ACCESS CONTROL DEVICES - PowerPoint PPT Presentation

About This Presentation
Title:

ACCESS CONTROL DEVICES

Description:

Access control systems provide end-to-end control on who can be allowed and who cannot be allowed to enter the office or premises. Access control systems authorize, recognize and authenticate entry of people/staff into the premises. – PowerPoint PPT presentation

Number of Views:64

less

Transcript and Presenter's Notes

Title: ACCESS CONTROL DEVICES


1
ACCESS CONTROL DEVICES
2
Agenda
  • INTRODUCTION
  • MODELS OF ACCESS CONTROL
  • ACCESS CONTROL MATRIX
  • ADVANTAGES

3
  • INTRODUCTION
  • Access control systems provide end-to-end control
    on who can be allowed and who cannot be allowed
    to enter the office or premises. Access control
    systems authorize, recognize and authenticate
    entry of people/staff into the premises.

Beneficially, the access control system not only
tracks and records data of visitors and
employees, but also helps in integrating the
payroll software, to produce automated and system
generated attendance system. Each access control
system biometric helps in saving time and
resources that happens with the manual attendance
system, and increases the productivity and
profitability of the organization. The proximity
access control system deployed in offices and
factories allow for time zone settings, and
ensure an absolute safety environment.
4
Getting started with access control can be
overwhelming at first with so many technical
terms and things to wrap your head around. But
understanding access control systems is really an
achievable goal - especially after reading this
guide. This is really a 101 crash course guide
for access control systems. If you want to get a
relatively quick idea of how access control
works, youve come to the right place.
Why do we need access control? The purpose of
access control is to provide quick, convenient
access control for authorized persons, while at
the same time, restricting access for
unauthorized people. Here are more reasons why
access control is playing a significant role in
your organization
Access Control Infrastructure Access Control
infrastructure is to most people the most
mysterious aspect of access control systems.
Obviously there are electronic locks installed -
but what most people dont know Those locks are
all centrally wired to your IT room. This means
A power or signal cable runs from the lock
through the walls into your IT room where the
access control panel sits. The access control
panel gives the lock the signal to unlock when it
receives the request to do so by the card reader.
There are different topologies (as people call
it) but for the basic understanding of access
control systems lets just assume this described
flow for now.
5
MODELS OF ACCESS CONTROL
  • Access Cards
  • Electromagnetic Lock
  •  A plastic card which contains a magnetic strip
    or a chip 
  • It contains encoded data that is read by passing
    the card through or over an electronic device,
    used to provide access to restricted or secure
    areas or systems.
  •  A card which stores the data in a magnetic
    strip or a chip. This type of card sometimes
    called as swiping card.
  • Electromagnetic locks are used to secure the door
    in conjunction with push bars, request-to-exit
    devices or credential readers for fail-safe
    applications when code compliance permits.

6
MODELS OF ACCESS CONTROL
Proximity Access Control Reader
Biometric Access Control Reader
Bio Proximity Time and Attendance System
  • Proximity is a wireless technology, which can
    easily read the data from the near by card to
    interact with each other wirelessly. This systems
    will  run on low-frequency RFID technology.

A device that reads the identity of a person by
comparing some attribute of their physiological
being or behavioral traits against a sample
database is called a Biometric Reader. 
 A device which stores employees daily
attendance via fingerprints. This will helps the
organization to track the attendance of its
employee systematically
7
ACCESS CONTROL MATRIX
  • Instantaneous protection state of a system
  • Dynamically Changing!
  • How can we extend this model?

Objects
A
B
C
D
0 0 1 0
1 1 0 1
0 0 1 0
1 1 0 1
alice
bob
subjects
charlie
dave
8
THANK YOU
  • 9885888835
  • seo_at_brihaspathi.com
  • FOR MORE DETAILS
Write a Comment
User Comments (0)
About PowerShow.com