WELCOME Keyscan’s Keyscan’s Access Control Access Control KIMA SECURITY INC.
Mar 28, 2015
WELCOMEWELCOME
Keyscan’sKeyscan’s
Access ControlAccess Control
KIMA SECURITY INC.
Access Control MarketAccess Control MarketAccess Control MarketAccess Control Market
All Market SectorsAll Market Sectors Commercial Institutional Industrial/Manufacturing Residential
KIMA SECURITY INC.
Market CategoriesMarket CategoriesMarket CategoriesMarket CategoriesStand alone systemsStand alone systems
operate independently no transaction records
Integrated SystemsIntegrated Systems inter-connected group of components produce transaction records
KIMA SECURITY INC.
Chapter 3Chapter 3
What Is Electronic What Is Electronic Access Control?Access Control?
KIMA SECURITY INC.
Access control is based on ...Access control is based on ...Access control is based on ...Access control is based on ...
WHO WHERE WHEN
KIMA SECURITY INC.
Access control featuresAccess control featuresAccess control featuresAccess control features
ControlsControls doors / elevators / parking gates / garages
OperatesOperates 24 hours / 7 days / 12 months
SpecifiesSpecifies individual access at each door
MonitorsMonitors access points for alarms
KIMA SECURITY INC.
IntegratesIntegrates with other building systems
CommunicatesCommunicates via modem or networks for multiple building
control
ReportsReports site activity for security management
auditing
Access control features (cont’d)Access control features (cont’d)Access control features (cont’d)Access control features (cont’d)
KIMA SECURITY INC.
Access Control vs. KeysAccess Control vs. Keys better security avoids re-installing locks
AdvantagesAdvantages
KIMA SECURITY INC.
Access Control vs. Combination LocksAccess Control vs. Combination Locks controls access by time records the credential and access time
AdvantagesAdvantages
KIMA SECURITY INC.
Access Control vs. Security PersonnelAccess Control vs. Security Personnel access control always on guard at every
controlled access point even in a power failure no HR issues
absenteeism etc.
AdvantagesAdvantages
KIMA SECURITY INC.
AdvantagesAdvantages
Cost savingsCost savings saves on labour costs saves on cost of replacing
lost assets or damaged property
saves time resolving lost assets
saves effort re-acquiring keys on terminations
KIMA SECURITY INC.
Chapter 4Chapter 4
How Electronic Access How Electronic Access Control WorksControl Works
KIMA SECURITY INC.
Rapid sequence of events between...Rapid sequence of events between... access control unit (ACU) reader electrically controlled locking device door contacts request to exit device credential – card, token, PIN, human
physiological characteristic personal computer
How It WorksHow It WorksHow It WorksHow It Works
KIMA SECURITY INC.
The credential is presented to a reader.
How It WorksHow It WorksHow It WorksHow It Works
KIMA SECURITY INC.
Reader transmits credential’s identity to control unit.
Control Unit
Reader
Contact
LockingDevice
How It WorksHow It WorksHow It WorksHow It Works
KIMA SECURITY INC.
The control unit signals locking device at door.
Control Unit
Reader
Contact
LockingDevice
How It WorksHow It WorksHow It WorksHow It Works
KIMA SECURITY INC.
The ACU monitors the door contacts.
Control Unit
Reader
Contact
LockingDevice
How It WorksHow It WorksHow It WorksHow It Works
KIMA SECURITY INC.
Request to Exit device signals
control unit on a
legitimate exit.
Control Unit
Requestto
ExitPush
Button
Interiorview
(readermounted on
opposite sideof door)
How It WorksHow It WorksHow It WorksHow It Works
KIMA SECURITY INC.
How It WorksHow It WorksHow It WorksHow It Works
Control Unit
Reader
Contact
LockingDevice
PC with Access ControlSoftware
The access control unit
and the computer
transfer data and site activity.
Proximity readerProximity reader widely used in medium & high
security applications variety of styles and shapes indoor and outdoor formats functions behind glass or drywall no contact required / hands free sensitive to metal & voltage
interference
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Keypad readerKeypad reader used alone in low security areas used in tandem for higher security weather resistant no expense of a card, tag, or
token when used alone PINs susceptible to viewing or
borrowing
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Barcode readerBarcode reader used alone in low security areas low cost format cards are programmable &
economical cards easy to duplicate read head susceptible to dirt and
moisture
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Magnetic stripe readerMagnetic stripe reader used alone in low security areas
such as colleges & universities cards are programmable read head susceptible to dirt and
moisture cards can be de-magnetized
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Kwik Key readerKwik Key reader outmoded technology seldom
used
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Wiegand readerWiegand reader seldom used, however,
Wiegand communication protocol prevalently in use
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Radio frequency (RF) readerRadio frequency (RF) reader low security areas such as
parking applications long read range up to 100 feet transmitters control up to 4
different doors transmitters multi-functional -
RF & proximity transmitters susceptible to
damage
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Infrared readerInfrared reader was used for parking
applications seldom used technology
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Biometric readerBiometric reader used in high security
applications many different formats - finger
print, hand scan, retina scan etc.
eliminates unauthorized entry with borrowed credential
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
Smart card readerSmart card reader integrates with smart card
technology smart cards store data &
values smart cards are multi-functional
KIMA SECURITY INC.
Reader communication protocolsReader communication protocols Wiegand communication protocol widely
used generic 26-bit Wiegand protocol - less
secure proprietary Wiegand protocol - more
secure Keyscan uses proprietary 36-bit
Wiegand protocol - no duplicate cards Keyscan systems can read multiple
Wiegand bit formats
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Electric Locking DevicesElectric Locking Devices electric door strikes
fail safe & fail secure magnetic locks
fail safe only installation regulated by local
building & fire codes
All locks must be installed in a fashion to allow free exit in an emergency.
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Request to Exit DevicesRequest to Exit Devices push button - manually
operated when exiting door
motion sensors - automatically signal system when exiting door
crash bar - manually operated when exiting door
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Door Monitoring DevicesDoor Monitoring Devices door contacts
surface mount concealed mount
(preferred)
door sensors integrated with locking
device
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
KIMA SECURITY INC.
Typical
Door
Layout
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
3/4" conduitto ACU
Junctionbox
Reader
Requestto exit PIR
36" to 48"
Door contact
3 pair shielded22 AWG
1 pair22 AWG
1 pair18 AWG
Mag Lock
DoorStrike
KIMA SECURITY INC.
Hardware ComponentsHardware ComponentsHardware ComponentsHardware Components
CredentialsCredentials proximity cards/tags/tokens magnetic stripe cards smart cards RF transmitters PINs biometrics
Personal ComputerPersonal Computer administer & monitor system
KIMA SECURITY INC.
ContactsContactsContactsContacts
Kima Security Inc 85 Marjoram DR, Ajax,
Ontario, L1S 7P4 Phone 416-508-8554 Fax 1-866-341-1276 E-mail [email protected]
KIMA SECURITY INC.