ACCESS CONTROL DEVICES


Pawankalyan1029

Uploaded on Mar 3, 2022

Access control systems provide end-to-end control on who can be allowed and who cannot be allowed to enter the office or premises. Access control systems authorize, recognize and authenticate entry of people/staff into the premises.

Comments

                     

ACCESS CONTROL DEVICES

ACCESS CONTROL DEVICES Agenda I N T R O D U C T I O N M O D E L S O F A C C E S S C O N T R O L A C C E S S C O N T R O L M A T R I X A D V A N T A G E S 2 I N T R O D U C T I O N  Access control systems provide end-to-end control on who can be allowed and who cannot be allowed to enter the office or premises. Access control systems authorize, recognize and authenticate entry of people/staff into the premises. Beneficially, the access control system not only tracks and records data of visitors and employees, but also helps in integrating the payroll software, to produce automated and system generated attendance system. Each access control system biometric helps in saving time and resources that happens with the manual attendance system, and increases the productivity and profitability of the organization. The proximity access control system deployed in offices and factories allow for time zone settings, and ensure an absolute safety environment. 3 Getting started with access control can be overwhelming at first with so many technical terms and things to wrap your head around. But understanding access control systems is really an achievable goal - especially after reading this guide. This is really a 101 crash course guide for access control systems. If you want to get a relatively quick idea of how access control works, you’ve come to the right place. Why do we need access control? The purpose of access control is to provide quick, convenient access control for authorized persons, while at the same time, restricting access for unauthorized people. Here are more reasons why access control is playing a significant role in your organization: Access Control Infrastructure Access Control infrastructure is to most people the most mysterious aspect of access control systems. Obviously there are electronic locks installed - but what most people don’t know: Those locks are all centrally wired to your IT room. This means: A power or signal cable runs from the lock through the walls into your IT room where the access control panel sits. The access control panel gives the lock the signal to unlock when it receives the request to do so by the card reader. There are different topologies (as people call it) but for the basic understanding of access control systems let’s just assume this described flow for now. 4 MODELS OF ACCESS CONTROL MODELS OF ACCESS CONTROL Access Cards Electromagnetic Lock   A plastic card which contains a magnetic   A card which stores the data in a magnetic strip or strip or a chip  a chip. This type of card sometimes called as swiping card.  It contains encoded data that is read by passing the card through or over an  Electromagnetic locks are used to secure the electronic device, used to provide access to door in conjunction with push bars, request-to- restricted or secure areas or systems. exit devices or credential readers for fail-safe applications when code compliance permits. 5 MODELS OF ACCESS CONTROL MODELS OF ACCESS CONTROL Proximity Access Control R Biometric Access Control Rea Bio Proximity Time and Atte eader der ndance System • Proximity is a wireless A device that reads the  A device which stores technology, which can identity of a person by employee’s daily easily read the data from comparing some attribute attendance via fingerprints. the near by card to of their physiological being This will helps the interact with each other or behavioral traits against organization to track the wirelessly. This systems a sample database is called attendance of its employee will  run on low- a Biometric Reader.  systematically frequency RFID 6 technology. ACCESS CONTROL MATRIX ACCESS CONTROL MATRIX  Instantaneous protection state of a system  Dynamically Changing!  How can we extend this model? Objects A B C D alice 0 0 1 0 bob subjects 1 1 0 1 charlie 0 0 1 0 dave 1 1 0 1 F O R M O R E D E T A I L S 9 8 8 5 8 8 8 8 3 5 s e o @ b r i h a s p a t h i . c o m THANK YOU