Title: ACCESS CONTROL DEVICES
1ACCESS CONTROL DEVICES
2Agenda
- INTRODUCTION
- MODELS OF ACCESS CONTROL
- ACCESS CONTROL MATRIX
- ADVANTAGES
3- Access control systems provide end-to-end control
on who can be allowed and who cannot be allowed
to enter the office or premises. Access control
systems authorize, recognize and authenticate
entry of people/staff into the premises.
Beneficially, the access control system not only
tracks and records data of visitors and
employees, but also helps in integrating the
payroll software, to produce automated and system
generated attendance system. Each access control
system biometric helps in saving time and
resources that happens with the manual attendance
system, and increases the productivity and
profitability of the organization. The proximity
access control system deployed in offices and
factories allow for time zone settings, and
ensure an absolute safety environment.
4Getting started with access control can be
overwhelming at first with so many technical
terms and things to wrap your head around. But
understanding access control systems is really an
achievable goal - especially after reading this
guide. This is really a 101 crash course guide
for access control systems. If you want to get a
relatively quick idea of how access control
works, youve come to the right place.
Why do we need access control? The purpose of
access control is to provide quick, convenient
access control for authorized persons, while at
the same time, restricting access for
unauthorized people. Here are more reasons why
access control is playing a significant role in
your organization
Access Control Infrastructure Access Control
infrastructure is to most people the most
mysterious aspect of access control systems.
Obviously there are electronic locks installed -
but what most people dont know Those locks are
all centrally wired to your IT room. This means
A power or signal cable runs from the lock
through the walls into your IT room where the
access control panel sits. The access control
panel gives the lock the signal to unlock when it
receives the request to do so by the card reader.
There are different topologies (as people call
it) but for the basic understanding of access
control systems lets just assume this described
flow for now.
5MODELS OF ACCESS CONTROL
- A plastic card which contains a magnetic strip
or a chip - It contains encoded data that is read by passing
the card through or over an electronic device,
used to provide access to restricted or secure
areas or systems.
- A card which stores the data in a magnetic
strip or a chip. This type of card sometimes
called as swiping card. - Electromagnetic locks are used to secure the door
in conjunction with push bars, request-to-exit
devices or credential readers for fail-safe
applications when code compliance permits.
6MODELS OF ACCESS CONTROL
Proximity Access Control Reader
Biometric Access Control Reader
Bio Proximity Time and Attendance System
- Proximity is a wireless technology, which can
easily read the data from the near by card to
interact with each other wirelessly. This systems
will run on low-frequency RFID technology.
A device that reads the identity of a person by
comparing some attribute of their physiological
being or behavioral traits against a sample
database is called a Biometric Reader.
A device which stores employees daily
attendance via fingerprints. This will helps the
organization to track the attendance of its
employee systematically
7 ACCESS CONTROL MATRIX
- Instantaneous protection state of a system
- Dynamically Changing!
- How can we extend this model?
Objects
A
B
C
D
0 0 1 0
1 1 0 1
0 0 1 0
1 1 0 1
alice
bob
subjects
charlie
dave
8THANK YOU