Thursday, December 13, 2012

Making Access Control Easier -Using Your IP Network


Move over key, you may have been access control king for years, but today it’s swipe this, click that. Or in some cases, don’t do anything, just drive through the gate slowly – unless you’re approaching your garage door – then you have to push a button.
Last week’s blog entry took a look at the growth and evolution of access control as it applies to the work place; systems that involve swiping a badge or credential to a reader. These systems were dependent on a central control panel that used separate wiring bundles running out like octopus tentacles to each gate or door.

This week we talk about IP-based readers, an approach that dramatically decreases wiring since it uses the existing network infrastructure

IP Door Access control
IP readers, such as the Isonas PowerNet Reader, are super-intelligent in that they are reader and control panel all in one. IP reader-controllers connect to the network using TCP/IP protocol so they share it with computers, IP cameras, and PA over IP amplifiers.  A  Windows-based network computer running visitor management software, such as Crystal Matrix, keeps track of personnel authorized to enter specific doors and sends the lists to readers at those doors. It also compiles reports of entrants and their time of entry




Installation
IP door access control is easy to install since it uses the existing Ethernet. The reader contains control functions so no centralized panel is needed. Utilizing Cat5 or 6 cable, the standard network infrastructure, and a standard RJ5 connector means there’s no need to run wires, or install switches.  In fact since IP reader/controllers can run on power over the Internet (PoE), there’s not even a need for power wires. This means when additional readers are needed, they can be added to the network anywhere, anytime.



Credentials
Credentials are proximity devices, the equivalent of a key. Each credential is uniquely programmed with the individual’s identifying information and uses radio-frequency identification to communicate it to the reader controller. Since RFID uses radio-frequency electro-magnetic fields to transfer data, all a user has to do is present the credential a few inches in front of the controller and her part of the process is done.
Credentials are available in several forms to fit individual preferences.

Thin Card, the size of a credit card so it can fit in a wallet


Clam shell, thicker and stronger, pre-punched so it can be worn on a lanyard.

Key Fob, can attach to a key ring to be kept with user's other keys, built to withstand jostling.

Cap Tag, small round version with adhesive backing so it can be attached to other items, turning them into credentials



Software
Basic software, such as Crystal Matrix, installed on 
a Windows-running computer, allows an administrator to use a standard web browser to configure the reader-controller and define all access user rules. By adding E-web software you can use a web browser to control the system.

 This makes it simple for authorized personnel to use their passwords to access the reader controller from any Windows-running computer in order to make periodic changes  such as adding or subtracting users and updating schedules and holidays.  And when it’s time for weekly or monthly reports, each reader/controller can be accessed via the browser, and its stored events history downloaded.





We've looked at access control from the perspective of readers, credentials, and software, but what of the hardware? What devices are we locking or releasing. In our next entry we’ll look at electric strikes, magnetic locks and other hardware involved.


If you'd like information how IP-based access might work for you, call Kintronics at 800-431-1658 to speak to one of our sales engineers, or visit us at www.kintronics.com.

4 comments:

  1. This technology is a great for our door entry. This is best to use I think. Thanks for sharing this helpful device.
    A webmaster of Door Entry Systems

    ReplyDelete
    Replies
    1. Glad to know our blog has made it all the way to the UK!

      Delete
  2. A great post.It has numberious practical aplication including door entry.business security systems ct

    ReplyDelete