You are on page 1of 7

Access Control Presentation

What is access control? – Access control is a technology in which electronic logic is used
to control physical access. This electronic logic is also known as “relay”. The function of
the relay itself depends on the physical characteristics to be used. What are these physical
characteristics? The physical characteristics are readable features in an object. E.g.
numerical values, fingerprint, veins, retina, iris, face, voice, DNA e.t.c. Physical
Characteristics are of two categories, they are 1. Biological, 2. Non Biological.
Biological characteristics are the characteristics that can be found in human being e.g.
fingerprint, veins, retina, iris, face, voice, DNA e.t.c. while Non Biological
Characteristics are those that can not be found in human being e.g. numerical values, bar
codes, alphabets e.t.c. As a result of this, an access control in which a biological
characteristics is used by they relay as means of controlling physical access is known as
“biometric access control”. An access control in which a non biological characteristics is
used by the relay to control physical access is known as non biometric access control.
The function of any access control system is based on the following fundamental
questions:
1. WHO ARE YOU?
2. WHAT DO YOU KNOW?
3. WHAT DO YOU HAVE?

The question “who are you” means you should present your biological characteristics
before access can be granted e.g. fingerprint only
The question “what do you know” means you should type your PIN/ password before
access can be granted. i.e PIN or password only

The question “what do you have” means you should present your card before access can
be granted. i.e. card only
Access control system is made up of three major components. These components are
1. Controller
2. Reader
3. Lock
4. Power Supply

Controller plays the most important role in access control system in the sense that it
registers the users, it carries out it’s function according to how it is being programmed, it
disseminates information to the readers, verify and do the final authentication when the
need arises.

Reader also play a major role in access control system in terms of receiving information/
data and send it to the controller for verification, identification and authentication.
Controllers are of two categories:

1. Biometric Controllers
2. Non Biometric Controllers
Biometric Controllers are controllers that are capable of making use of biological
characteristics to control physical access. Examples of these controllers are LX007A,
LX007SR. FINGER007A, FINGER007SR, FGR007A, FGR007SR, LX006, FACE007
LX505, 505R, VIEW005 E.T.C

Non Biometric Controllers are those that can only make use of non biological
characteristics to control physical access. Example of these controllers are RFL200,
RFL200C, IP-RFL200, PIN120, IP100R, 100R, PIN120W, 100W E.T.C.

Access control readers are also of two categories:


1. Biometric Readers
2. Non Biometric Readers
Biometric Readers are readers that are capable of accepting biological characteristics as
information or data to control physical access. Example of these readers are FGR006,
FACE006

Non Biometric Readers are those that can only accept non biological characteristics as
data or information to control physical access. Examples of these readers are RF10,
RF20, RF30, RF50, RFTINY, IP10,IP20,IP30,IPK101;SR10,SR20,SR30,SRK101 e.t.c.

Advantages of Biometrics Access Control


• Dual function of access control and time & attendance
• Contactless Smart Card, PIN and Fingerprint
• Auto touch sensor for fingerprint only identification
• Anti-Pass Back
• Authentication time 3sec

Disadvantages of Biometric Access Control


• The operation is very complex
Advantages of Non Biometric Access Control
• Direct control of door lock
• Stand alone/ 512 users including one master card
• Power fail safe or power fail secure selectable
• Operation is very simple

Disadvantages of Non Biometric Access Control


• Only basic time& attendance can be achieved
• Low security complexity

Access Control could also be inform of Stand Alone or Networked


• Stand Alone Access Control systems are systems that carries out their operation
on their own and not connected to any external computer. In this system, no
software is required and no report can be generated. Their function is limited to
what they can do on their own as a stand alone.
• Networked Access Control systems are systems that carries out their operation in
a more complex form due to the fact that a software is required together with an
external computer. Features like time & attendance, event reports, alarm reports,
uploads of users comprehensive data and other complex security measures can be
achieved. Here, as many as possible systems can be on the same network
(LAN/WAN) and they can be managed effectively and successfully.
Time & Attendance
This is a branch of technology that uses electronic logic to manage events and time. This
technology manages a particular event at a particular period of time. It calculates the total
time the employee spent at work per day excluding the time stipulated for break time, it
calculates the total number of times an employee clocks in and clocks out per day. All
these are used to calculate number of hours spent at work per month but, in accordance
with the company’s rules and regulations. The following are events that can be managed
by this technology:
• Overtime
• Shifts
• Holidays
• Total time spent at work per day
• Minimum number of working hours in a month
• Time schedule
• Pay rule

The function of this technology depends on the application software to use.


STARWATCH TIME PRO software provides a complete time & attendance solution that
one could ever imagine. The features of STARWATCH TIME PRO software are:
• Work type management
• Work type Definition
• Time & Attendance Reader Group Definition
• Shift Time and Attendance
• Break Time Definition
• Function Key Definition
• Meal Time Management
• Overtime Work Management
• Pay Rule Setting
• Manage Time and Attendance Statistical Data
• User Design Report
• Remote Monitoring Function
• Reports on the web browser to review and to print

You might also like