Move over key, you may have been access control king for
years, but today it’s swipe this, click that. Or in some cases, don’t do
anything, just drive through the gate slowly – unless you’re approaching your
garage door – then you have to push a button.
Last week’s blog entry took a look at the growth and
evolution of access control as it applies to the work place; systems that
involve swiping a badge or credential to a reader. These systems were dependent
on a central control panel that used separate wiring bundles running out like
octopus tentacles to each gate or door.
This week we talk about IP-based
readers, an approach that dramatically decreases wiring since it uses the
existing network infrastructure
IP Door Access
control
IP readers, such as the
Isonas PowerNet Reader, are super-intelligent in that they are reader and
control panel all in one. IP reader-controllers connect to the network using
TCP/IP protocol so they share it with computers, IP cameras, and PA over IP amplifiers. A Windows-based network computer running visitor
management software, such as Crystal Matrix, keeps track of personnel authorized
to enter specific doors and sends the lists to readers at those doors. It also
compiles reports of entrants and their time of entry
Installation
IP door access control is easy to install since it uses the existing Ethernet. The reader contains
control functions so no centralized panel is needed. Utilizing Cat5 or
6 cable, the standard network infrastructure, and a standard RJ5 connector means there’s
no need to run wires, or install switches. In fact since IP reader/controllers can run on
power over the Internet (PoE), there’s not even a need for power wires. This
means when additional readers are needed, they can be added to the network
anywhere, anytime.
Credentials
Credentials are proximity devices, the equivalent of a key.
Each credential is uniquely programmed with the individual’s identifying
information and uses radio-frequency identification to communicate it to the
reader controller. Since RFID uses radio-frequency electro-magnetic fields to
transfer data, all a user has to do is present the credential a few inches in
front of the controller and her part of the process is done.
Credentials are available in several forms to fit individual
preferences.
Thin Card, the size of a credit card so it can fit in a wallet |
Clam shell, thicker and stronger, pre-punched so it can be worn on a lanyard. |
Key Fob, can attach to a key ring to be kept with user's other keys, built to withstand jostling. |
Cap Tag, small round version with adhesive backing so it can be attached to other items, turning them into credentials |
Software
Basic software, such as Crystal Matrix, installed on
a
Windows-running computer, allows an administrator to use a standard web browser
to configure the reader-controller and define all access user rules. By adding
E-web software you can use a web browser to control the system.
This makes it
simple for authorized personnel to use their passwords to access the reader
controller from any Windows-running computer in order to make periodic
changes such as adding or subtracting
users and updating schedules and holidays.
And when it’s time for weekly or monthly reports, each reader/controller
can be accessed via the browser, and its stored events history downloaded.
We've looked at access control from the perspective of
readers, credentials, and software, but what of the hardware? What devices are
we locking or releasing. In our next entry we’ll look at electric strikes,
magnetic locks and other hardware involved.
If you'd like information how IP-based access might work for you, call Kintronics at 800-431-1658 to speak to one of our sales engineers, or visit us at www.kintronics.com.
This technology is a great for our door entry. This is best to use I think. Thanks for sharing this helpful device.
ReplyDeleteA webmaster of Door Entry Systems
Glad to know our blog has made it all the way to the UK!
DeleteA great post.It has numberious practical aplication including door entry.business security systems ct
ReplyDeleteAren't Biometric Access Control is more reliable?
ReplyDelete