the information about it will be immediately stored in the system.

protection system mode

ACS does not involve itself built protection mechanisms, it can only prevent access. On the other hand, having flexible platform access control system can be supplemented with an alarm system that will, for example, is equipped with video monitoring, intrusion sensors, or any other.

Other functions

Additional functionality can be many. Implement can be almost anything. But such features are most commonly used:

  • awareness of the passage of the reader using SMS via built-in GSM module. Such an approach can be found, for example, in schools;
  • for companies having multiple branch offices, you can implement remote access control management using the Internet.

Technical means for controlling the movement of staff and visitors

We have already talked a little about the technical parts of the access control system. Now you can deal with them more and to consider their options and features.

Electronic and biometric user IDs

The most common approach to the identification of the organization has been and remains plastic card access control.

These are the labels can be used as identifiers
These are the labels can be used as identifiers

They may use different methods of reading data: barcode, magnetic tape or intelligent system. Also, many companies are using electronic tablet - tiny chips, wrapped in a metal body. This Touch Memory, or touch memory.

The simplest access control card with a chip
The simplest access control card with a chip

The simplest version of the contact memory you may use every day - is the key of the intercom, With which you can go to your entrance.

The apparent vulnerability of these identifiers - the possibility of theft, loss or cloning. A more reliable method of identifying a specific person - a biometric access control.

🔐 ACS - system in the office and at home: an effective way to protect yourself and the information
The retina is unique to each person

Unlike electronic physical identifiers are read by the unique characteristics of the person. The most common - a fingerprint scanner or retina. This static methods that use the immutable characteristics of a person.

human fingerprints also can not be two different people
human fingerprints also can not be two different people

More sophisticated systems use dynamic type identification, when taken into account the behavioral characteristics of the human and mutable - signature, speech, set properties from the keyboard.

Electronic identifiers are simple to install and are inexpensive, unlike the more reliable biometric types.

readers

Readers, or readers are designed to read data from the identifier with the further transmission of information to the controller.

Readers have many different implementations
Readers have many different implementations

Its type depends on the selected authentication method. The simplest example of a reader - intercom system, which has a landing zone for the key, which is the reader. In more complex mechanisms using magnetic readers, fingerprint readers and retinal scanners.

controllers

In fact the controller is the main part, decides to skip the visitor in the area or not.

Controller - a fully electronic device with its own memory, and often self-powered
Controller - a fully electronic device with its own memory, and often self-powered

This is a separate electronic control unit which may be used individually or integrated into one of the actuators. Controllers manage the opening and closing locks, The processing of signals from the reader, reconciliation code identifiers stored in the database. The controllers can be stand-alone or be part of the ACS.

Actuators - locks, turnstiles, lock the cabin

The easiest type of actuator is expressed in ordinary electronic locks.

Turnstiles gradually modernize and improve
Turnstiles gradually modernize and improve

The opening may be remote from the post, or at a close range using a special key. Also, magnetic cards or touch memory can be used together with such locks.

Rotary cabins are usually used for the integration of entrances into the building
Rotary cabins are usually used for the integration of entrances into the building

Turnstiles are also an actuating device. They can be full-length or waist. turnstile mechanism is implemented so that it could pass through only one ID at a time. Lock chambers are generally used at sites with a high level of privacy and security. BUT goal and barriers - to organize controlled car travel.

Software ACS

Implementation of software systems of access control systems are many. Basically companies developing security systems provide complete sets of equipment and software written for him.

EXAMPLE ACS operation program
EXAMPLE ACS operation program

In general, for access control and all can not be used by any software. It is only necessary for better control, information gathering, analysis, and other remote features.

Features ACS for large corporations

Large companies with many branches across the country are using the type of network access control. For such enterprises created a specialized fault-tolerant software.

🔐 ACS - system in the office and at home: an effective way to protect yourself and the information
Large enterprises require large systems

Naturally, the equipment must comply with high security and reliability criteria. Control and monitoring are made remotely from the head office of the company.

ACS features for small offices, hotels and shops

In small enterprises will be installed at both network and stand-alone access control systems. In most cases, such objects need only provide input and output. Therefore, most suitable simple and inexpensive stand-alone access control system in the office.

Features ACS for schools

In schools, the most commonly used simple solutions, that is self-contained.

🔐 ACS - system in the office and at home: an effective way to protect yourself and the information
Autonomous systems are much easier and can be used even in private homes

In addition, this assumes the presence of man, as the child may lose its identity or leave it at home. Therefore, skip the student in the building need to be anyway.