SlideShare a Scribd company logo
1 of 12
The BasicsThe Basics
As a result of increased security awareness, there
has been a move away from the traditional key
and lock systems to more sophisticated access
control systems. The technology used in access
control systems ranges from simple push-button
locks to computerized access control systems
integrated with video surveillance systems.
Regardless of the technology used, all access
control systems have one primary objective —
they are designed to screen or identify
individuals prior to allowing entry. Since
identification is the foundation of all access
control systems, they generally require that the
user be in possession of an identification
credential.
THE BASICSTHE BASICS
Reader
Controller
Door Lock
RTE
Door Contact
(On Secure Side)
The BasicsThe Basics
TYPES OF ACCESS CONTROL SYSTEMS.
Access control systems can be either of
the stand-alone type or the multiple-portal
type. While each type may perform
essentially the same functions, stand-
alone systems are limited in data storage
and system features.
The BasicsThe Basics
Access control systems can range from a
small, relatively simple one-door system to
highly complex, computer-operated systems
capable of handling hundreds of doors and
tens of thousands of individually encoded
identification credentials. A basic system
usually consists of the following:
1. a central processing unit (CPU),
2. a input device at each protected door,
3. a identification credential assigned to each
user.
4. and a locking device.
The BasicsThe Basics
A printer is often included to provide a record
of all activity. The CPU is the brains of the
system and is programmed with data on
each user. The data can include an access
level, which determines which doors may be
entered by the user, and time zones, which
define the hours of the day and days of the
week a user may enter a door at a particular
access level.
The BasicsThe Basics
IN GENERAL. When the identification credential
is presented to the reader, the requester’s
identification number is relayed to the CPU.
The requester’s access level and time zone
are instantly checked by the computer. For a
valid identification, the door lock, which can
be an electronic or electro-magnetic lock or
an electric strike, is released. If entry is
attempted with a card that is not valid or if a
card is used outside of its authorized time
zone or at an unauthorized door, entry is
denied, and an alarm is immediately
generated.
The BasicsThe Basics
Reader types are either swipe, in which the
card is passed along an open slot; insertion,
in which the card is pushed into the reader
and withdrawn; or proximity, which requires
that the card be moved within a certain
distance of the reader.
The BasicsThe Basics
In some card access control systems,
improved security is achieved by requiring
the user to present the card to a reader, as
well as enter a unique passcode, a personal
identification number (PIN), on a keypad.
With this enhancement, the loss of a card will
not compromise the system, since an
unauthorized user would also need to know
the PIN. The added security afforded by the
card/PIN combination more than offsets the
delay that results from the user having to
enter a PIN.
The BasicsThe Basics
CARD TECHNOLOGIES. There are at least nine
different card-encoding technologies
available: 1. Magnetic stripe,
2. Wiegand,
3. Proximity,
4. Barium ferrite,
5. Infrared,
6. Bar code,
7. Hollerith,
8. “Smart” card,
9. Optical storage.
The BasicsThe Basics
To the basic four parts of the system we next
need to look at “the add-ons” that complete
the system. We, up to this point, have been
dealing with “getting in”. Now how do you
get back out of the controlled area?
There are as many types of RTE devices as
there is types of I.D. technologies to gain
entrance. These fall into two basic groups:
1. RTE buttons
2. another reader to enter your card again to
leave
The BasicsThe Basics
OK! We have now designed a basic access
system, it has the entry reader, processer,
locking device, and RTE device, the person
gaining entry has the I.D. device. NOW when
we say the person has the I.D. device, that
device could be as simple as a numerical
code to enter on a keypad, it does not have
to be a physical device like a card or fob.
The BasicsThe Basics
Now let’s look at some other items that are
normally included in a access control
system.
1. Door ajar alarm
2. Forced door alarm
3. Clock timing device (for restricting entry
to specific times of the day)
4. Duress alarm (a different code to enter
that lets someone enter but alerts the
security personnel that they are being forced
by a second person).
5. Integration with CCTV, burglar and fire
alarm systems for a complete security
system

More Related Content

What's hot

Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security AssessmentsTom Eston
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic conceptsKhoa Nguyen
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System SecurityAdel Barkam
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threatzhihaochen
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
Operational Security
Operational SecurityOperational Security
Operational SecuritySplunk
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 

What's hot (20)

Security system
Security systemSecurity system
Security system
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Physical security-system
Physical security-systemPhysical security-system
Physical security-system
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Network security - Basic concepts
Network security - Basic conceptsNetwork security - Basic concepts
Network security - Basic concepts
 
Physical Security.pptx
Physical Security.pptxPhysical Security.pptx
Physical Security.pptx
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Physical security
Physical securityPhysical security
Physical security
 
Social engineering
Social engineering Social engineering
Social engineering
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Access Controls
Access ControlsAccess Controls
Access Controls
 
Ch07 Access Control Fundamentals
Ch07 Access Control FundamentalsCh07 Access Control Fundamentals
Ch07 Access Control Fundamentals
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Operational Security
Operational SecurityOperational Security
Operational Security
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 

Viewers also liked

kemach foundation 11/2015
kemach foundation 11/2015kemach foundation 11/2015
kemach foundation 11/2015Shraga Klar
 
права ребенка
права ребенкаправа ребенка
права ребенкаvr883
 
Fiber optics 2-7
Fiber optics 2-7Fiber optics 2-7
Fiber optics 2-7grantlerc
 
FirelightProjectExperience
FirelightProjectExperienceFirelightProjectExperience
FirelightProjectExperienceTabitha Steager
 
Beyond Numbers_Al Nahar TV_Boycott campaign_Digital media impact
Beyond Numbers_Al Nahar TV_Boycott campaign_Digital media impactBeyond Numbers_Al Nahar TV_Boycott campaign_Digital media impact
Beyond Numbers_Al Nahar TV_Boycott campaign_Digital media impactBeyond Numbers
 
Panduan login ms outlook
Panduan login ms outlookPanduan login ms outlook
Panduan login ms outlookMarliana
 
NEHF Happy, Healthy, at Home symposium 100117 Workshop 3 - R-Outcomes
NEHF Happy, Healthy, at Home symposium 100117   Workshop 3 - R-OutcomesNEHF Happy, Healthy, at Home symposium 100117   Workshop 3 - R-Outcomes
NEHF Happy, Healthy, at Home symposium 100117 Workshop 3 - R-OutcomesHealth Innovation Wessex
 
Raipur Hoists Tallest Flag - Social Media Summary Report
Raipur Hoists Tallest Flag - Social Media Summary ReportRaipur Hoists Tallest Flag - Social Media Summary Report
Raipur Hoists Tallest Flag - Social Media Summary ReportAadeep Bhatia
 
Nuestro planeta PMR
Nuestro planeta PMRNuestro planeta PMR
Nuestro planeta PMRPaulaMR99
 
Odiun understanding oracle data integrator
Odiun understanding oracle data integratorOdiun understanding oracle data integrator
Odiun understanding oracle data integratorgutiejun
 
Question 4 media evalua tion
Question 4 media evalua tionQuestion 4 media evalua tion
Question 4 media evalua tionlibbyardley
 
Mb0051 legal aspects of business
Mb0051 legal aspects of businessMb0051 legal aspects of business
Mb0051 legal aspects of businessconsult4solutions
 
Debt 2016 e-book
Debt 2016 e-bookDebt 2016 e-book
Debt 2016 e-bookMarc Lef
 
Tarea del seminario 8
Tarea del seminario 8Tarea del seminario 8
Tarea del seminario 8mariamf_93
 
Simphony Solutions Profile
Simphony Solutions ProfileSimphony Solutions Profile
Simphony Solutions ProfileVasudha Mohan
 
Syria-Medical Crisis-DE 29-04-2015 Hammer Forum
Syria-Medical Crisis-DE 29-04-2015 Hammer ForumSyria-Medical Crisis-DE 29-04-2015 Hammer Forum
Syria-Medical Crisis-DE 29-04-2015 Hammer ForumAmmar Zakaria
 

Viewers also liked (20)

kemach foundation 11/2015
kemach foundation 11/2015kemach foundation 11/2015
kemach foundation 11/2015
 
Oana cuzino
Oana cuzinoOana cuzino
Oana cuzino
 
права ребенка
права ребенкаправа ребенка
права ребенка
 
Fiber optics 2-7
Fiber optics 2-7Fiber optics 2-7
Fiber optics 2-7
 
FirelightProjectExperience
FirelightProjectExperienceFirelightProjectExperience
FirelightProjectExperience
 
Beyond Numbers_Al Nahar TV_Boycott campaign_Digital media impact
Beyond Numbers_Al Nahar TV_Boycott campaign_Digital media impactBeyond Numbers_Al Nahar TV_Boycott campaign_Digital media impact
Beyond Numbers_Al Nahar TV_Boycott campaign_Digital media impact
 
Panduan login ms outlook
Panduan login ms outlookPanduan login ms outlook
Panduan login ms outlook
 
NEHF Happy, Healthy, at Home symposium 100117 Workshop 3 - R-Outcomes
NEHF Happy, Healthy, at Home symposium 100117   Workshop 3 - R-OutcomesNEHF Happy, Healthy, at Home symposium 100117   Workshop 3 - R-Outcomes
NEHF Happy, Healthy, at Home symposium 100117 Workshop 3 - R-Outcomes
 
Clarin centro k-español_CEDI 2016
Clarin centro k-español_CEDI 2016Clarin centro k-español_CEDI 2016
Clarin centro k-español_CEDI 2016
 
Raipur Hoists Tallest Flag - Social Media Summary Report
Raipur Hoists Tallest Flag - Social Media Summary ReportRaipur Hoists Tallest Flag - Social Media Summary Report
Raipur Hoists Tallest Flag - Social Media Summary Report
 
Nuestro planeta PMR
Nuestro planeta PMRNuestro planeta PMR
Nuestro planeta PMR
 
Odiun understanding oracle data integrator
Odiun understanding oracle data integratorOdiun understanding oracle data integrator
Odiun understanding oracle data integrator
 
Question 4 media evalua tion
Question 4 media evalua tionQuestion 4 media evalua tion
Question 4 media evalua tion
 
Mb0051 legal aspects of business
Mb0051 legal aspects of businessMb0051 legal aspects of business
Mb0051 legal aspects of business
 
Debt 2016 e-book
Debt 2016 e-bookDebt 2016 e-book
Debt 2016 e-book
 
営業のご提案
営業のご提案営業のご提案
営業のご提案
 
Bab 5
Bab 5Bab 5
Bab 5
 
Tarea del seminario 8
Tarea del seminario 8Tarea del seminario 8
Tarea del seminario 8
 
Simphony Solutions Profile
Simphony Solutions ProfileSimphony Solutions Profile
Simphony Solutions Profile
 
Syria-Medical Crisis-DE 29-04-2015 Hammer Forum
Syria-Medical Crisis-DE 29-04-2015 Hammer ForumSyria-Medical Crisis-DE 29-04-2015 Hammer Forum
Syria-Medical Crisis-DE 29-04-2015 Hammer Forum
 

Similar to Access control basics-2

Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3grantlerc
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elcMohitKataria15
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET Journal
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...ASHOKKUMAR RAMAR
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric PresentationDarrell Smith
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Automated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docxAutomated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docxAkmadAliAbdul1
 
Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelAnant Patel
 
Sushil Shinde - Copy
Sushil Shinde - CopySushil Shinde - Copy
Sushil Shinde - CopyAkshit Shah
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 

Similar to Access control basics-2 (20)

Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elc
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
 
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...ARM 7 FINGER PRINT PROJECTS ABSTRACT-  biometric fingerprint identification w...
ARM 7 FINGER PRINT PROJECTS ABSTRACT- biometric fingerprint identification w...
 
N044057478
N044057478N044057478
N044057478
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Sdfgh
SdfghSdfgh
Sdfgh
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Automated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docxAutomated Door Lock System using Arduino Uno Chapter 1-5.docx
Automated Door Lock System using Arduino Uno Chapter 1-5.docx
 
Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Sushil Shinde - Copy
Sushil Shinde - CopySushil Shinde - Copy
Sushil Shinde - Copy
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 

More from grantlerc

Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...grantlerc
 
Fire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systemsFire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systemsgrantlerc
 
Fire alarm 3-d-supervising_station_alarm_system
Fire alarm 3-d-supervising_station_alarm_systemFire alarm 3-d-supervising_station_alarm_system
Fire alarm 3-d-supervising_station_alarm_systemgrantlerc
 
Fire alarm 3-b-protected_premises_fire_alarm_system
Fire alarm 3-b-protected_premises_fire_alarm_systemFire alarm 3-b-protected_premises_fire_alarm_system
Fire alarm 3-b-protected_premises_fire_alarm_systemgrantlerc
 
Fire alarm 3-a-emergency_control_functions
Fire alarm 3-a-emergency_control_functionsFire alarm 3-a-emergency_control_functions
Fire alarm 3-a-emergency_control_functionsgrantlerc
 
Fire alarm basics 1-6
Fire alarm basics 1-6Fire alarm basics 1-6
Fire alarm basics 1-6grantlerc
 
Fire alarm basics 1-5
Fire alarm basics 1-5Fire alarm basics 1-5
Fire alarm basics 1-5grantlerc
 
Fire alarm 2_f_manual supervisory
Fire alarm 2_f_manual supervisoryFire alarm 2_f_manual supervisory
Fire alarm 2_f_manual supervisorygrantlerc
 
Fire alarm 2_e_combination
Fire alarm 2_e_combinationFire alarm 2_e_combination
Fire alarm 2_e_combinationgrantlerc
 
Fire alarm 2_d_radiant energy detectors
Fire alarm 2_d_radiant energy detectorsFire alarm 2_d_radiant energy detectors
Fire alarm 2_d_radiant energy detectorsgrantlerc
 
Fire alarm 2_c_smoke detectors
Fire alarm 2_c_smoke detectorsFire alarm 2_c_smoke detectors
Fire alarm 2_c_smoke detectorsgrantlerc
 
Fire alarm 2_b_heat detectors
Fire alarm 2_b_heat detectorsFire alarm 2_b_heat detectors
Fire alarm 2_b_heat detectorsgrantlerc
 
Fire alarm 2_a_initiation basics
Fire alarm 2_a_initiation basicsFire alarm 2_a_initiation basics
Fire alarm 2_a_initiation basicsgrantlerc
 
Fire basics 1-4-risers_thru_power_supplies_08
Fire basics 1-4-risers_thru_power_supplies_08Fire basics 1-4-risers_thru_power_supplies_08
Fire basics 1-4-risers_thru_power_supplies_08grantlerc
 
Fire basics 1-3-functions_to_docs_08
Fire basics 1-3-functions_to_docs_08Fire basics 1-3-functions_to_docs_08
Fire basics 1-3-functions_to_docs_08grantlerc
 
Fire basics 1-2-the_nec_11
Fire basics 1-2-the_nec_11Fire basics 1-2-the_nec_11
Fire basics 1-2-the_nec_11grantlerc
 
Fire basics 1-1-fundamentals
Fire basics 1-1-fundamentalsFire basics 1-1-fundamentals
Fire basics 1-1-fundamentalsgrantlerc
 
Fiber optics 2-6
Fiber optics 2-6Fiber optics 2-6
Fiber optics 2-6grantlerc
 
Fiber optics 2-5
Fiber optics 2-5Fiber optics 2-5
Fiber optics 2-5grantlerc
 
Fiber optics 2-4
Fiber optics 2-4Fiber optics 2-4
Fiber optics 2-4grantlerc
 

More from grantlerc (20)

Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
Fire alarm 3-f-single_and_multiple-station_alarms_and_household_fire_alarm_sy...
 
Fire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systemsFire alarm 3-e-public_emergency_alarm_reporting_systems
Fire alarm 3-e-public_emergency_alarm_reporting_systems
 
Fire alarm 3-d-supervising_station_alarm_system
Fire alarm 3-d-supervising_station_alarm_systemFire alarm 3-d-supervising_station_alarm_system
Fire alarm 3-d-supervising_station_alarm_system
 
Fire alarm 3-b-protected_premises_fire_alarm_system
Fire alarm 3-b-protected_premises_fire_alarm_systemFire alarm 3-b-protected_premises_fire_alarm_system
Fire alarm 3-b-protected_premises_fire_alarm_system
 
Fire alarm 3-a-emergency_control_functions
Fire alarm 3-a-emergency_control_functionsFire alarm 3-a-emergency_control_functions
Fire alarm 3-a-emergency_control_functions
 
Fire alarm basics 1-6
Fire alarm basics 1-6Fire alarm basics 1-6
Fire alarm basics 1-6
 
Fire alarm basics 1-5
Fire alarm basics 1-5Fire alarm basics 1-5
Fire alarm basics 1-5
 
Fire alarm 2_f_manual supervisory
Fire alarm 2_f_manual supervisoryFire alarm 2_f_manual supervisory
Fire alarm 2_f_manual supervisory
 
Fire alarm 2_e_combination
Fire alarm 2_e_combinationFire alarm 2_e_combination
Fire alarm 2_e_combination
 
Fire alarm 2_d_radiant energy detectors
Fire alarm 2_d_radiant energy detectorsFire alarm 2_d_radiant energy detectors
Fire alarm 2_d_radiant energy detectors
 
Fire alarm 2_c_smoke detectors
Fire alarm 2_c_smoke detectorsFire alarm 2_c_smoke detectors
Fire alarm 2_c_smoke detectors
 
Fire alarm 2_b_heat detectors
Fire alarm 2_b_heat detectorsFire alarm 2_b_heat detectors
Fire alarm 2_b_heat detectors
 
Fire alarm 2_a_initiation basics
Fire alarm 2_a_initiation basicsFire alarm 2_a_initiation basics
Fire alarm 2_a_initiation basics
 
Fire basics 1-4-risers_thru_power_supplies_08
Fire basics 1-4-risers_thru_power_supplies_08Fire basics 1-4-risers_thru_power_supplies_08
Fire basics 1-4-risers_thru_power_supplies_08
 
Fire basics 1-3-functions_to_docs_08
Fire basics 1-3-functions_to_docs_08Fire basics 1-3-functions_to_docs_08
Fire basics 1-3-functions_to_docs_08
 
Fire basics 1-2-the_nec_11
Fire basics 1-2-the_nec_11Fire basics 1-2-the_nec_11
Fire basics 1-2-the_nec_11
 
Fire basics 1-1-fundamentals
Fire basics 1-1-fundamentalsFire basics 1-1-fundamentals
Fire basics 1-1-fundamentals
 
Fiber optics 2-6
Fiber optics 2-6Fiber optics 2-6
Fiber optics 2-6
 
Fiber optics 2-5
Fiber optics 2-5Fiber optics 2-5
Fiber optics 2-5
 
Fiber optics 2-4
Fiber optics 2-4Fiber optics 2-4
Fiber optics 2-4
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 

Access control basics-2

  • 1. The BasicsThe Basics As a result of increased security awareness, there has been a move away from the traditional key and lock systems to more sophisticated access control systems. The technology used in access control systems ranges from simple push-button locks to computerized access control systems integrated with video surveillance systems. Regardless of the technology used, all access control systems have one primary objective — they are designed to screen or identify individuals prior to allowing entry. Since identification is the foundation of all access control systems, they generally require that the user be in possession of an identification credential.
  • 2. THE BASICSTHE BASICS Reader Controller Door Lock RTE Door Contact (On Secure Side)
  • 3. The BasicsThe Basics TYPES OF ACCESS CONTROL SYSTEMS. Access control systems can be either of the stand-alone type or the multiple-portal type. While each type may perform essentially the same functions, stand- alone systems are limited in data storage and system features.
  • 4. The BasicsThe Basics Access control systems can range from a small, relatively simple one-door system to highly complex, computer-operated systems capable of handling hundreds of doors and tens of thousands of individually encoded identification credentials. A basic system usually consists of the following: 1. a central processing unit (CPU), 2. a input device at each protected door, 3. a identification credential assigned to each user. 4. and a locking device.
  • 5. The BasicsThe Basics A printer is often included to provide a record of all activity. The CPU is the brains of the system and is programmed with data on each user. The data can include an access level, which determines which doors may be entered by the user, and time zones, which define the hours of the day and days of the week a user may enter a door at a particular access level.
  • 6. The BasicsThe Basics IN GENERAL. When the identification credential is presented to the reader, the requester’s identification number is relayed to the CPU. The requester’s access level and time zone are instantly checked by the computer. For a valid identification, the door lock, which can be an electronic or electro-magnetic lock or an electric strike, is released. If entry is attempted with a card that is not valid or if a card is used outside of its authorized time zone or at an unauthorized door, entry is denied, and an alarm is immediately generated.
  • 7. The BasicsThe Basics Reader types are either swipe, in which the card is passed along an open slot; insertion, in which the card is pushed into the reader and withdrawn; or proximity, which requires that the card be moved within a certain distance of the reader.
  • 8. The BasicsThe Basics In some card access control systems, improved security is achieved by requiring the user to present the card to a reader, as well as enter a unique passcode, a personal identification number (PIN), on a keypad. With this enhancement, the loss of a card will not compromise the system, since an unauthorized user would also need to know the PIN. The added security afforded by the card/PIN combination more than offsets the delay that results from the user having to enter a PIN.
  • 9. The BasicsThe Basics CARD TECHNOLOGIES. There are at least nine different card-encoding technologies available: 1. Magnetic stripe, 2. Wiegand, 3. Proximity, 4. Barium ferrite, 5. Infrared, 6. Bar code, 7. Hollerith, 8. “Smart” card, 9. Optical storage.
  • 10. The BasicsThe Basics To the basic four parts of the system we next need to look at “the add-ons” that complete the system. We, up to this point, have been dealing with “getting in”. Now how do you get back out of the controlled area? There are as many types of RTE devices as there is types of I.D. technologies to gain entrance. These fall into two basic groups: 1. RTE buttons 2. another reader to enter your card again to leave
  • 11. The BasicsThe Basics OK! We have now designed a basic access system, it has the entry reader, processer, locking device, and RTE device, the person gaining entry has the I.D. device. NOW when we say the person has the I.D. device, that device could be as simple as a numerical code to enter on a keypad, it does not have to be a physical device like a card or fob.
  • 12. The BasicsThe Basics Now let’s look at some other items that are normally included in a access control system. 1. Door ajar alarm 2. Forced door alarm 3. Clock timing device (for restricting entry to specific times of the day) 4. Duress alarm (a different code to enter that lets someone enter but alerts the security personnel that they are being forced by a second person). 5. Integration with CCTV, burglar and fire alarm systems for a complete security system