MIFARE Key Management Tool Specifications
MIFARE Key Management Tool Specifications
849
PARTICULAR SPECIFICATIONS
7. RAID Controller 12Gbps PCIe 3.0 with RAID 1, 5, 10, 50 with 4 GB / 8 GB Cache
Memory on single / Multiple controllers.
11. Certified for OS Windows Server 2016 or higher, VMWare vSphere, vCenter, Red
Hat Enterprise Linux, SUSE Linux Enterprise Server or as per
Application OEM sizing & solution requirements (Bidder must submit
details of compliance & technical specifications)
15. Pre-failure alert Should provide predictive failure monitoring & proactive alerts of
actual or impending component failure for fan, power supply,
memory, CPU, RAID, NIC, HDD
16. Configuration & Latest & OEM specific meeting Application requirements; agent free
Management monitoring; RAID & storage management; auto configurations; etc.
17. LED / LCD panel Should display system ID, status information and system error code
followed by descriptive text on LED Indicator / LCD Panel.
18. HTML5 support HTML5 support for virtual console & virtual media without using Java
or ActiveX plugins
19 GPU (Specific for GPU Support - The hardware must come in-built with minimum 2/3
Server based Ais and no of GPUs from NVDIA or Intel or equivalent with the capability to
FRS Application Only. support minimum 4 GPUs' per hardware
Not for ANPR & other
Applications)
20 Server security Hardware root of trust; digitally signed firmware & updates; secure
passwords
21 Warranty As mentioned in RFP.
PARTICULAR SPECIFICATIONS
Sr. Description
No.
1 The Access Modular Controller (AMC) shall conform, but not limited to the following
requirements and directives:
a. FCC
b. CE
c. UL294
2 All types of IP Based Access Controller must support & confirm/compliant to below
standards &/or protocols to safe guard against any cyber-attacks; data theft; malware;
spying -
Authenticated MAC-ID
Digitally Signed Firmware
OSDP & Weigand,
SNMP, SSL , TLS1.2,
AES256,
UL294
IPV4; IPV6
FIPS mode
Crypto memory encryption
Password protection & secured User Logs,
IP address filtering,
HTTPS encryption,
GDPR Compliant
PSIA
SNMPv3/v2c
FICAM PACS Infrastructure APL Listed
Non Hi Silicon Processor / Chipsets /PCBs
3 The AMC shall be of modular design with a download software built-in so that the application
program can be easily changed and downloaded without the physically touching the
controller itself.
3 The AMC hardware design shall be of standard 19" rack and/or wall mountable and/or rail
mountable for installation in enclosure.
4 The connection from the AMC to the AS server running the management software shall
preferably by Ethernet 100 Base T and/or RS-485.
5 The AMC shall have a web interface for doing network and configurational setting and below
information should be displayed on controller web or AS GUI, display to show all its network
parameters and actual status like:
PARTICULAR SPECIFICATIONS
Sr. Description
No.
11 The AMC provided shall support on board 02 or 04 readers and connectivity of up to 64
standards Wiegand; secure OSDP interface readers through reader interface modules. 32
reader interface modules over RS 485 where each interface module can support max up to 2
Wiegand or RS 485 or OSDP readers.
12 The AMC provided shall support min 8 (Eight) different card formats with 8 different facility
codes simultaneously.
The AMC shall support long custom card formats up to 128 bit long and card no up to 64 bit
long to provide the additional security and unique card number as minimum but not limited to
the following card formats:
Wiegand 26 bit, 32bit, 35-bit, 36 Bit, 37 bit, 40 bit, 56 bit, 64 bit and 128 bit.
13 The AMC Shall support min 255 Access Levels & 255 Times Zones.
14 The AMC shall provide programmable I/Os 08/04 on board, and shall be expandable to I/O
512/544, using I/O extensions modules.
15 The AMC shall support 256-bit AES data encryption between controller to AS server over
TCP/IP. Master keys shall be downloaded to the AMC, which shall then be authenticated
through the AS based on a successful match. The proposed Controller shall conform to
IPV4; IPV6; DHCP; DNS; SSL; TLS1.2; NAC-802.1x.
16 All inputs provided shall be configurable to provide 2- or 4- status selectable, via End-Of-line
(EOL) resistors, namely:
a. Input Closed
b. Input Opened
c. Input Shorted (provided in 4-status mode)
d. Input Tamper (Cable cut, provided in 4-status mode)
17 EOL resistor's values shall be flexible selectable in the AS management software during
configuration.
18 UPS shall be provided to continually supply power to the AMC and readers for a minimum of
2-hours, in the event of power failure.
19 The AMC shall generate a transaction record and save them in the memory for every alarm,
they include:
a. Time/date of occurrence and restoration.
b. Location of alarm sensors.
20 Users shall be able to use the web client to print badges via the personnel profile in the web
client and will also no longer be required resize the print dialog box
21 Users shall be able to define filter criteria in the search text box and have the correct filter
results returned.
22 Shall allow both the web and thick clients to show all clearance codes.
23 Shall allow to use all badge holders to have a valid photo showing in the left pane of the web
client
24 The Controller must support Integrations for -
Regional I/O shares I/O status
Wireless locks
Map Power Supply Alarms and Events using PSIA
Reader firmware and configuration download
Supports 1 total RS-485 I/O protocol
Regional IO shares IO states amongst multiple controllers
Relay count activations
Interoperability with older host software using Legacy Mode feature
Synchronize time using NTP
25 The Controller must support the below Card Reader Functions
1. Multiple card format support by reader
2. Paired reader support
3. Alternate reader support
4. Elevator support
5. Turnstile support
6. Biometric device support
7. Open Supervised Device Protocol (OSDP) and OSDP SC compliant
8. Occupancy count
CA No. CEDZ / TOKEN- 5 OF 2022 SERIAL PAGE NO. 852
PARTICULAR SPECIFICATIONS
Sr. Description
No.
9. Support of multi-occupancy rules
10. Anti-pass-back support
i. Area-based, reader-based, or time based
ii. Nested area, hard, soft, or timed forgiveness
11. Supports host-based approval rules
12. Keypad support with programmable user commands, card input
13. Shunt relay support
14. Strike follower relay support
15. Threat level and Operating Modes
16. Host controlled OSDP reader pass-through
17. Elevator floor override
26 The proposed IP ACS SYSTEM CONTROLLER & ACS SYETM SOFTWARE must be single
OEM only for seamless synchronization of personnel data & security.
PARTICULAR SPECIFICATIONS
PARTICULAR SPECIFICATIONS
PARTICULAR SPECIFICATIONS
The system shall be capable to send failover alarms to other integrated systems via Web
API/SOAP; OBIX protocol.
2 IACS must have inbuilt module if a workstation fail, other workstations shall be able to take
over operational roles. The operator shall be notified if the IACS workstation becomes off-
line to system server. The system shall escalate important alarms on other workstations
automatically when not acknowledged within the set time.
b) Swipe to Login feature. Using this feature, the workstations can be configured so that the
user must swipe their ID card and enter a password before gaining access to any
applications.
c) System administrator tools to restrict login access to the system data via workstation and
web browser, must be highly configurable.
CA No. CEDZ / TOKEN- 5 OF 2022 SERIAL PAGE NO. 856
PARTICULAR SPECIFICATIONS
d) Unlimited system usernames shall be supported and each user name shall have a user
selected password.
e) Password expiry, minimum password length, and at least one number and one character
can be enforced.
f) User configurable timeout or dead man feature must automatically close all applications
and log the user out.
4 Single Sign On (SSO)
a) The system must support integration Windows Single Sign On via Microsoft Active
Directory and Lightweight Directory Access Protocol (LDAP) with Kerberos Key Distribution,
thus allowing a single action of user authentication and authorization to permit a user
access to the system workstation software.
b) Single Sign On must remove the need to enter multiple passwords when logging on to
the system via a client PC.
c) Access to the system software must be granted to users after using their Windows login
credentials.
d) Single Sign On must support both the client workstation software
5 The system shall include an application to enable the system administrator or IACS
supervisors to allow or disallow workstation operators from accessing certain system
applications. The following features must be provided: -
a) Workstation user option configuration will provide at least five authorisation levels.
c) Application user checkpoints must include read only permission, add, edit or delete
permissions one or more authorisation level.
d) Application field checkpoints must restrict individual field data access within an
application, option shall include: - hide, display and/or edit for one or more authorisation
level.
e) Company restriction shall be supported, thus details on Personnel belonging to one or
more Companies in the system can be hidden from the operator
c The IACS Central Database Server will carry out the following core tasks: -
g Provide automatic updates of Ethernet Reader Controllers and field device changes, so that
the system is continually updated.
h Provide alarm and status information in real-time to client workstations in use for system
monitoring.
i Pass alarms to an integrated email over SMTP for a text messaging service to user defined
recipients or as per set privileges.
j Issue broadcast messages to the Ethernet Reader Controllers.
k System must include Integrated software capable to back up the system to stored files or
removable media and restore that system data. Systems requiring separate backup and
restore software shall not be considered.
l Backup data shall include transaction and alarm data, database audit files etc.
PARTICULAR SPECIFICATIONS
o Backup failure and other critical system alarms shall be notified to any user via the
workstation user application menu, as an onscreen warning message.
p The central IACS server shall maintain a full audit log of every change made to the
database.
q This log will consist of the “before and after” details of any database changes, when they
were made and the user name of the person who logged into the toolbar to make those
changes.
r MS SQL based database will be stored in flat files on hard disk and will not be removed
unless it has reached a user defined age limit, e.g. default of five years.
s SQL search tool will be provided to allow the user to examine these files.
t ACS system resilience can be defined as the ability of the system to deal with the
malfunction of any component. Should any device fail other connected devices will
continue to operate independently or in offline mode. The monitoring system shall be
alerted.
u The IACS system shall feature Integrated hot-standby software. The software shall support
automatic hardware failover, manual hardware failover as well as manage real-time data
replication between the primary and secondary servers.
ASCII strings shall be exported to a system connected to the Access Control central
database server via Ethernet or RS232.
Additional strings shall be sent when a system alarm is acknowledged or cancelled.
PARTICULAR SPECIFICATIONS
b Reports including custom user reports shall be exportable, either as an electronic file or
automatically as an email attachment.
c All reports including custom user reports can be scheduled on a daily, weekly, or monthly
basis.
B The system shall provide a means of issuing a preconfigured card format for each category
of card holder. As a minimum category shall include Staff, Visitors and Vehicles. A card
format shall include:
a) A user defined print design template. For printed cards, this feature will aid visual
confirmation of a card’s validity.
D After a user defined period, infrequently used cards can be parked, or otherwise
automatically moved to a reduced or null access level.
E Supports option to de-activate cards which are not used in “N” no of days
G A Card holder can be given special status, thus ensuring a card reader will respond
differently, than to a normal card holder with similar permissions.
H The system database shall support the “Foreign Language” character strings. Thus
allowing dynamic entry of foreign language strings, especially to be used when printing
badge name, or other user data fields that will not be in English for example.
I A card holder can be assigned a threat level status, thus a card holders’ access at certain
readers will be dynamically altered depending on the threat level status of the system.
CA No. CEDZ / TOKEN- 5 OF 2022 SERIAL PAGE NO. 859
PARTICULAR SPECIFICATIONS
K Image Capture
a) Each personnel record shall support one personnel portrait and
one signature sample.
b) The ability to store other document scans associated with the
personnel record or card holder, such as driving licence,
business card, and other such permits or documents etc. is
mandatory.
Card enrolment with Fingerprint
a) The system must include an Integrated method to create two separate encoded
templates generated by a card holder’s fingerprint for each card holder in the system.
b) In the event a card is lost or damaged, the card holder shall not need to return to the
enrolment station to have a new card issued.
11 Visitor management system (VMS)
A Valid visitor cards must be able to be printed with a photo and other cardholder information
to allow the ACS cards to be used as an identification card.
B The VMS system shall provide a means of issuing a preconfigured card format for various
categories of visitor card holder. A card format shall include a set print design template and
a limited set of access levels and time zones. This feature will aid visual confirmation of a
card’s validity.
C Image Capture
D Each personnel record shall support one personnel portrait, signature and feature the ability
to store other document scans such as driving licence, business card, and other such
permits or documents etc.
39 Vehicle and driver management system
A Valid visitor cards must be able to be printed with a photo and other cardholder information
to allow the ACS cards to be used as an identification card.
B The VMS system shall provide a means of issuing a preconfigured card format for various
categories of visitor card holder. A card format shall include a set print design template and
a limited set of access levels and time zones. This feature will aid visual confirmation of a
card’s validity.
12 Encryption & Security
I The Security Management System shall provide multiple levels of data encryption like –
a. 256-bit AES data encryption between the host and intelligent controllers. The encryption
shall ensure data integrity that is compliant with the requirements of FIPS-197 and FIPS
201. Master keys shall be downloaded to the intelligent controller, which shall then be
authenticated through the Security Management System based on a successful match.
PARTICULAR SPECIFICATIONS
Shall support resource modification enabling the user to specify reason for change or select
a predefined reason from a list and all data will be securely stored and maintained in the
database what can be viewed using the reporting tool in line with Title 21 CFR Part 11 Part
B compliance.
14 Live verification to access – Shall support to allow a user or guard to decide the access of
an individual who presents his/her card at a designated secure mode reader after validating
the card holder Image stored in ACS Database with live video verification; Facial
recognition enabled access control through video badging multi factor authentication being
verified.
15 Occupancy Restrictions - Shall allow the user to define the minimum and maximum
occupancy allowed in a designated area by enabling automatic logic running based on
occupancy restriction.
Shall also support a “two person rule” to restrict access to specific access areas unless two
cardholders present two different valid cards to the reader one after the other within a
period time defined by the door unlock time multiplied by a factor of 2.
Shall support the provision to allow a user or group of users via company selection, a
temporary denial of access to specific readers or areas based on a preconfigured event
.The group access function shall limit access to a group of cardholders, overriding all other
access criteria.
16 Asset Tracking - Shall maintain information related to assets that are issued to the
employees, contractor and other authorized personnel in the facility, including brass keys,
laptops, RSA keys, cell phones, company cards, etc. Reports can be generated for issue
Asset, Returned Asset & Overdue Assets.
18 Maps & Icons - The Security Management System shall provide the user with the means to
add maps and indicator icons to maps that shall represent input/output points, logical
devices, or cameras located throughout the Security Management System. Security
Management System maps shall display the state and condition of alarm points. The
Security Management System shall also provide the ability to monitor the channels or
panels.
19 Unified Biometric Integration - System shall be able to enroll fingerprints or palm/hand prints
within the same in-process application without using another 3rd party application or
biometric manufacturer’s enrollment application. All biometric data is stored and maintained
in the database. System can push templates to biometric readers (1 to- many matching) or
encode to smart card (1 to 1 matching).
CA No. CEDZ / TOKEN- 5 OF 2022 SERIAL PAGE NO. 861
PARTICULAR SPECIFICATIONS
20 System Reporting – The Security Management System shall provide authorized users to
generate detailed reports through a separate crystal reporting module for this purpose. The
reporting module should have an exhaustive pre-defined set of standard reports and must
have an inbuilt custom reporting module where an operator can design any type of reports
with simple mouse clicks and drop. This reporting module shall support query reports and
statistical report. Reports can be scheduled for automatic printing on printer or email to
defined email id in non-editable format such as pdf, xps as a min. Report export must
support various format HTML, xls, pdf, xps, txt and xml.
21 The proposed ACS OEM; its Hardware & Software; etc. must be able to provide localization
requirements for varied & defined SOPs through customized text, integrated customized
alarm window; layout, graphics and multimedia, keyboard shortcuts, fonts, character sets
and locale data, as per secure development; firmware upgrades and customized API
support in India meeting and mitigating trouble shooting and localized onsite specific API
support & development.
22 The proposed Integrated Access Control System shall meet below standards -
1. Systems benefit from UL 2900-1 cyber certification guideline. Further protection is
provided by the integration of the different Pro-Watch modules and event
management. Key benefits is – All data is protected from cyber threat
2. The whole Access Control System & Components shall contain no content or material
from any companies or their subsidiaries prohibited under US National Defense
Authorization Act (NDAA) Section 889 and can be used as part of systems which comply
with NDAA Section 889.
3. FICAM PACS Infrastructure APL Listed
4. High availability and redundant server solutions
5. Minimum and maximum occupancy enforcement
6. Secure communication thru TLS1.2
7. IP device communicate on AES 256 bit encryption
8. Advanced Encryption Standard (AES) (FIPS 197)
9. FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors
10 21 CFR Part 11 Part B compliance:- This functionality will meet the general requirements
of Validation and Compliance through Digital Signatures with special attention to the case.
11. Global and Nested Anti-pass back: The Security Management System shall support the
use of an optional anti-pass back mode, in which cardholders are required to follow a
proper in/out sequence within the assigned area.
12 NERC CIP-005-7 – The NERC CIP plan set of requirements designed to secure the
assets required for operating critical Infra CIP-005-7 standards defines cyber security
standards for electronic security perimeters
13 Support OSDP – Open supervised device protocol . This is secure way of end to end
communication from edge device to master controller and then to host all across secured
through AES packets & TLS encrypted streaming enabling full-fledged HTTPS secured
client interfaces.
14 Homeland Security Presidential Directive 12 (HSPD-12)
23 The proposed IP ACS SYSTEM CONTROLLER & ACS SYETM SOFTWARE must be
single OEM only for seamless synchronization of personnel data & security.
24 The proposed ACS OEM should have its own Repair/Service-Support Center and Toll-Free
TAC helpdesk Number and must own its RMA set up in India for a minimum period of 07
years from the date of submission of bid (not as joint venture, partnership firms; franchise;
distributor service center or through any other 3rd party association). In case of product
failure OEM should replace malfunction product with equivalent working product
immediately till the repaired or alternate product received. Necessary supporting documents
must be submitted.
25 Make in China or Origin of China is not allowed. Firmware & IPR shall be owned by OEM
and must not reside any restricting country. The firmware shall be digitally signed & secured
PARTICULAR SPECIFICATIONS
3 14443A 1-3: Reads NXP MIFARE Classic credentials, Sector 14443A 1-4: Reads NXP
MIFARE DESFire EV1 credentials, AES Encrypted files 14443A: Reads NXP MIFARE
Classic, DESFire EV1 credentials, Card Serial Number (CSN or UID)