Access Control Advanced Features Guide

Author: Brian Rhodes, Published on Sep 15, 2015

Electronic access offers features that traditional mechanical locks cannot. While these feature may not be as fundamental as keeping doors secure, they can provide significant management, safety, and security advantages over locks and key alone.  In this note we examine three of the most powerful features available in modern systems:

  • Time & Attendance including time clocks, multi-factor authentication, payroll integration, costs, risks and benefits
  • Mustering covering area tracking vs checking in, use cases, additional design requirements, and system support
  • Mantraps inclduing EAC logic vs speciality controllers vs retrofit openings, costs, common uses and safety codes

We explain each of these features in depth inside.

********** ****** ****** ******** **** *********** ********** ***** ******. ***** ***** feature *** *** ** ** *********** ** ******* ***** ******, they *** ******* *********** **********, ******, *** ******** ********** **** locks *** *** *****.  ** **** **** ** ******* ***** of *** **** ******** ******** ********* ** ****** *******:

  • **** & ********** ********* **** ******, *****-****** **************, ******* ***********, costs, ***** *** ********
  • ********* ******** **** ******** ** ******** **, *** *****, ********** design ************, *** ****** *******
  • ******** ********* *** ***** ** ********** *********** ** ******** ********, costs, ****** **** *** ****** *****

** ******* **** ** ***** ******** ** ***** ******.

[***************]

**** *** **********

*** ** *** **** ******** ******** ** *** ** *** time/date ***** ********** **** ***** ***** ** * ******. *** only ** ******* *** **** **** *****, **** **** ****** whose ********** *** **** ** **** ****, ********* **** ** the ******, ****** **** ***** *** ******* ***** ** ******** attendance.

**** ******* ***** ** ******** ** '*****' * ****'* ******** through * ******, *** ******* * ******** ****** ** ***** a ****** *** ** * ***** ****. ***** **** **** even **** **** ** ***** ******* *** ********* ********* ******** ** ******* ***** **** **** *********.

**** ***** ********

**** ********** ***** ***********, **** *** ******* *** *** '**** logging' **** **** ******

**** ******* *** **** ** ****** ****. ******* ************ **** they ***** ***** *** *** **** **** **** ******* ** crucial, ** '****' ** ****** '*****'. ********* **** **** *** traditionally **** *** ******** ** ******* ******, ***** ******* ****** cards ** **** * *** **** ********* ******* *** ** a ***** ***. ******, "******** *** *********" ** * ****** ******.

*******, *** ****** ** *** ******* ****. ***** *** ********, abuse ** * ****, ***** ** ******** ******* **** **** only ***/*** ****. **** **** ** ***** ** ** *** ********* ** **** ** *** ********* ******. **** **** ** ********* **** ****/********** ********. ***** **** ****** *** primarily ******** ** ******* *** ********, *** ******** **** ******** from ****** * ***** ****** ** ********** ** **** ** **** calculating **** ******** ****, **** ****, ** ******** ***.

***** *** *** ****** *** **** & ********** ***** ***** setting ***** ******** ******* *** *** **** ******* ** ********* 'In' *** '***' ******* ** *** ******. **** * *** period ******, * ****** ** ******* ******* ******** ** ***** two *******, ******* *** '**' ******* *** *********** *** '***' intervals ******* ** ******** ****** ** **********.

*****-****** ***** *****

** ***** ** ***** *** ******* ** '***** ********' (* risk *** ******* ******** **** '********'), **** *** ********** ******* ****** ******* ******** ************** *******, including *********** ** **** *******. **** '***** **************' ******* **** no *** *** ******** ************ ********** ** ******* ******.

**** ****** *** **** & ********** ******* ******* **********, ********* resembling *** ******** *****:

***** ***** ** ******* *** ********* **** ** '**********' ********* systems **** ******* ** *** ****** *********, *** **** ********* cost **** ********** **** **** ****** ********. *** ******* ****** need ** ********* ** ******* **** ****. ******* ********* ****** readers can ** **** ** **** **** ************ (*.*., *** *** **/******'* *** ***** **** *** *******).

******* ***********

**** *** ********* ****** '**** *** **********' ********, **** ** frequently **** **** ********** ****** *******. **** *** ******* **** format **** ** ** *** ** ******** ******** **** ******* systems **** ****** ** ****. *******, **** ** ********* * ****** *******, *** ********** or ******* ***** ******* *********** ** *** ****** ******** ** collect *******. *** ********** ***** **** ***** ******'* ******* ****** ****** ** **** *** ********** ****:

** ***** *****, '**** & **********' ******** *** ** ***** in *** ****** ********, *** ** ********** '******* ******' ** added ** *** ******** *** ****** ***********. **** ********** ******** becomes *** ******* ******* ********, ** ******** ** ***** ******* may **** ******** **** '***-********' ************.

****** **********-***** ********* ***** ********** '******** ******' *********, *********:

**** & ********** *****

*******: *** ***** ****** *** * ******* **** ****** *** ** you **** ** ***** ***** ********, **** *** ********** ********* readers ***** ******* ~$*** *** ~$**** ****, **** ****-******** ******* fingerprint ******* ******* ****** $*** ****. (*** *** ****** ** *********** ******* *** **** ******.) ******** ******* *** ** ******** *** ***** sites, *** ********* *** *** ****** ***** ******** ****** *********** or ********** ** ******* ***** *******.

***** ********: ******* ***** ** *** * **** *** ********** ****** ***** from '****' ******* ** ~$****. **** ********* ***** * '** ********** ****' ********* ************* ** ***** ***** ******, *** *** **** **** be ******** ************ **** * ******* ********. 

******** ********: *** ***** ******** / *********** ****** ******** **** ********* *********, but ********* ***** ******* ~$*** *** ~$****, ********* ********* ** the **** ** * *******'* ******** ****** *** ****** ** sites **** ** *********. *** **** ********** ****** *******, ***** modules **** ***** ~$*,*** ****.

**** *** *** *****?

***** ***** *** ** **** **** ***** ******** *** ** advantageous, ** ** *** ******* *****:

  • Clock *****: In effect, the EAC system clock serves as the payroll clock. While a variety of solutions for syncronizing/standardizing time exist, such as *** ******* *** ******* **** ******, *********** ******* *** *** ***** ********** can ****** *********** ********. **** *** ** **** *** **** and **********, ******* ****** **** ** **** **** *** ***** standard **** ** *****.
  • Single ****** ********: Or rather '******* *** **** **** ** *** ******'. ** * ****** ** **********, ** **** *** ****** drops *******, ** **** **** **** *****. *** ******* ** granting ****** ******* ******* ***** *** ***** ** ****** ** issuing ********** ****, ** ****** ******** ****** *** **** *** Attendance ********. *** ***** **** ** **** ** ***** ****** timeclock ** * ******, **** ** ****, *** *** *** time *** ****** ** *******, ******** ********* *** ********* *******.
  • Passback *********: For access systems using 'Anti-Passback' controls, logic discrepancies can cause low-level conflicts with Time Clock readers. If an employee 'scans In' to the timeclock, and then immediately 'scans In' to a normally secured door, the EAC system may generate an alarm or deny access unless the timeclock reader is isolated from passback rules. Given the large number or doors across multiple sites, or large populations of employees in a single system, these sort of errors can be common and hard to troubleshoot.

**** *** *** ********?

*******, ** ***** **** ******** ***** ** *** *** ** host '**** *** **********' ********, *********:

  • Less ** ***, ********: While a single system can be a weakness, it can also be efficient. Many facilities prioritize the upkeep of facility access systems, and issuing a credential for access also means it can be used for payroll. The investment in one facility system can be leveraged by another.
  • Expanded ******** ********: In normal use, if an employee has a security credential revoked in an EAC system, they immediately become invalid in the payroll system. In addition, tying the two systems together can prevent an unauthorized employee from gaining access to an 'Time In' reader before an allotted shift and help manage overtime payouts, and payroll hour allocations are enforceable by physical access controls. 

*********

******* ******** ******* ** ***** *** ****** **** ** ****** people ** * ******** ** ******** *****. ***** * *********** of **** *** *****, ********* ****** ** ***** ** ******** where **** ***, **** ****** ** *********.

*********'* *** **********

*****, *** **** ****** / ************* ******* *** *** ***** of *********, ********* ** *** **** ************* ********* ** ********:

  • **** ********
  • ******** **

**** ********: *** ******* ** ********* **** ****** ******* ** ******** * roster ** ********* ** * ******* ****. ***** **** ** occupant ***** * **** ** ***** *** ***** ** ****, the ****** ****** **** *** ****, ****, *** ********** ****** of *** **********. **** **** *** ** **** ** ********* who ** ** *** **** ** *** ***** ****, ********* emergency **********.

******** **: *************, ********* *** ** *********** ** **** ******* ** * 'opt-in' *******, ***** * ********** ****** ******* ** ** ********** point ** ******* ** *********** ***** **** ********. **** **** list ** ***** *** ** ******** ******* *** ******** **** of ******** *** ****** **** **** **** ****** ****** *********. The ****** ****** ***** ** ** ******* ****** ****** **** a '********* ******':

** ****** *** ****, *** **** ** ********* ** ** account *** ******** ***********, ** ** **** *** *** ********* present ****** ** ****, **** ********** ****** *** ** ***** to *********** ***** **** ***. ** ** ********* *********, *** resources ** ****** *** *** *********** *** *******, *** ****** an ******** **** ** *** ** ******* ***** ***** ***** to ***** *******.

***** ** ********* ****?

***** **** '********* **** *****', ********* ********* *** ** ******* in ******* ****. ** ********** ** ****** **********, ********* *** be **** *** '**** ***/ *** ***' **********, ***** ********* should *** ** ********* ** ** **** ********** ***** *** maintenance ********* *** ********* ***. ** **** *** *********** ****** has ******* ** ** ** ****, *** *** *** ******* out, *** ******** *** **-********* ***** ******** *** ** ********* for.

********, ** ********** ***** ******** ********** *** *********, **** *******, daycares, ** ********* *********, ********* *** ** ********** ** ****** that *** ******* ** * ***** *** ******* ** ** electronically ****** ******. 

********* ** *** ********* ** ***********, ** *** **** ************* or ***** ******* ** ********** *********. *** **** *** '******** reports' ** **** ** ****** ******** ****** ** ********** ****, it *** **** ****** ** **** ******** ** ******* ********* alerting **** ** *********** (**: ****** ******, **** *******, ** other ********* *************).

********** ****** ********

********* ** *** * ****** ********** *********, ********** ******** ************* and ******** *** ** ********. ** '********* *******' *** ****, then *********** **** ******** *** ** ** **** **** ********* a *** **********. **** ************* ***** ******** ***** *********** ***** readers ** *** ****** ** ******* ********* *** *** ********* in *** ******, ** *** **** *****-********* ***** ** ******** schedules ** ******* ********* *** ****.

*******, ***** ***** ** ********* *** ******* ********** *******. ** ***** to **** ** ******** ********* ** *** ** ******* ** an ****, ********* **** '**** ***' **** **** *****. **** access ********** ******** ****** ******* '******** **' *** ******, ** *** ******** of ** *** ******, **** **** ******** ** *** ****** to **, **** **** *** ********** ** * ******.

****** ********

************** ** *** ******* ****** ** ****** ******* ********, *** is ********* ********* ** ********** ***** *********. *** *******:

  • *****: ***** ******** ** ***** ******* ********* ** *** ** *********** ******** readers ** "********** ******", ******* ******* ******** ******* ********* ********* that ******** * **** ** ***** ** ** **** ** demand. 
  • ***: **** ****** ******** ********* *******, ** **** ** *****/****** linking **** *** ** **** ** ****** '********* *******'. **** 'Time & **********' ******* *** ****, ********* ******* *** ** filtered ** *** ** ********* ******* ** * ********.
  • *****: ******* ******** **** ********* ******* *** ********* ******* ****** in *** ********, *** *** ** ********** **** ***** *******.

** ********* ** ********* ** ***, **** **** ** ***** carefully ***** *** ** ** *********** ** **** ****** ******* software ** ********** *** ************ **** *******.

********

*** ** *** ****** ********** ** ****** ******* ** ***** used *****. ******** **** **** ** ******** ***** *** ********* ****** ** **** ******* ** ******** ******, **** the ***** ******* ** '********' ** ********. ****** **** ** mantraps **** *** **** ******** **** *** *****, *** *** concept ** ***** ******* ** * ****** ** ********** ********** in * ****** ** ****. ** **** ****, ** **** at ********, *** **** *** *********, *** ***** **** *** used.

********

*** **** ***** ******** * ****** ******* * ******* ** use: 

****** *** *** ********** ** *** ** *****:

  • *** ******* **** ****** ***** ******* *** ****, ***** *** inside ****** ***** * **********
  • *** ****** **** *******, *** *** ******* **** *****, ********** anyone **** ******** *** '********' ****. 
  • *** ******* **** ******* ****** ***** *** ****** **** ****** and *******.

*** '***********' ****** ** *** ******* ****** **** *** **** to ** ******** *** **** ** * ****. ***** **** restricting ******, *** ******* ** *** ********* *** ****** *** environment ****** *** **** ** ** ********** (***********, ********, ****) before *********** ** ** *** ****** ****, ** **** ***********. When **** **** ***, "********" *** ***** ****** "********", *** even ** ******** ** *** *** ******* ****, *** ******* sequencing ** ***** ** *** ****.

***** *******

*********, ******** *** *********** ** ********** ***** ** ** ***** primary ****:

*** *****

****** ********** ***** *** ********** ***** ******* ***** ** ****/****** ***** ** ****** ******. **** **********-***** *** ******* (********* **************, ******** *****, ***) ***** '*******' ************** ** **** ** their ******* **** ** ********** **** ****** ********** *** ***** to *** ******.

********* ***********

*** ************ ******* *** ** *** ********* *** ********** ******* configuration, *** ***** ********** ***** *** **** ** ********* ******** on ****** *****. *** ***** ***** ***** *** ******* '******' controller **** ** ********* ** ********* ***** ** *** **** way **** ******** *** ** *********:

******** ********

** ***** *****, '******** ** * ***' (** '******* ******') *** *****, ********** ***** ******** *** desired, *** ********** *** ***** ** *** ********. ** **** cases, ***** '****' **** **** ********* ***********, *** *** ** configured ** **** **** ******** *** ******* ** *******. ***** ******** feature * ****** ***** ** *** ****** ** ********* ** * 'passthru' ****; *******, *** ****** ** * ****. ** ***** ** accomplish ****, * ********** ***** **** ** *********** ********** ** several *****, ******, *** *** **** ********. ***** **** ****** be ******** ************, * "***" ****** *** ** ******* ************* sliding ********** ** **** ***** ** *** ****. *** ****** below **** ** ******* '***', *********** ****** ** ******** ******* or ******** ** ** ******** ****:

*** ********* ***** ***** *** **** *** ***** ****, ***** entering ******* *** ****** ****, ******* *** ** ** *****, validating ****** *** **** ******* *** **** ******** ****.

******* ****

** * **** *****, *** '*** *****' ****** ** ********* the ***** ********* ****** ** *** ** ******* ***** ****. 

********* *********** **** * ***, ***** **** ***** *** ** not ******* ** ***, *** * ********** ******* ** ***** required. *** *******, * ********* ********** ***** ~$***, ****** **** installing ** *** ****** *** ********** **** **** ******** ******** functionality.

******** ******** **** * **** ****, ********* ******* ~$**** - $10000, *** **** ***** *** ** **** *********, **** **********, and ******* ********** **** * '***** *****' *******.

****** ****

***** **** '********** *******' **** * *****, ******** *** **** employed ** ******* ************* ** *****-***** ************* ** ******* ************, and ** ********-********* ****** ******** **** '**********'. **** ***** *** **** ******* ******* **** *******, ** that * ******* ** ******** *** ** ******** **** * police ******* ******* ****** *********** ** ******. 

** **** *****, * ********* ********** *** ******** ** * jail/prison **** **** * ******-**** ******** ****. ** ***** ***** the ******** **** ** **, *** **** **** ** ******, preventing ******* **** ******** **** *** ******* *******. ********, **** the ******** **** ** ****, *** ****** **** ** ********, allowing * ******* *** ***** *** *******/******* ****, *** ****** to ****** ** *** ******* *******. 

****** *****

*** ******** ***** **** ***** ** *** ** ******** ****** largely ** *** ********* **** ************** ** *** ********. *** *******, * ***** *********** ** **** is ********** *********** **** ** ****** ********, *** ** ****** from **** ** *** '****/******' *********** ********. ******** ** *** which ***** ***** ***** ******** * ***** ************** ** *** building ****.

*** **** **********/*********/********** ***************, **** ****** ******* *** '****** ****', which ***** **** **** ****** **** ****** ** **********. ** this ****, ******** *** ** **** ** **** ****** *** of ** ****, *** **** ****** ** **** ** **** people ****** ***. ** *** ********** ***** *** *** **** to ******* **** ********* ******, **** ***** ******* ****** ****** paths **** ** ** ******* ****** *** ****.

** **** *****, ******** *** ******** ******** *** **** ***** interfaces *** ********, ** **** ** ** ********* ** *** can *********** ** ******* ****** * "********" ****. 

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Technician Personal Protective Equipment (PPE) Guide on May 12, 2017
Technicians encounter multiple hazards when running wires and installing security devices. Wearing personal protective equipment, or PPE, helps...
Burglar Alarm Partitions Guide on May 10, 2017
Many burglar alarm systems have a single designated level of access for users. A user can arm or disarm the entire alarm by entering a single code....
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...
IPVM First Dean's List W2017 - Thomas Atkinson, Matt Hurly and Fredrik Lundqvist on Apr 24, 2017
IPVM is happy to congratulate and celebrate our first "Dean's List", the top students in our courses. For the Winter 2017 IP Networking course...
Splicing Alarm Circuits Guide on Apr 23, 2017
Alarm installers commonly connect multiple sensors to a single zone. They do this by splicing the wires together. In this report, we will explain...

Most Recent Industry Reports

Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...
Aura's 'Invisible Ripple' Next Gen Intrusion Detection Tested on May 22, 2017
Aura Home is a startup intrusion detection system, but it claims new, high-tech sensing that monitors the 'invisible ripples' movement creates,...
Pelco Shutting Down Clovis Line, Laying Off 200 on May 22, 2017
Pelco's Clovis facility once turned out some of the industry's most popular products. Now, the facility is mostly building "obsolete" equipment,...
IP Camera - 15 Year Shootout on May 22, 2017
How far have IP cameras come? We bought and tested 4 cameras across the past 15 years to understand how much and where performance has...
Remote Video Monitoring Providers Directory on May 19, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...
Axis Criticizes OEMs: "When You Buy An Axis Camera, An Axis Camera Is What You Get!" on May 19, 2017
When you buy a Honeywell camera, you likely get a Hikvision, Dahua or some other company's product. The same goes for easily 100 different...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Forget The Backdoor, "ALL HIKVISION PRODUCTS" On Sale on May 18, 2017
Less than 2 weeks after the Hikvision Backdoor was confirmed, Hikvision has launched a sale "ON ALL HIKVISION PRODUCTS". In this note, we examine...
Amazon Techs Installing IP Cameras Tested on May 18, 2017
In 2015, Amazon started offering video surveillance installation. Now, Amazon has made it a lot easier, with automatic add-on options and...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact