Introduction to FDS Entry Management System



Similar documents
CipherLab 5100 Time Attendance Utility Manual

Functional Specification Document

Access CONTROL. MANAGEMENT Software

PoE-Touch Fingerprint and RFID Access Control

USER GUIDE SERIES 4250 AUDIO ALARM CONFIRMATION SYSTEM CONTROL UNIT

BUILDING SECURITY & ACCESS CONTROL

Keyscan Hosted Services A C e n t r a l l y M a n a g e d A c c e s s C o n t r o l S o l u t i o n

Security Service de Services sécurité. Security Alarm Monitoring Protocol

SECURITY SYSTEM NOTES SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES

$FFHVV&RQWURO6WDUWHU.LW

IP Access Control Management System

2012 November. AxTraxNG Access Control Management Software Software Manual (Version 21.x)

Security Alarm Monitoring Protocol

NetworX NX-6V2. LED Keypad User Manual

AXS Biometric Security System

SECURITY SYSTEM NOTES. EMERGENCY ACTIVATION KEYS (check if enabled) PROGRAMMED FUNCTIONS

Access Control Unit User s Guide

Understanding Access Control

HARDWIRED CONTROL PANELS

AS-525. AxTrax Access Control Management Software. Software Manual

F11 User Manual. Version:1.0 Date:Jul. 2010

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Application Notes Partition Programming (PC1616/1832/1864 V4.2) Page 42. Panels: POWER SERIES (PC1616/1832/1864 V4.

Security System User Guide

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

WITURA CORPORATION SDN BHD

FALCO IP: The True Network Access Control Solution. Building Our Future On IP

Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers

KEYSCAN AURORA ACCESS CONTROL MANAGEMENT SOFTWARE Powering the Future of Access Control

SECURITY SYSTEM NOTES

Volume. EverAccess. User s Manual

TX3 Series TELEPHONE/CARD ACCESS SYSTEMS. System Introduction (Sales Training)

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

Edge Metrics Data Center User Manual

PC4020 v3.3 Instruction Manual

V2.0 Attendance System Hardware Suite Guide Instructions Manual

HyperAccess Access Control System

Integrated Security System

Network Management System (NMS) FAQ

Accenta/Optima. User Guide. Servicing Organisation (Installer) name: Telephone Number: Date of Installation: Account Number: Honeywell Security

Solution Ultima ICP-CC488 Home security you can rely on

Access Control Management System User s Manual

[FAQ] Troubleshooting Access Control Issues

Access Control. Intrusion Alarms. Elevator Control CCTV & DVR. Photo ID. Building Automation. Visitor Management. On & Offsite Monitoring

User s Guide. Security Operations Ver. 1.02

SECURITY SYSTEM NOTES

Information Systems Security Assessment

VR8. User Guide Intruder Alarm System

Kaba Electronic Access Control Keyscan Aurora Software Guide. Powering the future of access control.

User s Guide [Security Operations]

Solution 144 The Integrated Access Control & Alarm System made for your business

CONSULTANT PROCEDURES & DESIGN GUIDELINES ACCESS CONTROL SYSTEM

Integra32. Integrated Alarm Monitoring and Access Control USER MANUAL

SECURITY SYSTEM NOTES AREA LISTINGS SPECIAL CODES ENTRY / EXIT DELAY TIMES ARM / DISARM CODES ZONE DESCRIPTIONS

Software License Registration Guide

F454. Web Server. User Manual 05/12-01 PC

Solution Ultima ICP-CC488 Home security you can rely on

Introducing Your Cisco IP Phone

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0

FireSeeker Fire Alarm Control Panel Model FS-250 Programming Manual

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Access Control Management Software

Access Professional Edition Selection Guide

K1 Access Control Management System User s Manual

Table Of Contents. System Monitoring System Monitoring Display...14 Monitoring Zones...15 About Areas (partitions)...15 Area Status Display...

Remote Client Program Web Client... 39

Honeywell s WIN PAK SE 2.0 / WIN PAK PE 2.0 Access Control System Guide Specifications in CSI Format SECTION

VOICE PROCESSING SYSTEM KX-TVM50AL KX-TVM200AL. the voice of business

Access Easy Controller 2.1

Access Control Unit User s Guide

32 Transferring Projects and Data

AxTraxNG Access Control Management Software

Service Manual Advantage Access Systems

Access Control System Document Number: , Rev. D. User Programming Guide. Essential Essential Plus Elite

Access control designed simply for you

OPEN PARK. Automatic Number Plate Recognition that works worldwide including Egypt Number plates

Access Control Software Manual

Supplier Information Security Addendum for GE Restricted Data

Product Guide. Product Guide 2014 EMKA, Inc. Page 1 of 12

DSX-Soft I/O Integration Software

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System

Data Security Kit (E) Operation Guide (for Printer)

APPLICATION NOTE. The DMP Software Family DMP COMPUTER SOFTWARE PROGRAMS

Galaxy 2 Series. User Guide. Honeywell Security

Physical Security for Companies that Maintain Social Infrastructure

The Challenger Version 8 User Guide

GV-AS/EV Controller. User s Manual

The Access Engine. Building Integration System - The Access Engine. Security Systems

3 Specification. Master Chip Broadcom Keys Direct-button 1. Microphone 1. Amplifier 0.5W Speaker 0.5W. Voice

ZKAccess User Manual. Version: 1.1 Software Version: For ZKAccess 4.1.8/5.0.8 and above Version Date: June, 2011

Information Technology Security Procedures

How To Get A Cell Phone With A Video Camera And A Speaker Phone (For A Premium) For A Small Price (For An Extra $100) (For The Premium) ( For A Long Time) (With A Long Distance) (To

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system

National Security Systems Inc (800) Security System User's Guide

Export of audit trail events from Salto software. Version 2.0

Access to the Lift Data Menu is via The Challenger User Menu option - Program Door Data.

Transcription:

Introduction to FDS Entry Management System <Access Control System> January 2015 Fit Design System Co., Ltd. http://www.fit-design.com

: Feature and Function of Entry Management System Feature Wiring work is very simple. Function Almost all the functions conceivable in Entry/Exit Management are provided, and cooperation with another system is available. System configuration: A flexible and scalable system configuration from a small system to a large scale system is realized. Door locking/unlocking with External Signal With connection to an external device such as a fire alarm, doors are unlocked/locked when an emergency signal is input. Cooperation with security system A security signal can be sent to a security system connected by starting of security operation. Cooperation with Monitoring Camera Entry management information and Image recording function are uniformly managed by cooperation with Monitoring camera system. Standard Function ACS2 Mid-size Entry Management System Registered users : Up to 50,000 users Controlled doors : Up to 1,800 doors History Preservation : For 2 years Schedule : 2,000 kinds and up to 50,000 events Entry/Exit restriction function Various functions are available including route restriction, occupants limit control, tailgating prevention, antipassback (entered person is allowed for exit only), and interlocking (only one door is opened). History viewing and search function History is displayed with a PC in real time basis and past history is easily listed up by a search function. Administrator operation authority restricting function Operation authority is set for each administrator individually. Payroll accounting and attendance CSV format files are sent to external systems. management Data are sent to an external system for accurate management of even a complicated shiftworking arrangement. Cooperation with another system Import of externally created CSV format files Company staff directory/shift-work schedule/ Calendar Since existing data can be imported, a large volume of information is collectively registered. 1

Example of Security Measures Targeted Challenges Yes, FDS Entry Management System can solve the Challenges Who has entered/exited through which door, and when it is? Accurate attendance management of the company staff is desired. Enhancement of the security by preventing unauthorized intrusion of an outsider A scalable system is desired that can be expanded from a single site. Preventing theft of important documents and lead out of information Introduction of important documents and leak out of information History of when and who has entered/exited is checked with a PC in real time. Since the wiring work is quite simple and inexpensive, the introduction is ready at any time. Expansion is available flexibly. Users and utility time are meticulously assigned, consequently outsiders cannot enter the room, and theft and information leakage are prevented. 2

Example of Configuration-1 Example of Small System Configuration(ACS1) In a small business institution, a system can be configured with a management PC, one ACU 1, and a required number of DCs. DC #1 Ethernet Isolated Network RS-485 Lock RS-485 Lock DC #2 Hub ACU Hub Ethernet Card Lock RS-232C/485 Card DC #60 Management PC 3

Example of Configuration-2 Example of Mid-size System Configuration (ACS2) In a mid-size business institution, an ACS1 system is installed in each floor and the ACS1 systems are connected to each other with an SC. Lock DC #1800 Lock DC #1741 30th Floor Isolated network RS-485 Card RS-232C/485 Ethernet Card Hub ACU #30 Management PC#1 Ethernet Lock DC #60 Lock DC #1 1st Floor Hub SC Hub Card RS-232C/485 Card Hub Ethernet RS-485 ACU #1 Management PC#20 4

Example of Configuration-3 Example of Large System Configuration(ACS3) For multiple locations, each location has an ACS2 system connected by SC and WAN connection ACS2 system ACS2 system SC#1 SC#512 WAN ACS2 system SC#4 SC#2 ACS2 system SC#3 ACS2 system 5

Specifications Items ACS1system ACS2/3 system Number of controllable doors 60 1800 Number of registered users 50000 50000 User classes 4 kinds of 999 classes 4 kinds of 999 classes User codes 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of scheduled items 2000 2000 Date types of schedule 14 14 Time zone in schedule 8 time zones per day 8 time zones per day Number of registered administrator 10 100 Administrator code 10 digits of alphanumeric characters 10 digits of alphanumeric characters Number of connectable 2 100 Number of preserved event logs (ACU) Preservation period of event logs (SC/PC) 50000 50000 6 2 years 2years Number of connectable ACUs 1 30

Products for Entry management system RF Reader with Door Controller A door controller (DC) is not necessary for this reader. An RF reader supporting Mifare is prepared. FDV-1000 Vein Authentication + RF Reader + Key Board FDE-1010 RF Reader + Key Board Key board for operation and password input including an LCD An RF reader supporting Felica cards (EI-Wise) is available as an option (sold separately). Door Controller(DC) This door controller(dc)is used in combination with an RF reader. Access Control Unit(ACU) System Controller(SC) FDE - 800 When the number of doors is 60 or more, individual control for every floor is necessary, FDE - 900 For managing entry/exit of a door without using a vein authentication reader, this control unit is required. FDE - 100 RF Reader of Mifare FDE-MURF10 RF Reader An Access control unit is required for controlling a plurality of doors with group control method and can control up to 60 doors. RF Reader for Felica FDE-FRF or control through a WAN s necessary, a system controller is required. 7

Function of Each Device Management PC Retention of setting and registration information Retention of History Management Software facilitates setting of new user registration, modification of a registered content, history management, antipassback and escort function, etc. SC Setting and registration Information History ACU Retention of setting and registration information Retention of History in case of not connected with SC Vein Database Vein Data Application Authentication data Display of authentication result Administrator Setting, registration, and Viewing Security device Alarming device Fire alarm Unlocking switch Control lock User Authentication data input 8

Procedure of Authentication Card Authentication Authentication ACU Retention of card data Vein Authentication ACU Authentication Authentication data Authentication result User code Authentication result Control DCU Personal Identification lock Authentication data Display of authentication result Reader Authentication data input Control lock Retention of vein and card data Display of authentication result Authentication data input user user 9

Unlocking by other than Authentication By connecting an external switch, a door can be unlocked by pressing the switch without authentication. ( 1) ( 2) There are other functions to unlock the door without authentication. Remote Locking/Unlocking The door is locked/unlocked by an operation from the management PC. Pass Word The door is unlocked with input of a password for unlocking the door.( 5) とき.ドアの 退 室 側 は 認 証 する 必 要 がない Special wiring for unlocking switch DCU Unlocking switch 例 Eg., in case that authentication is not necessary for exit side of the door Thumb Turn By turning the key of the door, it is unlocked.( 3)( 4) Antipanic By means of a function of an electric lock, one side of the door is unlocked by turning a knob.( 6) 1 One unlock switch is necessary for every door that is unlocked by an unlocking switch. 2 Dedicated wiring is necessary for each of DCUs installed to doors that are unlocked by unlocking switches. 3 This function is available for only electric switches without thumb turn covers. 4 If Permission is not set, Unauthorized door open warning is issued. 5 This function is available for only readers including numerical key pads. 6 This function is available for only antipanic type electric locks. Door unlocking time, etc. after unlock by pressing the switch is the case as the case of ordinary authentication. 10

Interlocking With interlocking, when one of two doors in a room is operated, the other door is not allowed to open. ( 1)( 2) When one door is under authentication process, just being unlocked, or opened, the other door indicates Interlocked ( 3) and does not accept authentication request. During interlocking, unlocking is not conducted by not only authentication but also operation other than authentication including remote operation and switch operation. Interlocking Dedicated Wiring Room1 Room2 Vein authentication device Room3 Vein authentication device Under authentication process, just being unlocked, or opened Rejection of authentication request, door locked 1 Dedicated wiring between DCUs respectively installed to the two doors is necessary. 2 Unlocking by unlocking switch, All Rights cooperation Reserved, with Copyright(C)2013-2015,FIT security device, and connection Design System with Co.,Ltd alarm device are not implemented for doors that use interlocking function. 3 Available only in a reader including an LCD 11

Cooperation with Security Device By cooperation with a security device, the authentication device can be secured (Door is locked, authentication request is rejected.)( 1)( 2) ( 3) ( 4) By cooperation with a fire alarm, the door lock can be unlocked when a fire breads out. ( 1)( 5) ( 6) For both the cases, negotiation with managing companies of the other party devices. Be sure to consult us beforehand. There are cases requiring additional expenses. Managing PC LAN ACU LAN Entry/exit managing software Entry side finger vein authentication device lock Exit side finger vein authentication device 1 Dedicated wiring is necessary for each of authentication devices installed to doors to be cooperated. 2 In the doors that implement security start and release operations, interlocking function and connection to security devices are not available. 3 In a door that shifts to a secured state in connection with start of security operation, interlocking function and unlocking by unlocking switch are not available. 4 When security operation is started by an authentication device, checking of saying user and lock out checking are not conducted. 5 Only when the authentication device is energized, cooperation with a fire alarm is implemented. In case of power failure, the state of the lock is dependent on the function of the electric lock. 6 In an authentication device without dedicated wiring, ordinary operation (authentication to unlock) is implemented in case of fire break out. 12

Alarm When an alarm is generate, an alarm sound is issued from an authentication device and alarm issue log is recorded.( 1) Door Open Warning When the door is kept opened for a prescribed period or more, this warning is issued. Unauthorized Door Open Warning When the door is opened illicitly, this warning is issued. When an alarm is generated, an alarm signal may be outputted to the outside.( 2) ( 3) ( 4) ( 5) Tamper Alarm When an authentication device is illicitly disassembled, this alarm is issued.( 6) Threatened Authentication Alarm When a person who is forced to make an unwanted authentication performs the threatened authentication, this alarm is issued. 1 At threatened authentication alarm, the alarm sound is not emitted from the authentication device. 2 Be sure to consult us beforehand. 3 There are cases requiring additional expenses. 4 Dedicated wiring is necessary for each of doors that issue alarms. 5 Cooperation with a security device and Interlocking are not implemented for doors that output alarms. 6 One unit of separately sold Tamper switch is required for one authentication device. An example of event log screen 13

User Registration, Schedule User Registration 1 2 Registration Registration of user information of veins and cards Example of monitor Schedule Calendar settings of holidays, an anniversary of foundation, summer holiday, etc. are implemented. Example of monitor Hourly operation of each door can be set from six kinds of operations. Up to 2,000 patterns of a user schedule in a user available time periods are registered. 1Open 2Close 3Entry 4Exit 5Entry/Exit 6Toggle 14

Usage Restriction Function User Usage Term Restriction Function By setting usage term of a user beforehand, the user is not authenticated except in the usage period. Eg. When usage term is predetermined such as for a temporary staff or a student, this function is used. Antipassback Function A user without an entry log is not allowed to exit, and a user without an exit log is not allowed to enter, thus a user is urged to surely conduct authentication at entry/exit. Number of Staying User Control Function This function controls the number of staying users in a room. Eg. This function is used for a room in which the number of containable people is fixed. Route Restriction Function A user who has not followed a predetermined sequence is not allowed to enter a further inner room. Eg. A user who has not entered the room through a predetermined door is not allowed to enter a further inner area. Escort Function Eg. For preventing tailgating and borrowing/lending authentication data, and checking of staying users, this function is used. A user required to be escorted by someone to enter can be registered. Eg. A user such as a visitor or trainee is made not allowed to enter inside the building by this function. Gender Restriction Function A door that restricts its usage according to the gender can be set. Eg. Doors of a Locker room, Bathing facility, etc. can be set. 15

Monitoring, History An event occurred in the system is displayed in real time. Monitoring A person and a room where the person is present are displayed in real time. An event (history) is retrieved by designating a condition, and the retrieval result and monthly events can be backed up as CSV files. Operation state of each door is displayed in real time. A CSV file opened by Excel is shown. History The retrieval and back up are conducted by referring to system logs preserved in a PC. Logs preserved in the PC is automatically deleted after two years has elapsed. 16

Backup & Restore, Administrator Authority Backup & Restore Setting information and registration information are collectively stored in a back up file of jip file format. Administrator Authority A piece of information to be restored is selected from the backed up information, thus restoration can be made. System administrator All the operations are allowed. Reception Only viewing of stay state information and user information is allowed. Security staff Viewing of event status and remote locking/unlocking are allowed. User registration dedicated terminals Registration of user information and card, and registration/edition of vein can be implemented. Up to ten codes and pass words to log in to an application can be registered. Operation rights and usage terms can be set for each of registered codes. 17