Access Control - Time & Attendance, Mustering and Mantraps Guide

By: Brian Rhodes, Published on Jun 13, 2018

Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure, they can provide significant management, safety, and security advantages over locks and key alone.

In this note we examine three of the most powerful features available in modern systems:

  • Time & Attendance
  • Mustering
  • Mantraps

We explain each of these features in depth inside.

Time and Attendance

One of the most powerful features of EAC is the time/date stamp associated with every event in a system.

Not only do systems log when door opens, they also record whose credential was used to open them, typically down to the second, making them ideal for keeping track of employee attendance.

Time Logging makes it possible to 'track' a user's movement through a system, and provide a concrete record of where a person was at a given time. These logs have even been used to solve murders and otherwise establish presence at certain times with high precision.

Time Clock Function

With relatively minor adjustments, most access systems can use 'time logging' with time clocks.

Many workers are paid an hourly wage. Clearly establishing when they start their job and when they stop working is crucial, as 'time' is indeed 'money'. Capturing this time has traditionally been the function of precise clocks, where workers insert cards to have a the time indelibly punched out on a given day. Indeed, "punching the timeclock" is a common saying.

However, the method is not problem free. First and foremost, abuse is a risk, where an employee punches more than only his/her card. This type of fraud is at the forefront of many HR and Corporate issues. Many seek to eliminate this risk/temptation entirely. While time clocks are primarily intended to protect the employer, the employee also benefits from having a clear record of attendance to lean on when calculating paid vacation days, sick days, or overtime pay.

********** ****** ****** ******** that *********** ********** ***** cannot. ***** ***** ******** may *** ** ** fundamental ** ******* ***** secure, **** *** ******* significant **********, ******, *** security ********** **** ***** and *** *****.

** **** **** ** examine ***** ** *** most ******** ******** ********* in ****** *******:

  • **** & **********
  • *********
  • ********

** ******* **** ** these ******** ** ***** inside.

Time *** **********

*** ** *** **** powerful ******** ** *** is *** ****/**** ***** associated **** ***** ***** in * ******.

*** **** ** ******* log **** **** *****, they **** ****** ***** credential *** **** ** open ****, ********* **** to *** ******, ****** them ***** *** ******* track ** ******** **********.

**** ******* ***** ** possible ** '*****' * user's ******** ******* * system, *** ******* * concrete ****** ** ***** a ****** *** ** a ***** ****. ***** logs **** **** **** used ******* ********** ********* ********* ******** at ******* ***** **** high *********.

Time ***** ********

**** ********** ***** ***********, most ****** ******* *** use '**** *******' ******** ******.

**** ******* *** **** an ****** ****. ******* establishing **** **** ***** their *** *** **** they **** ******* ** crucial, ** '****' ** indeed '*****'. ********* **** time *** ************* **** the ******** ** ******* clocks, ***** ******* ****** cards ** **** * the **** ********* ******* out ** * ***** day. ******, "******** *** timeclock" ** * ****** saying.

*******, *** ****** ** not ******* ****. ***** and ********, ***** ** a ****, ***** ** employee ******* **** **** only ***/*** ****. **** type ** ******* ** *** ********* of **** ** *** Corporate ******. **** **** ** eliminate **** ****/********** ********. While **** ****** *** primarily ******** ** ******* the ********, *** ******** also ******** **** ****** a ***** ****** ** attendance ** **** ** when *********** **** ******** days, **** ****, ** overtime ***.

[***************]

***** *** *** ****** for **** & ********** often ***** ******* ***** separate ******* *** *** sole ******* ** ********* 'In' *** '***' ******* in *** ******. **** a *** ****** ******, a ****** ** ******* listing ******** ** ***** two *******, ******* *** 'In' ******* *** *********** the '***' ********* ******* an ******** ****** ** attendance.

Multi-Factor ***** *****

** ***** ** ***** the ******* ** '***** punching' (* **** *** systems ******** **** '********'), **** *** ********** readers ***** ******* ******** authentication *******, ********* *********** or **** *******. **** 'extra **************' ******* **** no *** *** ******** misrepresent ********** ** ******* person.

**** ****** *** **** & ********** ******* ******* biometrics, ********* ********** *** examples *****:

***** ***** ** ******* are ********* **** ** 'standalone' ********* ******* **** require ** *** ****** interface, *** **** ********* cost **** ********** **** with ****** ********. *** systems ****** **** ** interface ** ******* **** data.

Payroll ***********

**** *** ********* ****** 'time *** **********' ********, this ** ********** **** than ********** ****** *******. Many *** ******* **** format **** ** ** can ** ******** ******** into ******* *******. *******, this ** ********* * manual *******, *** ********** or ******* ***** ******* instruction ** *** ****** platform ** ******* *******.

*** ********** ***** **** shows******'* ******* ****** ****** of **** *** ********** data:

** ***** *****, '**** & **********' ******** *** be ***** ** *** Access ********, *** ** additional '******* ******' ** added ** *** ******** for ****** ***********. **** additional ******** ******* *** default ******* ********, ** adoption ** ***** ******* may **** ******** **** 'non-security' ************.

Risk ***** ****** *** ***** *********

***** ***** ****** ** host **** ***** ********* can ** ************, ** is *** ******* *****:

  • Clock *****: In effect, the EAC system clock serves as the payroll clock. While a variety of solutions for synchronizing/standardizing time exist, such as *** ********** ******* **** ******, differences ******* ****** *** other ********** *** ****** significant ********. **** *** is **** *** **** and **********, ******* ****** time ** **** **** the ***** ******** **** is *****.
  • Single ****** ********: Or rather '******* *** **** **** in *** ******'. ** * ****** of **********, ** **** EAC ****** ***** *******, so **** **** **** Clock. *** ******* ** granting ****** ******* ******* doors *** ***** ** solved ** ******* ********** keys, ** ****** ******** exists *** **** *** Attendance ********. *** ***** want ** **** ** older ****** ********* ** a ******, **** ** case, *** *** *** time *** ****** ** offline, ******** ********* *** timeclock *******.
  • Passback *********: For access systems using 'Anti-Passback' controls, logic discrepancies can cause low-level conflicts with Time Clock readers. If an employee 'scans In' to the timeclock, and then immediately 'scans In' to a normally secured door, the EAC system may generate an alarm or deny access unless the timeclock reader is isolated from passback rules. Given the large number or doors across multiple sites, or large populations of employees in a single system, these sort of errors can be common and hard to troubleshoot.

Benefits *** ***** ****** *** ****/**********/*******

*******, ** ***** **** business ***** ** *** access ** **** '**** and **********' ********, *********:

  • Less ** ***, ********: While a single system can be a weakness, it can also be efficient. Many facilities prioritize the upkeep of facility access systems, and issuing a credential for access also means it can be used for payroll. The investment in one facility system can be leveraged by another.
  • Expanded ******** ********: In normal use, if an employee has a security credential revoked in an EAC system, they immediately become invalid in the payroll system. In addition, tying the two systems together can prevent an unauthorized employee from gaining access to an 'Time In' reader before an allotted shift and help manage overtime payouts, and payroll hour allocations are enforceable by physical access controls.

*********

******* ******** ******* ** using *** ****** **** to ****** ****** ** a ******** ** ******** areas. ***** * *********** of **** *** *****, Mustering ****** ** ***** to ******** ***** **** are, **** ****** ** emergency.

*****, *** **** ****** / ************* ******* *** two ***** ** *********, depending ** *** **** administrative ********* ** ********:

  • **** ********
  • ****** *****-**

Area ********

*** ******* ** ********* uses ****** ******* ** generate * ****** ** occupants ** * ******* area. ***** **** ** occupant ***** * **** to ***** *** ***** an ****, *** ****** system **** *** ****, date, *** ********** ****** of *** **********. **** data *** ** **** to ********* *** ** in *** **** ** any ***** ****, ********* emergency **********.

Manual *****-**

*************, ********* *** ** implemented ** **** ******* as * '***-**' *******, where * ********** ****** located ** ** ********** point ** ******* ** cardholders ***** **** ********. Then **** **** ** names *** ** ******** against *** ******** **** of ******** *** ****** scan **** **** ****** during *********. *** ****** screen ***** ** ** example ****** ****** **** a '********* ******':

** ****** *** ****, the **** ** ********* is ** ******* *** specific ***********, ** ** they *** *** ********* present ****** ** ****, then ********** ****** *** be ***** ** *********** where **** ***. ** an ********* *********, *** resources ** ****** *** the *********** *** *******, and ****** ** ******** list ** *** ** present ***** ***** ***** to ***** *******.

Where ** ********* ****?

***** **** '********* **** Calls', ********* ********* *** be ******* ** ******* ways. ** ********** ** mining **********, ********* *** be **** *** '**** Out/ *** ***' **********, where ********* ****** *** be ********* ** ** area ********** ***** *** maintenance ********* *** ********* for. ** **** *** maintenance ****** *** ******* in ** ** ****, but *** *** ******* out, *** ******** *** de-energized ***** ******** *** be ********* ***.

********, ** ********** ***** frequent ********** *** *********, like *******, ********, ** passenger *********, ********* *** be ********** ** ****** that *** ******* ** a ***** *** ******* in ** ************** ****** system.

********* ** *** ********* is ***********, ** *** send ************* ** ***** reports ** ********** *********. Not **** *** '******** reports' ** **** ** nearby ******** ****** ** evacuation ****, ** *** send ****** ** **** messages ** ******* ********* alerting **** ** *********** (ie: ****** ******, **** threats, ** ***** ********* circumstances).

Additional ****** ********

********* ** *** * system ********** *********, ********** software ************* *** ******** may ** ********. ** 'mustering *******' *** ****, then *********** **** ******** may ** ** **** than ********* * *** checkboxes. **** ************* ***** requires ***** *********** ***** readers ** *** ****** to ******* ********* *** not ********* ** *** system, ** *** **** cross-reference ***** ** ******** schedules ** ******* ********* are ****.

*******, ***** ***** ** mustering *** ******* ********** readers. ** ***** ** take ** ******** ********* of *** ** ******* in ** ****, ********* must '**** ***' **** they *****. **** ****** controlled ******** ****** ******* 'scanning **' *** ******, so *** ******** ** an *** ******, **** when ******** ** *** linked ** **, **** cost *** ********** ** a ******.

********

*** ** *** ****** techniques ** ****** ******* is ***** **** *****. Mantraps**** **** ** ******** times*** ********* ****** ** only ******* ** ******** people, **** *** ***** benefit ** '********' ** imposter.

****** **** ** ******** vary *** **** ******** over *** *****, *** the ******* ** ***** applied ** * ****** of ********** ********** ** a ****** ** ****. In **** ****, ** look ** ********, *** they *** *********, *** where **** *** ****.

*** **** ***** ******** a ****** ******* * mantrap ** ***:

****** *** *** ********** of *** ** *****:

  • *** ******* **** ****** opens ******* *** ****, until *** ****** ****** scans * **********
  • *** ****** **** *******, and *** ******* **** locks, ********** ****** **** entering *** '********' ****.
  • *** ******* **** ******* locked ***** *** ****** door ****** *** *******.

*** '***********' ****** ** the ******* ****** **** one **** ** ** unlocked *** **** ** a ****. ***** **** restricting ******, *** ******* of *** ********* *** permit *** *********** ****** the **** ** ** normalized (***********, ********, ****) before *********** ** ** the ****** ****, ** even ***********. **** **** this ***, "********" *** often ****** "********", *** even ** ******** ** not *** ******* ****, the ******* ********** ** doors ** *** ****.

Three ******* *******

*********, ******** *** *********** in ********** ***** ** of ***** ******* ****:

Access ******* *****

****** ********** ***** *** configured ************ ******* ****/****** ***** ** system ******. **** **********-***** EAC ******* (******************,*****, ******** *****, ***) offer '*******' ************** ** part ** ***** ******* with ** ********** **** beyond ********** *** ***** to *** ******.

Specialty ***********

*** ************ ******* ****** or *** ********* *** supporting ******* *************, *** party ********** ***** *** used ** ********* ******** on ****** *****. *** image ***** ***** *** typical '******' ********** **** is ********* ** ********* doors ** *** **** way **** ******** ****** is *********:

Retrofit ********

** ***** *****, '******** in * ***' (** 'airlock ******') *** *****, especially ***** ******** *** desired, *** ********** *** doors ** *** ********. In **** *****, ***** 'kits' **** **** ********* controllers, *** *** ** configured ** **** **** existing *** ******* ** desired.

***** ******** ******* * strict ***** ** *** number ** ********* ** a '********' ****; *******, one ****** ** * time. ** ***** ** accomplish ****, * ********** space **** ** *********** consisting ** ******* *****, frames, *** *** **** sections. ***** **** ****** be ******** ************, * "kit" ****** *** ** install ************* ******* ********** or **** ***** ** the ****. *** ****** below **** ** ******* 'kit', *********** ****** ** existing ******* ** ******** to ** ******** ****:

*** ********* ***** ***** the **** *** ***** take, ***** ******** ******* the ****** ****, ******* for ** ** *****, validating ****** *** **** opening *** **** ******** door.

Mantrap ****

** * **** *****, the '*** *****' ****** is ********* *** ***** expensive ****** ** *** is ******* ***** ****.

********* *********** **** * gap, ***** **** ***** EAC ** *** ******* in ***, *** * controlled ******* ** ***** required. *** *******, * specialty ********** ***** ~$***, rather **** ********** ** EAC ****** *** ********** cost **** ******** ******** functionality.

******** ******** **** * high ****, ********* ******* ~$5000 - $*****, *** this ***** *** ** less *********, **** **********, and ******* ********** **** a '***** *****' *******.

Common ****

***** **** '********** *******' into * *****, ******** are **** ******** ** prevent ************* ** *****-***** manufacturing ** ******* ************, and ** ********-********* ****** controls **** '**********'. **** ***** *** most ******* ******* **** feature, ** **** * suspect ** ******** *** be ******** **** * police ******* ******* ****** opportunity ** ******.

** **** *****, * sallyport ********** *** ******** of * ****/****** **** with * ******-**** ******** door. ** ***** ***** the ******** **** ** up, *** **** **** is ******, ********** ******* from ******** **** *** outside *******. ********, **** the ******** **** ** down, *** ****** **** is ********, ******** * suspect *** ***** *** booking/holding ****, *** ****** to ****** ** *** outside *******.

Safety *****

*** ******** ***** **** apply ** *** ** maglocks ****** ******* ** the********* **** **************** *** ********. *** example, * ***** *********** or **** ** ********** differently **** ** ****** building *** ** ****** from **** ** *** 'life/safety' *********** ********. ******** to *** ***** ***** apply ***** ******** * clear ************** ** *** building ****.

*** **** **********/*********/********** ***************, Life ****** ******* *** 'golden ****', ***** ***** that **** ****** **** always ** **********. ** this ****, ******** *** be **** ** **** people *** ** ** area, *** **** ****** be **** ** **** people ****** ***. ** the ********** ***** *** not **** ** ******* free ********* ******, **** other ******* ****** ****** paths **** ** ** present ****** *** ****.

** **** *****, ******** RTE ******** ******** *** fire ***** ********** *** required, ** **** ** an ********* ** *** can *********** ** ******* inside * "********" ****.

Comments (1)

Food for thought,

In regards to cloning cards, is there any system out there right now that has the ability to set a time interval between reader locations that will generate an alarm if the card is read at each location within that time interval.

The simple way to look at this...I should not be able to read my card at a Seattle location at 7am and also walk through a door in San Diego 15 minutes later. Perhaps before my card works on any reader in a building I need to scan it at a security check point to enable my access, where I smile and also get my picture taken.

In performing the above action either someone has cloned my card or I found a teleport machine.

With all the reports available on these systems does this exist? Especially after card cloning has run amuck for years now.

In other words I should not be able to go thru a door in one building on the tenth floor and then read in another building on the 10th floor again in a minute time span.

How can one use their EAC to analyze for cloned cards? Seems they should just build a report off of card trace...that looks at all cards in a chronological order.

Any cool features such as this?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...
China Jaywalking Facial Recognition Guide on May 27, 2019
News reports touting the PRC's AI prowess often showcase facial recognition cameras being used to automatically catch and fine jaywalkers.  In...
Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...

Most Recent Industry Reports

Sighthound Transforms Into Enterprise AI Provider on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...
False Verkada 'Unrivaled' Low Light Performance Claim Removed on Jun 12, 2019
Verkada falsely claimed that it delivered 'UNRIVALED LOW LIGHT PERFORMANCE' until IPVM questioned. In fact, Verkada's low light performance is...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Camera Course Summer 2019 - Register Now on Jun 12, 2019
Register for the Summer 2019 Camera Course.  This is the only independent surveillance camera course, based on in-depth product and technology...
Favorite Wireless Manufacturers 2019 on Jun 12, 2019
Many wireless options exist for video surveillance but how are integrator's overall favorites? 170 integrators answered the question: What is...
Carnegie Mellon AI Startup Zensors Profile on Jun 11, 2019
Zensors is a startup formed by Carnegie Mellon graduates from a Carnegie Mellon research project, offering customized models per camera that they...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact