Access Control - Time & Attendance, Mustering and Mantraps Guide

Author: Brian Rhodes, Published on Jun 13, 2018

Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure, they can provide significant management, safety, and security advantages over locks and key alone.

In this note we examine three of the most powerful features available in modern systems:

  • Time & Attendance
  • Mustering
  • Mantraps

We explain each of these features in depth inside.

Time and Attendance

One of the most powerful features of EAC is the time/date stamp associated with every event in a system.

Not only do systems log when door opens, they also record whose credential was used to open them, typically down to the second, making them ideal for keeping track of employee attendance.

Time Logging makes it possible to 'track' a user's movement through a system, and provide a concrete record of where a person was at a given time. These logs have even been used to solve murders and otherwise establish presence at certain times with high precision.

Time Clock Function

With relatively minor adjustments, most access systems can use 'time logging' with time clocks.

Many workers are paid an hourly wage. Clearly establishing when they start their job and when they stop working is crucial, as 'time' is indeed 'money'. Capturing this time has traditionally been the function of precise clocks, where workers insert cards to have a the time indelibly punched out on a given day. Indeed, "punching the timeclock" is a common saying.

However, the method is not problem free. First and foremost, abuse is a risk, where an employee punches more than only his/her card. This type of fraud is at the forefront of many HR and Corporate issues. Many seek to eliminate this risk/temptation entirely. While time clocks are primarily intended to protect the employer, the employee also benefits from having a clear record of attendance to lean on when calculating paid vacation days, sick days, or overtime pay.

********** ****** ****** ******** **** *********** ********** ***** ******. ***** these ******** *** *** ** ** *********** ** ******* ***** secure, **** *** ******* *********** **********, ******, *** ******** ********** over ***** *** *** *****.

** **** **** ** ******* ***** ** *** **** ******** features ********* ** ****** *******:

  • **** & **********
  • *********
  • ********

** ******* **** ** ***** ******** ** ***** ******.

Time *** **********

*** ** *** **** ******** ******** ** *** ** *** time/date ***** ********** **** ***** ***** ** * ******.

*** **** ** ******* *** **** **** *****, **** **** record ***** ********** *** **** ** **** ****, ********* **** to *** ******, ****** **** ***** *** ******* ***** ** employee **********.

**** ******* ***** ** ******** ** '*****' * ****'* ******** through * ******, *** ******* * ******** ****** ** ***** a ****** *** ** * ***** ****. ***** **** **** even **** **** ******* ********** ********* ********* ******** ** ******* ***** **** **** *********.

Time ***** ********

**** ********** ***** ***********, **** ****** ******* *** *** '**** logging' ******** ******.

**** ******* *** **** ** ****** ****. ******* ************ **** they ***** ***** *** *** **** **** **** ******* ** crucial, ** '****' ** ****** '*****'. ********* **** **** *** traditionally **** *** ******** ** ******* ******, ***** ******* ****** cards ** **** * *** **** ********* ******* *** ** a ***** ***. ******, "******** *** *********" ** * ****** saying.

*******, *** ****** ** *** ******* ****. ***** *** ********, abuse ** * ****, ***** ** ******** ******* **** **** only ***/*** ****. **** **** ** ******* ** *** ********* ** **** ** *** ********* ******. **** **** ** ********* **** ****/********** ********. ***** **** clocks *** ********* ******** ** ******* *** ********, *** ******** also ******** **** ****** * ***** ****** ** ********** ** lean ** **** *********** **** ******** ****, **** ****, ** overtime ***.

[***************]

***** *** *** ****** *** **** & ********** ***** ***** setting ***** ******** ******* *** *** **** ******* ** ********* 'In' *** '***' ******* ** *** ******. **** * *** period ******, * ****** ** ******* ******* ******** ** ***** two *******, ******* *** '**' ******* *** *********** *** '***' intervals ******* ** ******** ****** ** **********.

Multi-Factor ***** *****

** ***** ** ***** *** ******* ** '***** ********' (* risk *** ******* ******** **** '********'), **** *** ********** ******* ***** ******* ******** ************** *******, including *********** ** **** *******. **** '***** **************' ******* **** no *** *** ******** ************ ********** ** ******* ******.

**** ****** *** **** & ********** ******* ******* **********, ********* resembling *** ******** *****:

***** ***** ** ******* *** ********* **** ** '**********' ********* systems **** ******* ** *** ****** *********, *** **** ********* cost **** ********** **** **** ****** ********. *** ******* ****** need ** ********* ** ******* **** ****.

Payroll ***********

**** *** ********* ****** '**** *** **********' ********, **** ** frequently **** **** ********** ****** *******. **** *** ******* **** format **** ** ** *** ** ******** ******** **** ******* systems. *******, **** ** ********* * ****** *******, *** ********** or ******* ***** ******* *********** ** *** ****** ******** ** collect *******.

*** ********** ***** **** ***********'* ******* ****** ****** ** **** *** ********** ****:

** ***** *****, '**** & **********' ******** *** ** ***** in *** ****** ********, *** ** ********** '******* ******' ** added ** *** ******** *** ****** ***********. **** ********** ******** becomes *** ******* ******* ********, ** ******** ** ***** ******* may **** ******** **** '***-********' ************.

Risk ***** ****** *** ***** *********

***** ***** ****** ** **** **** ***** ********* *** ** advantageous, ** ** *** ******* *****:

  • Clock *****: In effect, the EAC system clock serves as the payroll clock. While a variety of solutions for synchronizing/standardizing time exist, such as *** ********** ******* **** ******, *********** ******* ****** *** ***** ********** can ****** *********** ********. **** *** ** **** *** **** and **********, ******* ****** **** ** **** **** *** ***** standard **** ** *****.
  • Single ****** ********: Or rather '******* *** **** **** ** *** ******'. ** * ****** ** **********, ** **** *** ****** drops *******, ** **** **** **** *****. *** ******* ** granting ****** ******* ******* ***** *** ***** ** ****** ** issuing ********** ****, ** ****** ******** ****** *** **** *** Attendance ********. *** ***** **** ** **** ** ***** ****** timeclock ** * ******, **** ** ****, *** *** *** time *** ****** ** *******, ******** ********* *** ********* *******.
  • Passback *********: For access systems using 'Anti-Passback' controls, logic discrepancies can cause low-level conflicts with Time Clock readers. If an employee 'scans In' to the timeclock, and then immediately 'scans In' to a normally secured door, the EAC system may generate an alarm or deny access unless the timeclock reader is isolated from passback rules. Given the large number or doors across multiple sites, or large populations of employees in a single system, these sort of errors can be common and hard to troubleshoot.

Benefits *** ***** ****** *** ****/**********/*******

*******, ** ***** **** ******** ***** ** *** ****** ** host '**** *** **********' ********, *********:

  • Less ** ***, ********: While a single system can be a weakness, it can also be efficient. Many facilities prioritize the upkeep of facility access systems, and issuing a credential for access also means it can be used for payroll. The investment in one facility system can be leveraged by another.
  • Expanded ******** ********: In normal use, if an employee has a security credential revoked in an EAC system, they immediately become invalid in the payroll system. In addition, tying the two systems together can prevent an unauthorized employee from gaining access to an 'Time In' reader before an allotted shift and help manage overtime payouts, and payroll hour allocations are enforceable by physical access controls.

*********

******* ******** ******* ** ***** *** ****** **** ** ****** people ** * ******** ** ******** *****. ***** * *********** of **** *** *****, ********* ****** ** ***** ** ******** where **** ***, **** ****** ** *********.

*****, *** **** ****** / ************* ******* *** *** ***** of *********, ********* ** *** **** ************** ********* ** ********:

  • **** ********
  • ****** *****-**

Area ********

*** ******* ** ********* **** ****** ******* ** ******** * roster ** ********* ** * ******* ****. ***** **** ** occupant ***** * **** ** ***** *** ***** ** ****, the ****** ****** **** *** ****, ****, *** ********** ****** of *** **********. **** **** *** ** **** ** ********* who ** ** *** **** ** *** ***** ****, ********* emergency **********.

Manual *****-**

*************, ********* *** ** *********** ** **** ******* ** * 'opt-in' *******, ***** * ********** ****** ******* ** ** ********** point ** ******* ** *********** ***** **** ********. **** **** list ** ***** *** ** ******** ******* *** ******** **** of ******** *** ****** **** **** **** ****** ****** *********. The ****** ****** ***** ** ** ******* ****** ****** **** a '********* ******':

** ****** *** ****, *** **** ** ********* ** ** account *** ******** ***********, ** ** **** *** *** ********* present ****** ** ****, **** ********** ****** *** ** ***** to *********** ***** **** ***. ** ** ********* *********, *** resources ** ****** *** *** *********** *** *******, *** ****** an ******** **** ** *** ** ******* ***** ***** ***** to ***** *******.

Where ** ********* ****?

***** **** '********* **** *****', ********* ********* *** ** ******* in ******* ****. ** ********** ** ****** **********, ********* *** be **** *** '**** ***/ *** ***' **********, ***** ********* should *** ** ********* ** ** **** ********** ***** *** maintenance ********* *** ********* ***. ** **** *** *********** ****** has ******* ** ** ** ****, *** *** *** ******* out, *** ******** *** **-********* ***** ******** *** ** ********* for.

********, ** ********** ***** ******** ********** *** *********, **** *******, daycares, ** ********* *********, ********* *** ** ********** ** ****** that *** ******* ** * ***** *** ******* ** ** electronically ****** ******.

********* ** *** ********* ** ***********, ** *** **** ************* or ***** ******* ** ********** *********. *** **** *** '******** reports' ** **** ** ****** ******** ****** ** ********** ****, it *** **** ****** ** **** ******** ** ******* ********* alerting **** ** *********** (**: ****** ******, **** *******, ** other ********* *************).

Additional ****** ********

********* ** *** * ****** ********** *********, ********** ******** ************* and ******** *** ** ********. ** '********* *******' *** ****, then *********** **** ******** *** ** ** **** **** ********* a *** **********. **** ************* ***** ******** ***** *********** ***** readers ** *** ****** ** ******* ********* *** *** ********* in *** ******, ** *** **** *****-********* ***** ** ******** schedules ** ******* ********* *** ****.

*******, ***** ***** ** ********* *** ******* ********** *******. ** order ** **** ** ******** ********* ** *** ** ******* in ** ****, ********* **** '**** ***' **** **** *****. Most ****** ********** ******** ****** ******* '******** **' *** ******, so *** ******** ** ** *** ******, **** **** ******** is *** ****** ** **, **** **** *** ********** ** a ******.

********

*** ** *** ****** ********** ** ****** ******* ** ***** used *****. ************ **** ** ******** ******** ********* ****** ** **** ******* ** ******** ******, **** the ***** ******* ** '********' ** ********.

****** **** ** ******** **** *** **** ******** **** *** years, *** *** ******* ** ***** ******* ** * ****** of ********** ********** ** * ****** ** ****. ** **** note, ** **** ** ********, *** **** *** *********, *** where **** *** ****.

*** **** ***** ******** * ****** ******* * ******* ** use:

****** *** *** ********** ** *** ** *****:

  • *** ******* **** ****** ***** ******* *** ****, ***** *** inside ****** ***** * **********
  • *** ****** **** *******, *** *** ******* **** *****, ********** anyone **** ******** *** '********' ****.
  • *** ******* **** ******* ****** ***** *** ****** **** ****** and *******.

*** '***********' ****** ** *** ******* ****** **** *** **** to ** ******** *** **** ** * ****. ***** **** restricting ******, *** ******* ** *** ********* *** ****** *** environment ****** *** **** ** ** ********** (***********, ********, ****) before *********** ** ** *** ****** ****, ** **** ***********. When **** **** ***, "********" *** ***** ****** "********", *** even ** ******** ** *** *** ******* ****, *** ******* sequencing ** ***** ** *** ****.

Three ******* *******

*********, ******** *** *********** ** ********** ***** ** ** ***** primary ****:

Access ******* *****

****** ********** ***** *** ********** ************ ******* ****/****** ***** ** ****** ******. **** **********-***** *** ******* (including*********,*****, ******** *****, ***) ***** '*******' ************** ** **** ** their ******* **** ** ********** **** ****** ********** *** ***** to *** ******.

Specialty ***********

*** ************ ******* ****** ** *** ********* *** ********** ******* configuration, *** ***** ********** ***** *** **** ** ********* ******** on ****** *****. *** ***** ***** ***** *** ******* '******' controller **** ** ********* ** ********* ***** ** *** **** way **** ******** ****** ** *********:

Retrofit ********

** ***** *****, '******** ** * ***' (** '******* ******') are *****, ********** ***** ******** *** *******, *** ********** *** doors ** *** ********. ** **** *****, ***** '****' **** with ********* ***********, *** *** ** ********** ** **** **** existing *** ******* ** *******.

***** ******** ******* * ****** ***** ** *** ****** ** occupants ** * '********' ****; *******, *** ****** ** * time. ** ***** ** ********** ****, * ********** ***** **** be *********** ********** ** ******* *****, ******, *** *** **** sections. ***** **** ****** ** ******** ************, * "***" ****** you ** ******* ************* ******* ********** ** **** ***** ** the ****. *** ****** ***** **** ** ******* '***', *********** within ** ******** ******* ** ******** ** ** ******** ****:

*** ********* ***** ***** *** **** *** ***** ****, ***** entering ******* *** ****** ****, ******* *** ** ** *****, validating ****** *** **** ******* *** **** ******** ****.

Mantrap ****

** * **** *****, *** '*** *****' ****** ** ********* the ***** ********* ****** ** *** ** ******* ***** ****.

********* *********** **** * ***, ***** **** ***** *** ** not ******* ** ***, *** * ********** ******* ** ***** required. *** *******, * ********* ********** ***** ~$***, ****** **** installing ** *** ****** *** ********** **** **** ******** ******** functionality.

******** ******** **** * **** ****, ********* ******* ~$**** - $10000, *** **** ***** *** ** **** *********, **** **********, and ******* ********** **** * '***** *****' *******.

Common ****

***** **** '********** *******' **** * *****, ******** *** **** employed ** ******* ************* ** *****-***** ************* ** ******* ************, and ** ********-********* ****** ******** **** '**********'. **** ***** *** **** ******* ******* **** *******, ** that * ******* ** ******** *** ** ******** **** * police ******* ******* ****** *********** ** ******.

** **** *****, * ********* ********** *** ******** ** * jail/prison **** **** * ******-**** ******** ****. ** ***** ***** the ******** **** ** **, *** **** **** ** ******, preventing ******* **** ******** **** *** ******* *******. ********, **** the ******** **** ** ****, *** ****** **** ** ********, allowing * ******* *** ***** *** *******/******* ****, *** ****** to ****** ** *** ******* *******.

Safety *****

*** ******** ***** **** ***** ** *** ** ******** ****** largely ** ************ **** **************** *** ********. *** *******, * ***** *********** ** **** is ********** *********** **** ** ****** ******** *** ** ****** from **** ** *** '****/******' *********** ********. ******** ** *** which ***** ***** ***** ******** * ***** ************** ** *** building ****.

*** **** **********/*********/********** ***************, **** ****** ******* *** '****** ****', which ***** **** **** ****** **** ****** ** **********. ** this ****, ******** *** ** **** ** **** ****** *** of ** ****, *** **** ****** ** **** ** **** people ****** ***. ** *** ********** ***** *** *** **** to ******* **** ********* ******, **** ***** ******* ****** ****** paths **** ** ** ******* ****** *** ****.

** **** *****, ******** *** ******** ******** *** **** ***** interfaces *** ********, ** **** ** ** ********* ** *** can *********** ** ******* ****** * "********" ****.

Comments (1)

Food for thought,

In regards to cloning cards, is there any system out there right now that has the ability to set a time interval between reader locations that will generate an alarm if the card is read at each location within that time interval.

The simple way to look at this...I should not be able to read my card at a Seattle location at 7am and also walk through a door in San Diego 15 minutes later. Perhaps before my card works on any reader in a building I need to scan it at a security check point to enable my access, where I smile and also get my picture taken.

In performing the above action either someone has cloned my card or I found a teleport machine.

With all the reports available on these systems does this exist? Especially after card cloning has run amuck for years now.

In other words I should not be able to go thru a door in one building on the tenth floor and then read in another building on the 10th floor again in a minute time span.

How can one use their EAC to analyze for cloned cards? Seems they should just build a report off of card trace...that looks at all cards in a chronological order.

Any cool features such as this?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

July 2018 IP Networking Course on Jun 19, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Four Major Outdoor Camera Install Problems on Jun 14, 2018
Over 140 integrators told us the top four camera installation mistakes that lead to unexpected problems and failures. Their comments often...
China Public Video Surveillance Guide: From Skynet to Sharp Eyes on Jun 14, 2018
China is expanding its video surveillance network to achieve “100%” nationwide coverage by 2020, including facial recognition capabilities and a...
ReconaSense - The AI / Access Control / Analytics / IoT / Video Company Profile on Jun 12, 2018
One company's ISC West booth stood out for displaying a light-up tower of buzzwords. The company, ReconaSense, pledged to be 'making sense of it...
Powerline Networking For Video Surveillance Advocated By Comtrend on Jun 08, 2018
Powerline networking, using existing electrical wiring, has been around for many years. Indeed, over the years, some video surveillance providers...
The Benefits of An Access Control Test Door on Jun 08, 2018
Security system dealers can benefit from having their own access control test door both for demonstrations and training. Inside, we explain the...
Princeton Identity Access 200 Iris Scanners Examined on Jun 05, 2018
Iris recently registered a big jump as a preferred biometric in our Favorite Biometrics survey, but access-ready options can be difficult to...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...

Most Recent Industry Reports

IFSEC Show Report Day 2 Report on Jun 20, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
July 2018 IP Networking Course on Jun 19, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact