Top Banner
WELCOME Keyscan’s Keyscan’s Access Control Access Control KIMA SECURITY INC.
36

WELCOME Keyscans Access Control KIMA SECURITY INC.

Mar 28, 2015

Download

Documents

Kasey Man
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: WELCOME Keyscans Access Control KIMA SECURITY INC.

WELCOMEWELCOME

Keyscan’sKeyscan’s

Access ControlAccess Control

KIMA SECURITY INC.

Page 2: WELCOME Keyscans Access Control KIMA SECURITY INC.

Access Control MarketAccess Control MarketAccess Control MarketAccess Control Market

All Market SectorsAll Market Sectors Commercial Institutional Industrial/Manufacturing Residential

KIMA SECURITY INC.

Page 3: WELCOME Keyscans Access Control KIMA SECURITY INC.

Market CategoriesMarket CategoriesMarket CategoriesMarket CategoriesStand alone systemsStand alone systems

operate independently no transaction records

Integrated SystemsIntegrated Systems inter-connected group of components produce transaction records

KIMA SECURITY INC.

Page 4: WELCOME Keyscans Access Control KIMA SECURITY INC.

Chapter 3Chapter 3

What Is Electronic What Is Electronic Access Control?Access Control?

KIMA SECURITY INC.

Page 5: WELCOME Keyscans Access Control KIMA SECURITY INC.

Access control is based on ...Access control is based on ...Access control is based on ...Access control is based on ...

WHO WHERE WHEN

KIMA SECURITY INC.

Page 6: WELCOME Keyscans Access Control KIMA SECURITY INC.

Access control featuresAccess control featuresAccess control featuresAccess control features

ControlsControls doors / elevators / parking gates / garages

OperatesOperates 24 hours / 7 days / 12 months

SpecifiesSpecifies individual access at each door

MonitorsMonitors access points for alarms

KIMA SECURITY INC.

Page 7: WELCOME Keyscans Access Control KIMA SECURITY INC.

IntegratesIntegrates with other building systems

CommunicatesCommunicates via modem or networks for multiple building

control

ReportsReports site activity for security management

auditing

Access control features (cont’d)Access control features (cont’d)Access control features (cont’d)Access control features (cont’d)

KIMA SECURITY INC.

Page 8: WELCOME Keyscans Access Control KIMA SECURITY INC.

Access Control vs. KeysAccess Control vs. Keys better security avoids re-installing locks

AdvantagesAdvantages

KIMA SECURITY INC.

Page 9: WELCOME Keyscans Access Control KIMA SECURITY INC.

Access Control vs. Combination LocksAccess Control vs. Combination Locks controls access by time records the credential and access time

AdvantagesAdvantages

KIMA SECURITY INC.

Page 10: WELCOME Keyscans Access Control KIMA SECURITY INC.

Access Control vs. Security PersonnelAccess Control vs. Security Personnel access control always on guard at every

controlled access point even in a power failure no HR issues

absenteeism etc.

AdvantagesAdvantages

KIMA SECURITY INC.

Page 11: WELCOME Keyscans Access Control KIMA SECURITY INC.

AdvantagesAdvantages

Cost savingsCost savings saves on labour costs saves on cost of replacing

lost assets or damaged property

saves time resolving lost assets

saves effort re-acquiring keys on terminations

KIMA SECURITY INC.

Page 12: WELCOME Keyscans Access Control KIMA SECURITY INC.

Chapter 4Chapter 4

How Electronic Access How Electronic Access Control WorksControl Works

KIMA SECURITY INC.

Page 13: WELCOME Keyscans Access Control KIMA SECURITY INC.

Rapid sequence of events between...Rapid sequence of events between... access control unit (ACU) reader electrically controlled locking device door contacts request to exit device credential – card, token, PIN, human

physiological characteristic personal computer

How It WorksHow It WorksHow It WorksHow It Works

KIMA SECURITY INC.

Page 14: WELCOME Keyscans Access Control KIMA SECURITY INC.

The credential is presented to a reader.

How It WorksHow It WorksHow It WorksHow It Works

KIMA SECURITY INC.

Page 15: WELCOME Keyscans Access Control KIMA SECURITY INC.

Reader transmits credential’s identity to control unit.

Control Unit

Reader

Contact

LockingDevice

How It WorksHow It WorksHow It WorksHow It Works

KIMA SECURITY INC.

Page 16: WELCOME Keyscans Access Control KIMA SECURITY INC.

The control unit signals locking device at door.

Control Unit

Reader

Contact

LockingDevice

How It WorksHow It WorksHow It WorksHow It Works

KIMA SECURITY INC.

Page 17: WELCOME Keyscans Access Control KIMA SECURITY INC.

The ACU monitors the door contacts.

Control Unit

Reader

Contact

LockingDevice

How It WorksHow It WorksHow It WorksHow It Works

KIMA SECURITY INC.

Page 18: WELCOME Keyscans Access Control KIMA SECURITY INC.

Request to Exit device signals

control unit on a

legitimate exit.

Control Unit

Requestto

ExitPush

Button

Interiorview

(readermounted on

opposite sideof door)

How It WorksHow It WorksHow It WorksHow It Works

KIMA SECURITY INC.

Page 19: WELCOME Keyscans Access Control KIMA SECURITY INC.

How It WorksHow It WorksHow It WorksHow It Works

Control Unit

Reader

Contact

LockingDevice

PC with Access ControlSoftware

The access control unit

and the computer

transfer data and site activity.

Page 20: WELCOME Keyscans Access Control KIMA SECURITY INC.

Proximity readerProximity reader widely used in medium & high

security applications variety of styles and shapes indoor and outdoor formats functions behind glass or drywall no contact required / hands free sensitive to metal & voltage

interference

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 21: WELCOME Keyscans Access Control KIMA SECURITY INC.

Keypad readerKeypad reader used alone in low security areas used in tandem for higher security weather resistant no expense of a card, tag, or

token when used alone PINs susceptible to viewing or

borrowing

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 22: WELCOME Keyscans Access Control KIMA SECURITY INC.

Barcode readerBarcode reader used alone in low security areas low cost format cards are programmable &

economical cards easy to duplicate read head susceptible to dirt and

moisture

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 23: WELCOME Keyscans Access Control KIMA SECURITY INC.

Magnetic stripe readerMagnetic stripe reader used alone in low security areas

such as colleges & universities cards are programmable read head susceptible to dirt and

moisture cards can be de-magnetized

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 24: WELCOME Keyscans Access Control KIMA SECURITY INC.

Kwik Key readerKwik Key reader outmoded technology seldom

used

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 25: WELCOME Keyscans Access Control KIMA SECURITY INC.

Wiegand readerWiegand reader seldom used, however,

Wiegand communication protocol prevalently in use

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 26: WELCOME Keyscans Access Control KIMA SECURITY INC.

Radio frequency (RF) readerRadio frequency (RF) reader low security areas such as

parking applications long read range up to 100 feet transmitters control up to 4

different doors transmitters multi-functional -

RF & proximity transmitters susceptible to

damage

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 27: WELCOME Keyscans Access Control KIMA SECURITY INC.

Infrared readerInfrared reader was used for parking

applications seldom used technology

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 28: WELCOME Keyscans Access Control KIMA SECURITY INC.

Biometric readerBiometric reader used in high security

applications many different formats - finger

print, hand scan, retina scan etc.

eliminates unauthorized entry with borrowed credential

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 29: WELCOME Keyscans Access Control KIMA SECURITY INC.

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

Smart card readerSmart card reader integrates with smart card

technology smart cards store data &

values smart cards are multi-functional

KIMA SECURITY INC.

Page 30: WELCOME Keyscans Access Control KIMA SECURITY INC.

Reader communication protocolsReader communication protocols Wiegand communication protocol widely

used generic 26-bit Wiegand protocol - less

secure proprietary Wiegand protocol - more

secure Keyscan uses proprietary 36-bit

Wiegand protocol - no duplicate cards Keyscan systems can read multiple

Wiegand bit formats

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 31: WELCOME Keyscans Access Control KIMA SECURITY INC.

Electric Locking DevicesElectric Locking Devices electric door strikes

fail safe & fail secure magnetic locks

fail safe only installation regulated by local

building & fire codes

All locks must be installed in a fashion to allow free exit in an emergency.

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 32: WELCOME Keyscans Access Control KIMA SECURITY INC.

Request to Exit DevicesRequest to Exit Devices push button - manually

operated when exiting door

motion sensors - automatically signal system when exiting door

crash bar - manually operated when exiting door

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 33: WELCOME Keyscans Access Control KIMA SECURITY INC.

Door Monitoring DevicesDoor Monitoring Devices door contacts

surface mount concealed mount

(preferred)

door sensors integrated with locking

device

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

KIMA SECURITY INC.

Page 34: WELCOME Keyscans Access Control KIMA SECURITY INC.

Typical

Door

Layout

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

3/4" conduitto ACU

Junctionbox

Reader

Requestto exit PIR

36" to 48"

Door contact

3 pair shielded22 AWG

1 pair22 AWG

1 pair18 AWG

Mag Lock

DoorStrike

KIMA SECURITY INC.

Page 35: WELCOME Keyscans Access Control KIMA SECURITY INC.

Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components

CredentialsCredentials proximity cards/tags/tokens magnetic stripe cards smart cards RF transmitters PINs biometrics

Personal ComputerPersonal Computer administer & monitor system

KIMA SECURITY INC.

Page 36: WELCOME Keyscans Access Control KIMA SECURITY INC.

ContactsContactsContactsContacts

Kima Security Inc 85 Marjoram DR, Ajax,

Ontario, L1S 7P4 Phone 416-508-8554 Fax 1-866-341-1276 E-mail [email protected]

KIMA SECURITY INC.