2
Most read
3
Most read
11
Most read
Access Control System
2018
Techera Endeavour Pvt Ltd
www.techerasolutions.com Contact No. +91 7021303434
Access control systems are the electronic systems that are designed to control access authorization through a network. Access
Control System recognizes authenticates and authorizes entry of a person to enter into the premise thereby giving complete
protection ensuring security of the premises.
Many ACS use network for communication purpose and information is communicated through these networks .ACS helps to
connect multiple facility across globe for giving ease of access and security control from single location.
Organizations which require high security use different credential systems and one or more credential combinations like bio
metric, RFID, door controllers and card readers etc. Each access point may be controlled individually as per the requirement of an
organizations.
Mainly access control system is divided in two categories
1. External ACS and 2. Internal ACS
Both categories of ACS are specific to nature of premises,
deployment of internal and external ACS mostly depends
upon nature of building and geographic region threat level
rating and also upon type of usage.
What Is Access Control System ?
Some of the reason for access control system deployment in your premises
Security : Provide 24 x 7 electronic security irrespective of your premises is open or closed
Environment : Many advantage of well deployed and managed ACS
• Occupancy and load pattern to increase efficiency
• Control of lighting and cooling based on occupancy
• Reduce wastage by control of printers
Health & Safety : Controlled access to area based on work profile can assist in compliance with health & safety
• Limit access to area having hazardous substances
• Restrict access to under construction and contaminated area as per safety point.
IT : Integrate with access for single point of control
• Command and control center for multiple office location
• Control single sign on access based upon user location
HR & Time and Attendance :
• Improve punctuality and reduce unscheduled breaks
• Increase efficiency by removing manual time sheets
Reason For Access Control System Deployment
Access control systems are graded according to the type of business and risk associated, grades applied to protected
area and not to the overall system therefore mixed grades may be utilised within premises.
Access point grading are mainly classified into four grades
Grade1 : Low Risk
• Standalone lock or offline system ,internal area where you want to restrict public movement
Grade 2 : Low to Medium Risk
• On-line system, commercial building and small business offices
Grade 3 : Medium to High Risk
• On line system using two factor authentication or single factor biometric to prevent access
Grade 4 : High Risk
• On line system using two factor authentication, one of which should be biometric
Security Grading System Risk Classifications
• Anti Passback : A feature that traces individual credential access requests to a given area. It checks for granting of
access not preceded by granting of egress (or vice versa) to check that the credential has not been “passed back”
to another user. Also refer to hard anti - passback, soft anti - passback, logical anti - passback and timed anti-
passback.
• Soft Anti - Passback : Grants access but generates alert for violation of anti-passback rule
• Authentication : A system compare credentials of user with recorded credential for access.
• Anti Loiter : A feature that monitors path of the user through a security controlled area and produce path graphical
representation
• Card Blocked : Removal of access permission for a particular credential
• Degrade Mode : In case of an failure of main controller field controller will work independently.
• Door Opened Too Long : Alarm for door opened for more than defined time after access to user
• Door Forced : Unauthorized opening of an door
• Dual Access : For highly secured and unmanned area 2 sequential authorize request is required for access
• Fail locked : Securing of an locking mechanism in case of power failure
• Fail Open : Release of locking mechanism in case of access system failure / power failure
• Free Access : A condition in which door is allowed to be open without any credential (ex. Emergency Evacuation)
• Tailgating : A person passes with a person carrying credential
• Tamper Detection : Detecting unauthorized interference
• Tamper Protection : Protection against deliberate interference
Access Control System Features To Look For
Number of components used from identification of an person to authorise access.
Credentials :
• PIN/Code Based access :
PIN/Codes are nothing but an numeric digits having 4,5 or 6 characters for access.
• Swipe/Token :
Cards are used with magnetic strip on reader for access, not fully secured and cards to be changed regularly.
• Proximity Cards :
Cards having small chip inside for storing details, used for short distance authentication for access, more secured than swipe
cards and less wear and tear de to contactless.
• RFID Cards :
Contact less technology having space which is used for multiple application from 1 card
• Mobile Device :
NFC and Bluetooth enabled mobile and reader can exchange data for communication which results into authentication for
providing access.
Types Of Credentials Used In ACS
Number of components used from identification of an person to authorise access.
Credentials : Biometrics
Biometric Verification : This is called as 1:1 comparison by providing PIN, it takes less time since comparison path is defined.
Biometric Identification : This technology works on comparing 1:N template and takes time depending upon number of stored
templates
Available Biometric Technology
• Finger Print
• Facial Recognition
• IRIS
• Retina
• Hand Geometry
• Vein Recognition
• Voice
Types Of Credentials Used In ACS
Access Control Reader & Controller
Readers are classified according to functions they perform.
Standalone Reader + Keypads : Used for small application involving 1 to 5 doors and decision taken independently.
Standalone Reader + Controller : Standalone reader with controller functionality for single independent door, suitable for
application ranging from 1 to 10 doors.
Online Reader : For online reader access decision is taken by an computer connected to an specific reader for granting
access.
Offline Reader : In this scenario cards hold the database for access and there is no controller or computer is involved for
decision making.
Reader & Controller : This kind of system used for reader more than 10 Nos and number of controllers connected to a
common software for analysis and reporting this is commonly used for medium to large office scenario.
IP Controller : Connected to ACS software via network switch, combination can be ranged from 2/4/8 doors controller
Non IP Controller : Also know as Master-Slave controller configuration, master controller is connected to an ACS software
Controller is nothing but a gateway between reader and software for decision making. Controller is connected to PC having
ACS software, alarm events and other information is exchanged between controller connected to an common network through
a common software. Controller can worked in offline mode as of when system is down and transaction can be recorder and
synced back when system is up.
Access cards are access key to your premises, by using access control cards you can access granted access as per
your nature of work within premises. Access cards are very useful to an security officer where he can defined user
specific door access to keep security check all time and also trace path of usage by an user.
Two types of card technology is available.
1. Prox Cards : Proximity cards comes in wide range of styles
A. Standard Prox Card
B. Composite Prox Card
C. Clamshell Prox Card
D. Magnetic Strip Card
E. Prox Cards Adhesive Tags
F. Corporate 1000
G. Prox Card Key Fobs
H. Prox Cards for Printing
2. Smart Cards : One difference between smart card and prox card,smart can read and write data which allows them
to use for wider range of applications.
A. iCLASS Cards
B. MIFARE Cards
About ACS Cards Technology
Web based access control system is an enterprise grade software which controls and manages entire system from any where in
the world and at any time earlier ACS software were mainly used for reporting and time and attendance but now many
functionality can be taken on ACS software for ease of employee and service management.
Key Features Of Access Control Software
• Real Time Monitoring and control of doors from single window
• Web based software for live connectivity and door status
• User profile creation from any location on connected platform
• Ease of enrolment from USB based enrolment station
• Device configuration for any addition of hardware in network
• Export and import data from 3rd part software
• Seamless integration using API platform
• Auto device authentication
• Scalability of users and addition of application modules.
• Easy backup and restore functionality.
ACS Software – Web Based
Multilocation access control system where below 4 location across the globe is connected on a common WAN and
server placed at any location can manage complete ACS operation.
Multi-Location ACS
Lan Point Controller
Reader
Mumbai Office
Delhi Office
US Office
UK Office
ACS Server Any Location
Elevator access control is mainly used for premises where controlled access is to be provided. Deployed access
control should be user friendly and flexible and also easily integrated with conventional elevators and destination
control systems.
Features offered from Elevator Access control system.
Scalability : System should be scalable to any number of floors and multiple buildings with highspeed.
Integration Capability : System should support any credentials and also available lift brands
Reports & Dashboards : Should provide real time reports and dashboards for lift usage optimisation.
Visitor Management : Capability for integration with visitor management software to provide defined access.
Floor Access : Based on user nature of work in premises floor access will be provided and also some floors like
ground floor will be defined as a free access floor
Time Access : Specific time interval access can be provided to technician for work and even for courier person
Elevator Access Control System
Long range reader is used for parking management and asset tracking system where high range is required to
establish communication between reader and tags.
Features available with long range reader.
• Read range upto 12 meters
• IP 65 for indoor and outdoor use
• Wiegand 26bit for reader compatibility
• Cable length upto 150 meters
• Reader LED used for operational indication
Long range reader is also useful in transport management, car parking and production process.
Long Range Reader For Vehicle Access
Thanks
www.techerasolutions.com Contact No. +91 7021303434

More Related Content

PDF
CCTV Camera Presentation
PPTX
Access Controls
PPTX
Cctv presentation
PPTX
Public Address System
PPTX
Closed Circuit Television(CCTV)
PDF
Access Control Presentation
CCTV Camera Presentation
Access Controls
Cctv presentation
Public Address System
Closed Circuit Television(CCTV)
Access Control Presentation

What's hot (20)

PPTX
Security system
PPTX
PPTX
CCTV Security Cameras - Basics
PPTX
Detailed Study of CCTV Cameras
PDF
Surveillance System, CCTV, BMS
PPT
2. access control
PPTX
Bms system
PPTX
Cctv presentation
PPTX
Perimeter Intrusion Detection System | PIDS | GMAX
PPTX
CCTV Presentation
PPT
Ch07 Access Control Fundamentals
PPTX
Video Surveillance
PDF
Bms system basic
PPTX
The Use Of ELV Systems In Building Security
PPSX
Introduction to cctv_installation_course
PPTX
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
PPTX
Electronic security system
PPT
PPT FOR SECURITY
PPT
Bms for security systems
Security system
CCTV Security Cameras - Basics
Detailed Study of CCTV Cameras
Surveillance System, CCTV, BMS
2. access control
Bms system
Cctv presentation
Perimeter Intrusion Detection System | PIDS | GMAX
CCTV Presentation
Ch07 Access Control Fundamentals
Video Surveillance
Bms system basic
The Use Of ELV Systems In Building Security
Introduction to cctv_installation_course
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Electronic security system
PPT FOR SECURITY
Bms for security systems
Ad

Similar to Access-control-system (20)

PPTX
EMKA-Biometric Presentation
PPTX
Powerpoint Marketing Template
PPTX
Access control system
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
PPTX
Title Door Access Control Systems in Dubai Subtitle Advanced Security Solutio...
PDF
Alliance Compant Presentation
PPT
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
PDF
rfid access control.rfid access controrfid access controll
PDF
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
PDF
access control systems.pdf Physical Security Domains
PDF
Significance of Quality Access Control System for Your Organization Safety
PPTX
Beyond the Cards The Future of Security Systems and Access Control Systems in...
PPTX
Lock it Down: Access Control for IBM i
PPTX
OT Solution Overview.pptx
PDF
Datasheet over privileged_users
PPTX
Computer Security Primer - Eric Vanderburg - JURINNOV
PPTX
Dncybersecurity
PDF
CYB 102 – Fundamentals of Cyber Security .pdf
DOCX
Network and web security
PPTX
finger print based door lock.pptx
EMKA-Biometric Presentation
Powerpoint Marketing Template
Access control system
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Title Door Access Control Systems in Dubai Subtitle Advanced Security Solutio...
Alliance Compant Presentation
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
rfid access control.rfid access controrfid access controll
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
access control systems.pdf Physical Security Domains
Significance of Quality Access Control System for Your Organization Safety
Beyond the Cards The Future of Security Systems and Access Control Systems in...
Lock it Down: Access Control for IBM i
OT Solution Overview.pptx
Datasheet over privileged_users
Computer Security Primer - Eric Vanderburg - JURINNOV
Dncybersecurity
CYB 102 – Fundamentals of Cyber Security .pdf
Network and web security
finger print based door lock.pptx
Ad

Recently uploaded (20)

PPTX
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
PDF
Optimizing bioinformatics applications: a novel approach with human protein d...
PDF
Technical Debt in the AI Coding Era - By Antonio Bianco
PDF
Fitaura: AI & Machine Learning Powered Fitness Tracker
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
PDF
Altius execution marketplace concept.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PPT
Overviiew on Intellectual property right
PDF
Addressing the challenges of harmonizing law and artificial intelligence tech...
PDF
Intravenous drug administration application for pediatric patients via augmen...
PDF
Decision Optimization - From Theory to Practice
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
Chapter 1: computer maintenance and troubleshooting
PPTX
How to use fields_get method in Odoo 18
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
NewMind AI Journal Monthly Chronicles - August 2025
PPTX
How to Convert Tickets Into Sales Opportunity in Odoo 18
PDF
Ebook - The Future of AI A Comprehensive Guide.pdf
Strategic Picks — Prioritising the Right Agentic Use Cases [2/6]
Optimizing bioinformatics applications: a novel approach with human protein d...
Technical Debt in the AI Coding Era - By Antonio Bianco
Fitaura: AI & Machine Learning Powered Fitness Tracker
Build automations faster and more reliably with UiPath ScreenPlay
EGCB_Solar_Project_Presentation_and Finalcial Analysis.pdf
Altius execution marketplace concept.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Overviiew on Intellectual property right
Addressing the challenges of harmonizing law and artificial intelligence tech...
Intravenous drug administration application for pediatric patients via augmen...
Decision Optimization - From Theory to Practice
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
Chapter 1: computer maintenance and troubleshooting
How to use fields_get method in Odoo 18
Connector Corner: Transform Unstructured Documents with Agentic Automation
NewMind AI Journal Monthly Chronicles - August 2025
How to Convert Tickets Into Sales Opportunity in Odoo 18
Ebook - The Future of AI A Comprehensive Guide.pdf

Access-control-system

  • 1. Access Control System 2018 Techera Endeavour Pvt Ltd www.techerasolutions.com Contact No. +91 7021303434
  • 2. Access control systems are the electronic systems that are designed to control access authorization through a network. Access Control System recognizes authenticates and authorizes entry of a person to enter into the premise thereby giving complete protection ensuring security of the premises. Many ACS use network for communication purpose and information is communicated through these networks .ACS helps to connect multiple facility across globe for giving ease of access and security control from single location. Organizations which require high security use different credential systems and one or more credential combinations like bio metric, RFID, door controllers and card readers etc. Each access point may be controlled individually as per the requirement of an organizations. Mainly access control system is divided in two categories 1. External ACS and 2. Internal ACS Both categories of ACS are specific to nature of premises, deployment of internal and external ACS mostly depends upon nature of building and geographic region threat level rating and also upon type of usage. What Is Access Control System ?
  • 3. Some of the reason for access control system deployment in your premises Security : Provide 24 x 7 electronic security irrespective of your premises is open or closed Environment : Many advantage of well deployed and managed ACS • Occupancy and load pattern to increase efficiency • Control of lighting and cooling based on occupancy • Reduce wastage by control of printers Health & Safety : Controlled access to area based on work profile can assist in compliance with health & safety • Limit access to area having hazardous substances • Restrict access to under construction and contaminated area as per safety point. IT : Integrate with access for single point of control • Command and control center for multiple office location • Control single sign on access based upon user location HR & Time and Attendance : • Improve punctuality and reduce unscheduled breaks • Increase efficiency by removing manual time sheets Reason For Access Control System Deployment
  • 4. Access control systems are graded according to the type of business and risk associated, grades applied to protected area and not to the overall system therefore mixed grades may be utilised within premises. Access point grading are mainly classified into four grades Grade1 : Low Risk • Standalone lock or offline system ,internal area where you want to restrict public movement Grade 2 : Low to Medium Risk • On-line system, commercial building and small business offices Grade 3 : Medium to High Risk • On line system using two factor authentication or single factor biometric to prevent access Grade 4 : High Risk • On line system using two factor authentication, one of which should be biometric Security Grading System Risk Classifications
  • 5. • Anti Passback : A feature that traces individual credential access requests to a given area. It checks for granting of access not preceded by granting of egress (or vice versa) to check that the credential has not been “passed back” to another user. Also refer to hard anti - passback, soft anti - passback, logical anti - passback and timed anti- passback. • Soft Anti - Passback : Grants access but generates alert for violation of anti-passback rule • Authentication : A system compare credentials of user with recorded credential for access. • Anti Loiter : A feature that monitors path of the user through a security controlled area and produce path graphical representation • Card Blocked : Removal of access permission for a particular credential • Degrade Mode : In case of an failure of main controller field controller will work independently. • Door Opened Too Long : Alarm for door opened for more than defined time after access to user • Door Forced : Unauthorized opening of an door • Dual Access : For highly secured and unmanned area 2 sequential authorize request is required for access • Fail locked : Securing of an locking mechanism in case of power failure • Fail Open : Release of locking mechanism in case of access system failure / power failure • Free Access : A condition in which door is allowed to be open without any credential (ex. Emergency Evacuation) • Tailgating : A person passes with a person carrying credential • Tamper Detection : Detecting unauthorized interference • Tamper Protection : Protection against deliberate interference Access Control System Features To Look For
  • 6. Number of components used from identification of an person to authorise access. Credentials : • PIN/Code Based access : PIN/Codes are nothing but an numeric digits having 4,5 or 6 characters for access. • Swipe/Token : Cards are used with magnetic strip on reader for access, not fully secured and cards to be changed regularly. • Proximity Cards : Cards having small chip inside for storing details, used for short distance authentication for access, more secured than swipe cards and less wear and tear de to contactless. • RFID Cards : Contact less technology having space which is used for multiple application from 1 card • Mobile Device : NFC and Bluetooth enabled mobile and reader can exchange data for communication which results into authentication for providing access. Types Of Credentials Used In ACS
  • 7. Number of components used from identification of an person to authorise access. Credentials : Biometrics Biometric Verification : This is called as 1:1 comparison by providing PIN, it takes less time since comparison path is defined. Biometric Identification : This technology works on comparing 1:N template and takes time depending upon number of stored templates Available Biometric Technology • Finger Print • Facial Recognition • IRIS • Retina • Hand Geometry • Vein Recognition • Voice Types Of Credentials Used In ACS
  • 8. Access Control Reader & Controller Readers are classified according to functions they perform. Standalone Reader + Keypads : Used for small application involving 1 to 5 doors and decision taken independently. Standalone Reader + Controller : Standalone reader with controller functionality for single independent door, suitable for application ranging from 1 to 10 doors. Online Reader : For online reader access decision is taken by an computer connected to an specific reader for granting access. Offline Reader : In this scenario cards hold the database for access and there is no controller or computer is involved for decision making. Reader & Controller : This kind of system used for reader more than 10 Nos and number of controllers connected to a common software for analysis and reporting this is commonly used for medium to large office scenario. IP Controller : Connected to ACS software via network switch, combination can be ranged from 2/4/8 doors controller Non IP Controller : Also know as Master-Slave controller configuration, master controller is connected to an ACS software Controller is nothing but a gateway between reader and software for decision making. Controller is connected to PC having ACS software, alarm events and other information is exchanged between controller connected to an common network through a common software. Controller can worked in offline mode as of when system is down and transaction can be recorder and synced back when system is up.
  • 9. Access cards are access key to your premises, by using access control cards you can access granted access as per your nature of work within premises. Access cards are very useful to an security officer where he can defined user specific door access to keep security check all time and also trace path of usage by an user. Two types of card technology is available. 1. Prox Cards : Proximity cards comes in wide range of styles A. Standard Prox Card B. Composite Prox Card C. Clamshell Prox Card D. Magnetic Strip Card E. Prox Cards Adhesive Tags F. Corporate 1000 G. Prox Card Key Fobs H. Prox Cards for Printing 2. Smart Cards : One difference between smart card and prox card,smart can read and write data which allows them to use for wider range of applications. A. iCLASS Cards B. MIFARE Cards About ACS Cards Technology
  • 10. Web based access control system is an enterprise grade software which controls and manages entire system from any where in the world and at any time earlier ACS software were mainly used for reporting and time and attendance but now many functionality can be taken on ACS software for ease of employee and service management. Key Features Of Access Control Software • Real Time Monitoring and control of doors from single window • Web based software for live connectivity and door status • User profile creation from any location on connected platform • Ease of enrolment from USB based enrolment station • Device configuration for any addition of hardware in network • Export and import data from 3rd part software • Seamless integration using API platform • Auto device authentication • Scalability of users and addition of application modules. • Easy backup and restore functionality. ACS Software – Web Based
  • 11. Multilocation access control system where below 4 location across the globe is connected on a common WAN and server placed at any location can manage complete ACS operation. Multi-Location ACS Lan Point Controller Reader Mumbai Office Delhi Office US Office UK Office ACS Server Any Location
  • 12. Elevator access control is mainly used for premises where controlled access is to be provided. Deployed access control should be user friendly and flexible and also easily integrated with conventional elevators and destination control systems. Features offered from Elevator Access control system. Scalability : System should be scalable to any number of floors and multiple buildings with highspeed. Integration Capability : System should support any credentials and also available lift brands Reports & Dashboards : Should provide real time reports and dashboards for lift usage optimisation. Visitor Management : Capability for integration with visitor management software to provide defined access. Floor Access : Based on user nature of work in premises floor access will be provided and also some floors like ground floor will be defined as a free access floor Time Access : Specific time interval access can be provided to technician for work and even for courier person Elevator Access Control System
  • 13. Long range reader is used for parking management and asset tracking system where high range is required to establish communication between reader and tags. Features available with long range reader. • Read range upto 12 meters • IP 65 for indoor and outdoor use • Wiegand 26bit for reader compatibility • Cable length upto 150 meters • Reader LED used for operational indication Long range reader is also useful in transport management, car parking and production process. Long Range Reader For Vehicle Access