IQ MultiAccess Access Control Software Features: IQ MultiAccess – the outstanding access control software – offers almost endless possibilities of use thanks to the numerous combinations of the available hardware and software functions. The superior concept offers the control of different locations via one system. Locations can be either several sites of a company, several companies within a building/ building complex/business parks or several individual companies that use a common access control system. Different types of controllers/terminals, connection and reading techniques can also be managed per location. Within one building it is possible for several companies to use collective doors without seeing the data of the other companies (mandators). State of the art: SQL database link. IQ MultiAccess is supplied with a licence-free SQL database “Firebird” . Its installation, management and maintenance require no knowledge of databases as IQ MultiAccess performs all three itself. Furthermore, links are also possible to existing databases (MS SQL, IBM DB/2, ORACLE). Tailor-made: Simple operation, clear and precise arrangement and data protection are guaranteed by a hierarchical user organization. The superuser has all rights within the system, personnel managers only manage persons within the system, location managers only have access to the location allocated to them and these rights can also be specially defined. • Management of locations (several locations of a company or several clients/companies at one location) • Authorization hierarchy due to user-related rights with varying rights within the system or location- related • ACT,ACS-1 / 2 plus / 8 components connectible • Hardware management, separable into physical and logical • SQL database link • 128 bit SSL encryption • Simplified macro control • 255 clients per location, unlimited within the system • 999 doors per location / unlimited within the system • Unlimited number of persons/IDs • Import/export of personnel master data from, or to other systems • Access to collective doors by several mandators • Import via LDAP interface and from SQL databases • GlobalAntipassback and Barring repeated entry • Several data carriers for one person • Integrated management of time recording terminals • Man-trap function with correlated door state influence • Doorkeeper module with live image comparison • Image sequence recording • Creation of visitor´s IDs, administration of access rights of external persons and much more by integrated visitor administration IQVisitor • Biometrical verification and/or identifcation procedure by connection to Fingerprint, face recognition systems etc. • Holiday calendar with formular editor for individual calculation of non-date depending holidays • Intruder Alarm Control Panel (IACP)-connection. Creation and management of personnel data and authorizations of one or several intrusion detection systems. IACP-bookings evaluable in IQ MultiAccess. Operation via virtual operating unit.
8
Embed
IQ MultiAccess - bells-security.combells-security.com/new/pdf/IQMultiAccessHW.pdf · IQ MultiAccess Access Control Software Features: IQ MultiAccess – the outstanding access control
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
IQ MultiAccessAccess Control Software
Features:
IQ MultiAccess – the outstanding access controlsoftware – offers almost endless possibilities of usethanks to the numerous combinations of the availablehardware and software functions.
The superior concept offers the control of differentlocations via one system. Locations can be eitherseveral sites of a company, several companies within abuilding/ building complex/business parks or severalindividual companies that use a common accesscontrol system.
Different types of controllers/terminals, connection andreading techniques can also be managed per location.
Within one building it is possible for several companiesto use collective doors without seeing the data of theother companies (mandators).
State of the art:
SQL database link. IQ MultiAccess is supplied with alicence-free SQL database “Firebird”. Its installation,management and maintenance require no knowledge ofdatabases as IQ MultiAccess performs all three itself.
Furthermore, links are also possible to existingdatabases (MS SQL, IBM DB/2, ORACLE).
Tailor-made:
Simple operation, clear and precise arrangement anddata protection are guaranteed by a hierarchical userorganization.
The superuser has all rights within the system,personnel managers only manage persons within thesystem, location managers only have access to thelocation allocated to them and these rights can also bespecially defined.
• Management of locations(several locations of a company or severalclients/companies at one location)
• Authorization hierarchy due to user-related rightswith varying rights within the system or location-related
• ACT,ACS-1 / 2 plus / 8 components connectible• Hardware management, separable into physical
and logical• SQL database link• 128 bit SSL encryption• Simplified macro control• 255 clients per location, unlimited within the
system• 999 doors per location / unlimited within the
system• Unlimited number of persons/IDs• Import/export of personnel master data from, or to
other systems
• Access to collective doors by several mandators
• Import via LDAP interface and from SQL databases
• GlobalAntipassback and Barring repeated entry• Several data carriers for one person• Integrated management of time recording
terminals• Man-trap function with correlated door state
influence• Doorkeeper module with live image comparison• Image sequence recording• Creation of visitor´s IDs, administration of access
rights of external persons and much more byintegrated visitor administration IQVisitor
• Biometrical verification and/or identifcationprocedure by connection to Fingerprint, facerecognition systems etc.
• Holiday calendar with formular editor for individualcalculation of non-date depending holidays
• Intruder Alarm Control Panel (IACP)-connection.Creation and management of personnel data andauthorizations of one or several intrusiondetection systems. IACP-bookings evaluable in IQMultiAccess.Operation via virtual operating unit.
2
Usability ranks firstThe data selection is done in theaccording to Windows explorer.
According to the selection, the data are listed in theand displayed in the .
file dialog window
listwindow operating range
Each user can create/modify his/her own presentation(active windows, window size, display sequence,sorting, filtering in the list window) and save underhis/her profile.
The data record highlighted in the can bemodified in the .
list windowoperating range
File dialog window List window
Each user can save his/her individual settings asstandard. Depending on the user logging in, this willautomatically be loaded.
At a glanceAll important functions and information are displayedwell arranged on one screen page.
Operating range
Room/time zone modelRoom/time zones regulate at which times authorizedpersonnel have access at which doors. Individual days,even Saturdays, Sundays and holidays can be consideredseparately.
A holiday calendar with additional individually creatableholiday formulae helps the system knowing country-specific holidays (e.g. the 1 Thursday of a month).st
3
One AC system – several locationsThanks to the option “management of locations”, it ispossible to run several locations of one company and/orseveral clients at one or several locations by only onesystem. However, every location operator only sees thearea for which he/she is responsible.
4
my own doors + main entrance
my own doors
+ main entrance
my own doors
+ main entrance
CompanyB
CompanyC
Company
A
One door - many usersSeveral companies within one building can use andadministrate individual doors together. No one sees ordisturbs the other company´s data.
Variable door controlOptionally, the doors can be equipped either with lockingcylinders / strike plates or controlled via access controlcontrollers.
Using a locking cylinder, the communication between theaccess control software and the door is done by a PDA viainfrared interface.
Doors, online controlled via access control controllers, canparticipate in antipassback (inclusive virtual screentableau), barring repeated entry and counter control.
5
Clearly arranged installationAlmost unlimited hardware connection possibilitiesthanks to variety of combinations within the system andper location. Existing hardware constellations can thusbe maintained.
The hardware can almost user independent be definedby a scan function which automatically recognizes thecomponents connected. Individual default settingsassist the manual hardware definition by acceleratingthe procedure and help avoiding mistakes.
The separation of hardware into physical and logicalensures that information remains clearly arrangeddespite extensive installation requirements.
Last but not least: Hardware that is physicallyconnected to a computer of one location can beallocated logically to another location from where it isthen managed. This constellation is conceivable, e.g. ifthe entire hardware of several locations is connected toa terminal server.
PhysicalrepresentationWhere is the hardwareconnected?
LogicalrepresentationDoor configuration,which task has thehardware?
Forward-lookingNot only a new start, but also the change from our well-proved access control systems EnterpriseAccess 2000,MultiAccess Lite and MultiAccess for Windows V7 SP1inclusive data transfer and existing hardware ispossible.
Variable security levelsA wide range of security levels is available, from a simple IDauthorization over doorcode, PIN (exclusive or incombination with an ID), multi-person access control,image comparison to the point of a person´s security checkby random.
Create your own IDs
Photos and signatures can be takenand stored in the personnes masterfile for staff and visitor IDs byconnecting a commercially vailableWEB-camera and / or a signature pad.
.With a card printer connected,the ID-cards can directly beprinted according to individuallydefinable layouts.
6
Central personnel managementPersonnel data can be recorded, managed and allocatedto the relevant locations within the system by thepersonnel managers that are sited outside the locations.
Location manager AFull access tolocation A
Personnel A
AC-authorizations A
IQ MA
Location manager B
location BFull access to
Personnel B
AC-authorizations B
IQ MA
Location manager C
location CFull access to
Personnel C
AC-authorizations C
IQ MA
Location manager D
location DFull access to
Personnel D
AC-authorizations D + collective doors
IQ MA
Location manager E
location EFull access to
Personnel E
AC-authorizations collective doorsE +
IQ MA
Location manager F
location FFull access to
Personnel F
AC-authorizations collective doorsF +
IQ MA
Individual, regional separated locationsLocation A
Location B
Lokation C
Several locations (mandators) within one building using collective doors
Location D
Location E
Location F
IQ MA
IQ MA
IQ MA
Superuser* with full accessto all data system wide
Systemmanager* with full accessto all data system wide exceptIQ NetEdit
Personalmanager* with accessto all personnel data systemwide
* Superusers, system managers andp sonnel manager can be assignedto any location.er
Connecting an intruder alarm control panelIQ MultiAccess takes over the administration ofauthorization data of IACP switching devices byconnecting one or several intruder alarm control panels ofthe type series 561-MB24, 561-MB48 or 561-MB100.
This means data carriers, room/timezones and theirauthorizations of access functions, arming/disarming aswell as control functions.
The location operators´ rights can automatically be set inaccordance to theVdS guidelines via a “VdS switch”.
The connected IACP hardware can be scanned and willautomatically be set up in the hardware administrationprogram section.
Existing master data of the intruder alam control panel willbe transferred and can from now on be centrallyadministrated in IQ MultiAccess.
Entries of the event memory of the IACP can be evaluatedin IQ MultiAccess by using all the advantages of individuallist layout.
Integration without supplementary hardwareIQ MultiAccess supports all existing remote access variantsof the intruder alarm control panels to realise the technicalconnection.
Linking up both systems can be done via Ethernet(TCP/IP), remote data transmission (ISDN or anloguemodem) or IGIS-LOOP.Thus, the existing infrastructure canbe used and expanded without any problems.
either
Intrusion detection system
Access control system
7
List view in IQ MultiAccess
What you see is what you getIn addition to the factory settings, all lists can individuallybe created, sorted and filtered, easily by drag and drop.This includes the evaluations of the event memory ofIACPs as well. All the filters itselfs can as well be createdindividually. The printout of all lists is exactly as displayedon screen. Supplementary lists and filters created oncecan be saved with an arbitrary name and reused anytime.
As a matter of course each user can create and savehis/her individual user profile; once created alwaysoutomatically available.
Last but not least, there are export functions to the dataformats EXCEL, TXT, HTML and XML.
IQ MultiAccess
The „ “ option enables- arming / disarming- switching on / off detector groups- viewing alarm and event memory- activating walking test- starting macros- maintenace functionsof all intruder alarm control panels connected toIQ MultiAccess.