0% found this document useful (0 votes)
275 views

Door Access Control System

An access control system uses locks, turnstiles, gates and other barriers to restrict access to authorized personnel only. It provides benefits like protecting property, revenues, staff and privacy while reducing costs. Different technologies like barcodes, magstripes, proximity cards and biometrics are used, with varying levels of security and cost. An access control system has components like card readers, controllers, exit buttons and magnetic locks connected via software that manages user access based on schedules.

Uploaded by

chan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
275 views

Door Access Control System

An access control system uses locks, turnstiles, gates and other barriers to restrict access to authorized personnel only. It provides benefits like protecting property, revenues, staff and privacy while reducing costs. Different technologies like barcodes, magstripes, proximity cards and biometrics are used, with varying levels of security and cost. An access control system has components like card readers, controllers, exit buttons and magnetic locks connected via software that manages user access based on schedules.

Uploaded by

chan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

DOOR ACCESS CONTROL

SYSTEM

PRESENTED BY
CHAN NYEIN
WHAT IS ACCESS CONTROL SYSTEM?

Access control systems allow the free movement of authorized personnel while restricting unauthorized intrusion. A device that
stops you from getting from A to B unless you are authorized to do so.
DIFFERENT TYPES OF ACCESS CONTROL SYSTEM

• Mechanical, Electric or Motorized Locks.

• Turnstiles and Tubes tiles.

• Mechanical and Electric Gates, Barriers.

• Mechanical and Electric Code Locks.

• Audio and Visual Door Entry Systems.


BENEFITS OF ACCESS CONTROL

•Protect property.

•Protect revenues and assets.

•Protect staff.

•No need for keys.

•No need for security guards.

•Management reports.

•Protect privacy.

•Reduce operational costs


DIFFERENT TECHNOLOGY FOR ACCESS CONTROL SYSTEM

Technology Cost Security


Barcode Low Cost Low Security
Magstripe Low Cost Low Security
Proximity Mid level Cost Med & High Security
Smart card Mid level Cost Med & High Security
Proximity/Keypad combination Mid level Cost Higher Security
Biometrics High Cost Highest Security
DIFFERENT TECHNOLOGY FOR ACCESS CONTROL SYSTEM

Barcode Technology
• Employs a pattern of bars and spaces of varying widths to represent
the user information.
• Visible and easy to duplicate
• Not a good choice for systems where security is a major concern.

Magstripe Technology Barcode

• Same technology as credit cards.


• Requires the card to come in direct contact with the reader head causing
wear and a shorter life span.
• The cards are low cost but are easily duplicated
• Can easily become damaged, and the readers require cleaning to remove
any dirt build-up on the read heads.
Magstripe
DIFFERENT TECHNOLOGY FOR ACCESS CONTROL SYSTEM

Proximity Technology
• Constantly transmits a low-level fixed RF signal that energizes the card.
• When the card is held at a certain distance from the reader, the RF signal is
absorbed by a small coil inside the card and powers up the card's microchip,
which contains a unique identification code. Once powered, the card transmits
the code to the reader. The whole process is completed in microseconds.

Benefits Include:
•No Moving Parts
•No Mechanical wear
•No Slots or read heads to maintain
DIFFERENT TECHNOLOGY FOR ACCESS CONTROL SYSTEM

Biometric Technology

• System measures some physiological properties of the user such as hand


geometry, Iris pattern, finger print pattern or voice pattern.

• These types of devices offer very high security but also are the most
expensive and require that the user be present in order to be enrolled into
the system.

• Use of biometrics requires careful considerations in terms of environment,


speed and suitability.
ACCESS CONTROL OPERATION
COMPONENTS OF ACCESS CONTROL SYSTEM
CARD READER & CONTROLLER

Card Reader

Features:
•Card Reader
•Keypad
•Finger Print

Card Reader
Controller

Features:
•Mostly used in centralized system
•Many inputs/outputs
•Between computer and Card Reader
Controller
EXIT BUTTON & BREAK GLASS

Exit Button
• To release the locking hardware for door

Exit Button

Break Glass
• provide immediate local release of the door in case of fire
• BGU should be monitored so breakage can be reported

Break Glass
MAGNETIC LOCK & DOOR CONTACT

Magnetic Lock

• Electronic locking mechanism is required to lock and release


the door, many versions and types are available depending
on the door and application.

Door Contact

• Monitoring the door status is essential to allow the user to


know if the door has been left open or forced open.
Without it the access control system is running in low
security mode.
DOOR ACCESS SYSTEM OPERATION

Outside View Inside View


ACCESS CONTROL OPERATION
MANAGEMENT SOFTWARE

The access control software works with a database that


manages all the records, transaction etc. This can be MS Access
or SQL. All this data is stored in the main server.

In order to create restrictions for the times when certain doors


can be used, it is essential to create daily schedules and weekly
which defines the times when certain doors are intended to be
used. This must be the first consideration for the system before
programming the system starts. Example for office staff (9-6
Monday to Friday)

Once the schedules has been defined, you need to define


groups of people that can be put in a group which can share
the same door authorisations. For example Management,
Office, Factory staff.

You might also like