Introduction to FDS Entry Management System <Access Control System> January 2015 Fit Design System Co., Ltd. http://www.fit-design.com
: Feature and Function of Entry Management System Feature Wiring work is very simple. Function Almost all the functions conceivable in Entry/Exit Management are provided, and cooperation with another system is available. System configuration: A flexible and scalable system configuration from a small system to a large scale system is realized. Door locking/unlocking with External Signal With connection to an external device such as a fire alarm, doors are unlocked/locked when an emergency signal is input. Cooperation with security system A security signal can be sent to a security system connected by starting of security operation. Cooperation with Monitoring Camera Entry management information and Image recording function are uniformly managed by cooperation with Monitoring camera system. Standard Function ACS2 Mid-size Entry Management System Registered users : Up to 50,000 users Controlled doors : Up to 1,800 doors History Preservation : For 2 years Schedule : 2,000 kinds and up to 50,000 events Entry/Exit restriction function Various functions are available including route restriction, occupants limit control, tailgating prevention, antipassback (entered person is allowed for exit only), and interlocking (only one door is opened). History viewing and search function History is displayed with a PC in real time basis and past history is easily listed up by a search function. Administrator operation authority restricting function Operation authority is set for each administrator individually. Payroll accounting and attendance CSV format files are sent to external systems. management Data are sent to an external system for accurate management of even a complicated shiftworking arrangement. Cooperation with another system Import of externally created CSV format files Company staff directory/shift-work schedule/ Calendar Since existing data can be imported, a large volume of information is collectively registered. 1
Example of Security Measures Targeted Challenges Yes, FDS Entry Management System can solve the Challenges Who has entered/exited through which door, and when it is? Accurate attendance management of the company staff is desired. Enhancement of the security by preventing unauthorized intrusion of an outsider A scalable system is desired that can be expanded from a single site. Preventing theft of important documents and lead out of information Introduction of important documents and leak out of information History of when and who has entered/exited is checked with a PC in real time. Since the wiring work is quite simple and inexpensive, the introduction is ready at any time. Expansion is available flexibly. Users and utility time are meticulously assigned, consequently outsiders cannot enter the room, and theft and information leakage are prevented. 2
Example of Configuration-1 Example of Small System Configuration(ACS1) In a small business institution, a system can be configured with a management PC, one ACU 1, and a required number of DCs. DC #1 Ethernet Isolated Network RS-485 Lock RS-485 Lock DC #2 Hub ACU Hub Ethernet Card Lock RS-232C/485 Card DC #60 Management PC 3
Example of Configuration-2 Example of Mid-size System Configuration (ACS2) In a mid-size business institution, an ACS1 system is installed in each floor and the ACS1 systems are connected to each other with an SC. Lock DC #1800 Lock DC #1741 30th Floor Isolated network RS-485 Card RS-232C/485 Ethernet Card Hub ACU #30 Management PC#1 Ethernet Lock DC #60 Lock DC #1 1st Floor Hub SC Hub Card RS-232C/485 Card Hub Ethernet RS-485 ACU #1 Management PC#20 4
Example of Configuration-3 Example of Large System Configuration(ACS3) For multiple locations, each location has an ACS2 system connected by SC and WAN connection ACS2 system ACS2 system SC#1 SC#512 WAN ACS2 system SC#4 SC#2 ACS2 system SC#3 ACS2 system 5
Specifications Items ACS1system ACS2/3 system Number of controllable doors 60 1800 Number of registered users 50000 50000 User classes 4 kinds of 999 classes 4 kinds of 999 classes User codes 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of scheduled items 2000 2000 Date types of schedule 14 14 Time zone in schedule 8 time zones per day 8 time zones per day Number of registered administrator 10 100 Administrator code 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of connectable 2 100 Number of preserved event logs (ACU) Preservation period of event logs (SC/PC) 50000 50000 6 2 years 2years Number of connectable ACUs 1 30
Products for Entry management system RF Reader with Door Controller A door controller (DC) is not necessary for this reader. An RF reader supporting Mifare is prepared. FDV-1000 Vein Authentication + RF Reader + Key Board FDE-1010 RF Reader + Key Board Key board for operation and password input including an LCD An RF reader supporting Felica cards (EI-Wise) is available as an option (sold separately). Door Controller(DC) This door controller(dc)is used in combination with an RF reader. Access Control Unit(ACU) System Controller(SC) FDE - 800 When the number of doors is 60 or more, individual control for every floor is necessary, FDE - 900 For managing entry/exit of a door without using a vein authentication reader, this control unit is required. FDE - 100 RF Reader of Mifare FDE-MURF10 RF Reader An Access control unit is required for controlling a plurality of doors with group control method and can control up to 60 doors. RF Reader for Felica FDE-FRF or control through a WAN s necessary, a system controller is required. 7
Function of Each Device Management PC Retention of setting and registration information Retention of History Management Software facilitates setting of new user registration, modification of a registered content, history management, antipassback and escort function, etc. SC Setting and registration Information History ACU Retention of setting and registration information Retention of History in case of not connected with SC Vein Database Vein Data Application Authentication data Display of authentication result Administrator Setting, registration, and Viewing Security device Alarming device Fire alarm Unlocking switch Control lock User Authentication data input 8
Procedure of Authentication Card Authentication Authentication ACU Retention of card data Vein Authentication ACU Authentication Authentication data Authentication result User code Authentication result Control DCU Personal Identification lock Authentication data Display of authentication result Reader Authentication data input Control lock Retention of vein and card data Display of authentication result Authentication data input user user 9
Unlocking by other than Authentication By connecting an external switch, a door can be unlocked by pressing the switch without authentication. ( 1) ( 2) There are other functions to unlock the door without authentication. Remote Locking/Unlocking The door is locked/unlocked by an operation from the management PC. Pass Word The door is unlocked with input of a password for unlocking the door.( 5) とき.ドアの 退 室 側 は 認 証 する 必 要 がない Special wiring for unlocking switch DCU Unlocking switch 例 Eg., in case that authentication is not necessary for exit side of the door Thumb Turn By turning the key of the door, it is unlocked.( 3)( 4) Antipanic By means of a function of an electric lock, one side of the door is unlocked by turning a knob.( 6) 1 One unlock switch is necessary for every door that is unlocked by an unlocking switch. 2 Dedicated wiring is necessary for each of DCUs installed to doors that are unlocked by unlocking switches. 3 This function is available for only electric switches without thumb turn covers. 4 If Permission is not set, Unauthorized door open warning is issued. 5 This function is available for only readers including numerical key pads. 6 This function is available for only antipanic type electric locks. Door unlocking time, etc. after unlock by pressing the switch is the case as the case of ordinary authentication. 10
Interlocking With interlocking, when one of two doors in a room is operated, the other door is not allowed to open. ( 1)( 2) When one door is under authentication process, just being unlocked, or opened, the other door indicates Interlocked ( 3) and does not accept authentication request. During interlocking, unlocking is not conducted by not only authentication but also operation other than authentication including remote operation and switch operation. Interlocking Dedicated Wiring Room1 Room2 Vein authentication device Room3 Vein authentication device Under authentication process, just being unlocked, or opened Rejection of authentication request, door locked 1 Dedicated wiring between DCUs respectively installed to the two doors is necessary. 2 Unlocking by unlocking switch, All Rights cooperation Reserved, with Copyright(C)2013-2015,FIT security device, and connection Design System with Co.,Ltd alarm device are not implemented for doors that use interlocking function. 3 Available only in a reader including an LCD 11
Cooperation with Security Device By cooperation with a security device, the authentication device can be secured (Door is locked, authentication request is rejected.)( 1)( 2) ( 3) ( 4) By cooperation with a fire alarm, the door lock can be unlocked when a fire breads out. ( 1)( 5) ( 6) For both the cases, negotiation with managing companies of the other party devices. Be sure to consult us beforehand. There are cases requiring additional expenses. Managing PC LAN ACU LAN Entry/exit managing software Entry side finger vein authentication device lock Exit side finger vein authentication device 1 Dedicated wiring is necessary for each of authentication devices installed to doors to be cooperated. 2 In the doors that implement security start and release operations, interlocking function and connection to security devices are not available. 3 In a door that shifts to a secured state in connection with start of security operation, interlocking function and unlocking by unlocking switch are not available. 4 When security operation is started by an authentication device, checking of saying user and lock out checking are not conducted. 5 Only when the authentication device is energized, cooperation with a fire alarm is implemented. In case of power failure, the state of the lock is dependent on the function of the electric lock. 6 In an authentication device without dedicated wiring, ordinary operation (authentication to unlock) is implemented in case of fire break out. 12
Alarm When an alarm is generate, an alarm sound is issued from an authentication device and alarm issue log is recorded.( 1) Door Open Warning When the door is kept opened for a prescribed period or more, this warning is issued. Unauthorized Door Open Warning When the door is opened illicitly, this warning is issued. When an alarm is generated, an alarm signal may be outputted to the outside.( 2) ( 3) ( 4) ( 5) Tamper Alarm When an authentication device is illicitly disassembled, this alarm is issued.( 6) Threatened Authentication Alarm When a person who is forced to make an unwanted authentication performs the threatened authentication, this alarm is issued. 1 At threatened authentication alarm, the alarm sound is not emitted from the authentication device. 2 Be sure to consult us beforehand. 3 There are cases requiring additional expenses. 4 Dedicated wiring is necessary for each of doors that issue alarms. 5 Cooperation with a security device and Interlocking are not implemented for doors that output alarms. 6 One unit of separately sold Tamper switch is required for one authentication device. An example of event log screen 13
User Registration, Schedule User Registration 1 2 Registration Registration of user information of veins and cards Example of monitor Schedule Calendar settings of holidays, an anniversary of foundation, summer holiday, etc. are implemented. Example of monitor Hourly operation of each door can be set from six kinds of operations. Up to 2,000 patterns of a user schedule in a user available time periods are registered. 1Open 2Close 3Entry 4Exit 5Entry/Exit 6Toggle 14
Usage Restriction Function User Usage Term Restriction Function By setting usage term of a user beforehand, the user is not authenticated except in the usage period. Eg. When usage term is predetermined such as for a temporary staff or a student, this function is used. Antipassback Function A user without an entry log is not allowed to exit, and a user without an exit log is not allowed to enter, thus a user is urged to surely conduct authentication at entry/exit. Number of Staying User Control Function This function controls the number of staying users in a room. Eg. This function is used for a room in which the number of containable people is fixed. Route Restriction Function A user who has not followed a predetermined sequence is not allowed to enter a further inner room. Eg. A user who has not entered the room through a predetermined door is not allowed to enter a further inner area. Escort Function Eg. For preventing tailgating and borrowing/lending authentication data, and checking of staying users, this function is used. A user required to be escorted by someone to enter can be registered. Eg. A user such as a visitor or trainee is made not allowed to enter inside the building by this function. Gender Restriction Function A door that restricts its usage according to the gender can be set. Eg. Doors of a Locker room, Bathing facility, etc. can be set. 15
Monitoring, History An event occurred in the system is displayed in real time. Monitoring A person and a room where the person is present are displayed in real time. An event (history) is retrieved by designating a condition, and the retrieval result and monthly events can be backed up as CSV files. Operation state of each door is displayed in real time. A CSV file opened by Excel is shown. History The retrieval and back up are conducted by referring to system logs preserved in a PC. Logs preserved in the PC is automatically deleted after two years has elapsed. 16
Backup & Restore, Administrator Authority Backup & Restore Setting information and registration information are collectively stored in a back up file of jip file format. Administrator Authority A piece of information to be restored is selected from the backed up information, thus restoration can be made. System administrator All the operations are allowed. Reception Only viewing of stay state information and user information is allowed. Security staff Viewing of event status and remote locking/unlocking are allowed. User registration dedicated terminals Registration of user information and card, and registration/edition of vein can be implemented. Up to ten codes and pass words to log in to an application can be registered. Operation rights and usage terms can be set for each of registered codes. 17