Access Control - Time & Attendance, Mustering and Mantraps Guide

Author: Brian Rhodes, Published on Jun 13, 2018

Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure, they can provide significant management, safety, and security advantages over locks and key alone.

In this note we examine three of the most powerful features available in modern systems:

  • Time & Attendance
  • Mustering
  • Mantraps

We explain each of these features in depth inside.

Time and Attendance

One of the most powerful features of EAC is the time/date stamp associated with every event in a system.

Not only do systems log when door opens, they also record whose credential was used to open them, typically down to the second, making them ideal for keeping track of employee attendance.

Time Logging makes it possible to 'track' a user's movement through a system, and provide a concrete record of where a person was at a given time. These logs have even been used to solve murders and otherwise establish presence at certain times with high precision.

Time Clock Function

With relatively minor adjustments, most access systems can use 'time logging' with time clocks.

Many workers are paid an hourly wage. Clearly establishing when they start their job and when they stop working is crucial, as 'time' is indeed 'money'. Capturing this time has traditionally been the function of precise clocks, where workers insert cards to have a the time indelibly punched out on a given day. Indeed, "punching the timeclock" is a common saying.

However, the method is not problem free. First and foremost, abuse is a risk, where an employee punches more than only his/her card. This type of fraud is at the forefront of many HR and Corporate issues. Many seek to eliminate this risk/temptation entirely. While time clocks are primarily intended to protect the employer, the employee also benefits from having a clear record of attendance to lean on when calculating paid vacation days, sick days, or overtime pay.

********** ****** ****** ******** **** *********** ********** ***** ******. ***** these ******** *** *** ** ** *********** ** ******* ***** secure, **** *** ******* *********** **********, ******, *** ******** ********** over ***** *** *** *****.

** **** **** ** ******* ***** ** *** **** ******** features ********* ** ****** *******:

  • **** & **********
  • *********
  • ********

** ******* **** ** ***** ******** ** ***** ******.

Time *** **********

*** ** *** **** ******** ******** ** *** ** *** time/date ***** ********** **** ***** ***** ** * ******.

*** **** ** ******* *** **** **** *****, **** **** record ***** ********** *** **** ** **** ****, ********* **** to *** ******, ****** **** ***** *** ******* ***** ** employee **********.

**** ******* ***** ** ******** ** '*****' * ****'* ******** through * ******, *** ******* * ******** ****** ** ***** a ****** *** ** * ***** ****. ***** **** **** even **** **** ******* ********** ********* ********* ******** ** ******* ***** **** **** *********.

Time ***** ********

**** ********** ***** ***********, **** ****** ******* *** *** '**** logging' ******** ******.

**** ******* *** **** ** ****** ****. ******* ************ **** they ***** ***** *** *** **** **** **** ******* ** crucial, ** '****' ** ****** '*****'. ********* **** **** *** traditionally **** *** ******** ** ******* ******, ***** ******* ****** cards ** **** * *** **** ********* ******* *** ** a ***** ***. ******, "******** *** *********" ** * ****** saying.

*******, *** ****** ** *** ******* ****. ***** *** ********, abuse ** * ****, ***** ** ******** ******* **** **** only ***/*** ****. **** **** ** ******* ** *** ********* ** **** ** *** ********* ******. **** **** ** ********* **** ****/********** ********. ***** **** clocks *** ********* ******** ** ******* *** ********, *** ******** also ******** **** ****** * ***** ****** ** ********** ** lean ** **** *********** **** ******** ****, **** ****, ** overtime ***.

[***************]

***** *** *** ****** *** **** & ********** ***** ***** setting ***** ******** ******* *** *** **** ******* ** ********* 'In' *** '***' ******* ** *** ******. **** * *** period ******, * ****** ** ******* ******* ******** ** ***** two *******, ******* *** '**' ******* *** *********** *** '***' intervals ******* ** ******** ****** ** **********.

Multi-Factor ***** *****

** ***** ** ***** *** ******* ** '***** ********' (* risk *** ******* ******** **** '********'), **** *** ********** ******* ***** ******* ******** ************** *******, including *********** ** **** *******. **** '***** **************' ******* **** no *** *** ******** ************ ********** ** ******* ******.

**** ****** *** **** & ********** ******* ******* **********, ********* resembling *** ******** *****:

***** ***** ** ******* *** ********* **** ** '**********' ********* systems **** ******* ** *** ****** *********, *** **** ********* cost **** ********** **** **** ****** ********. *** ******* ****** need ** ********* ** ******* **** ****.

Payroll ***********

**** *** ********* ****** '**** *** **********' ********, **** ** frequently **** **** ********** ****** *******. **** *** ******* **** format **** ** ** *** ** ******** ******** **** ******* systems. *******, **** ** ********* * ****** *******, *** ********** or ******* ***** ******* *********** ** *** ****** ******** ** collect *******.

*** ********** ***** **** ***********'* ******* ****** ****** ** **** *** ********** ****:

** ***** *****, '**** & **********' ******** *** ** ***** in *** ****** ********, *** ** ********** '******* ******' ** added ** *** ******** *** ****** ***********. **** ********** ******** becomes *** ******* ******* ********, ** ******** ** ***** ******* may **** ******** **** '***-********' ************.

Risk ***** ****** *** ***** *********

***** ***** ****** ** **** **** ***** ********* *** ** advantageous, ** ** *** ******* *****:

  • Clock *****: In effect, the EAC system clock serves as the payroll clock. While a variety of solutions for synchronizing/standardizing time exist, such as *** ********** ******* **** ******, *********** ******* ****** *** ***** ********** can ****** *********** ********. **** *** ** **** *** **** and **********, ******* ****** **** ** **** **** *** ***** standard **** ** *****.
  • Single ****** ********: Or rather '******* *** **** **** ** *** ******'. ** * ****** ** **********, ** **** *** ****** drops *******, ** **** **** **** *****. *** ******* ** granting ****** ******* ******* ***** *** ***** ** ****** ** issuing ********** ****, ** ****** ******** ****** *** **** *** Attendance ********. *** ***** **** ** **** ** ***** ****** timeclock ** * ******, **** ** ****, *** *** *** time *** ****** ** *******, ******** ********* *** ********* *******.
  • Passback *********: For access systems using 'Anti-Passback' controls, logic discrepancies can cause low-level conflicts with Time Clock readers. If an employee 'scans In' to the timeclock, and then immediately 'scans In' to a normally secured door, the EAC system may generate an alarm or deny access unless the timeclock reader is isolated from passback rules. Given the large number or doors across multiple sites, or large populations of employees in a single system, these sort of errors can be common and hard to troubleshoot.

Benefits *** ***** ****** *** ****/**********/*******

*******, ** ***** **** ******** ***** ** *** ****** ** host '**** *** **********' ********, *********:

  • Less ** ***, ********: While a single system can be a weakness, it can also be efficient. Many facilities prioritize the upkeep of facility access systems, and issuing a credential for access also means it can be used for payroll. The investment in one facility system can be leveraged by another.
  • Expanded ******** ********: In normal use, if an employee has a security credential revoked in an EAC system, they immediately become invalid in the payroll system. In addition, tying the two systems together can prevent an unauthorized employee from gaining access to an 'Time In' reader before an allotted shift and help manage overtime payouts, and payroll hour allocations are enforceable by physical access controls.

*********

******* ******** ******* ** ***** *** ****** **** ** ****** people ** * ******** ** ******** *****. ***** * *********** of **** *** *****, ********* ****** ** ***** ** ******** where **** ***, **** ****** ** *********.

*****, *** **** ****** / ************* ******* *** *** ***** of *********, ********* ** *** **** ************** ********* ** ********:

  • **** ********
  • ****** *****-**

Area ********

*** ******* ** ********* **** ****** ******* ** ******** * roster ** ********* ** * ******* ****. ***** **** ** occupant ***** * **** ** ***** *** ***** ** ****, the ****** ****** **** *** ****, ****, *** ********** ****** of *** **********. **** **** *** ** **** ** ********* who ** ** *** **** ** *** ***** ****, ********* emergency **********.

Manual *****-**

*************, ********* *** ** *********** ** **** ******* ** * 'opt-in' *******, ***** * ********** ****** ******* ** ** ********** point ** ******* ** *********** ***** **** ********. **** **** list ** ***** *** ** ******** ******* *** ******** **** of ******** *** ****** **** **** **** ****** ****** *********. The ****** ****** ***** ** ** ******* ****** ****** **** a '********* ******':

** ****** *** ****, *** **** ** ********* ** ** account *** ******** ***********, ** ** **** *** *** ********* present ****** ** ****, **** ********** ****** *** ** ***** to *********** ***** **** ***. ** ** ********* *********, *** resources ** ****** *** *** *********** *** *******, *** ****** an ******** **** ** *** ** ******* ***** ***** ***** to ***** *******.

Where ** ********* ****?

***** **** '********* **** *****', ********* ********* *** ** ******* in ******* ****. ** ********** ** ****** **********, ********* *** be **** *** '**** ***/ *** ***' **********, ***** ********* should *** ** ********* ** ** **** ********** ***** *** maintenance ********* *** ********* ***. ** **** *** *********** ****** has ******* ** ** ** ****, *** *** *** ******* out, *** ******** *** **-********* ***** ******** *** ** ********* for.

********, ** ********** ***** ******** ********** *** *********, **** *******, daycares, ** ********* *********, ********* *** ** ********** ** ****** that *** ******* ** * ***** *** ******* ** ** electronically ****** ******.

********* ** *** ********* ** ***********, ** *** **** ************* or ***** ******* ** ********** *********. *** **** *** '******** reports' ** **** ** ****** ******** ****** ** ********** ****, it *** **** ****** ** **** ******** ** ******* ********* alerting **** ** *********** (**: ****** ******, **** *******, ** other ********* *************).

Additional ****** ********

********* ** *** * ****** ********** *********, ********** ******** ************* and ******** *** ** ********. ** '********* *******' *** ****, then *********** **** ******** *** ** ** **** **** ********* a *** **********. **** ************* ***** ******** ***** *********** ***** readers ** *** ****** ** ******* ********* *** *** ********* in *** ******, ** *** **** *****-********* ***** ** ******** schedules ** ******* ********* *** ****.

*******, ***** ***** ** ********* *** ******* ********** *******. ** order ** **** ** ******** ********* ** *** ** ******* in ** ****, ********* **** '**** ***' **** **** *****. Most ****** ********** ******** ****** ******* '******** **' *** ******, so *** ******** ** ** *** ******, **** **** ******** is *** ****** ** **, **** **** *** ********** ** a ******.

********

*** ** *** ****** ********** ** ****** ******* ** ***** used *****. ************ **** ** ******** ******** ********* ****** ** **** ******* ** ******** ******, **** the ***** ******* ** '********' ** ********.

****** **** ** ******** **** *** **** ******** **** *** years, *** *** ******* ** ***** ******* ** * ****** of ********** ********** ** * ****** ** ****. ** **** note, ** **** ** ********, *** **** *** *********, *** where **** *** ****.

*** **** ***** ******** * ****** ******* * ******* ** use:

****** *** *** ********** ** *** ** *****:

  • *** ******* **** ****** ***** ******* *** ****, ***** *** inside ****** ***** * **********
  • *** ****** **** *******, *** *** ******* **** *****, ********** anyone **** ******** *** '********' ****.
  • *** ******* **** ******* ****** ***** *** ****** **** ****** and *******.

*** '***********' ****** ** *** ******* ****** **** *** **** to ** ******** *** **** ** * ****. ***** **** restricting ******, *** ******* ** *** ********* *** ****** *** environment ****** *** **** ** ** ********** (***********, ********, ****) before *********** ** ** *** ****** ****, ** **** ***********. When **** **** ***, "********" *** ***** ****** "********", *** even ** ******** ** *** *** ******* ****, *** ******* sequencing ** ***** ** *** ****.

Three ******* *******

*********, ******** *** *********** ** ********** ***** ** ** ***** primary ****:

Access ******* *****

****** ********** ***** *** ********** ************ ******* ****/****** ***** ** ****** ******. **** **********-***** *** ******* (including*********,*****, ******** *****, ***) ***** '*******' ************** ** **** ** their ******* **** ** ********** **** ****** ********** *** ***** to *** ******.

Specialty ***********

*** ************ ******* ****** ** *** ********* *** ********** ******* configuration, *** ***** ********** ***** *** **** ** ********* ******** on ****** *****. *** ***** ***** ***** *** ******* '******' controller **** ** ********* ** ********* ***** ** *** **** way **** ******** ****** ** *********:

Retrofit ********

** ***** *****, '******** ** * ***' (** '******* ******') are *****, ********** ***** ******** *** *******, *** ********** *** doors ** *** ********. ** **** *****, ***** '****' **** with ********* ***********, *** *** ** ********** ** **** **** existing *** ******* ** *******.

***** ******** ******* * ****** ***** ** *** ****** ** occupants ** * '********' ****; *******, *** ****** ** * time. ** ***** ** ********** ****, * ********** ***** **** be *********** ********** ** ******* *****, ******, *** *** **** sections. ***** **** ****** ** ******** ************, * "***" ****** you ** ******* ************* ******* ********** ** **** ***** ** the ****. *** ****** ***** **** ** ******* '***', *********** within ** ******** ******* ** ******** ** ** ******** ****:

*** ********* ***** ***** *** **** *** ***** ****, ***** entering ******* *** ****** ****, ******* *** ** ** *****, validating ****** *** **** ******* *** **** ******** ****.

Mantrap ****

** * **** *****, *** '*** *****' ****** ** ********* the ***** ********* ****** ** *** ** ******* ***** ****.

********* *********** **** * ***, ***** **** ***** *** ** not ******* ** ***, *** * ********** ******* ** ***** required. *** *******, * ********* ********** ***** ~$***, ****** **** installing ** *** ****** *** ********** **** **** ******** ******** functionality.

******** ******** **** * **** ****, ********* ******* ~$**** - $10000, *** **** ***** *** ** **** *********, **** **********, and ******* ********** **** * '***** *****' *******.

Common ****

***** **** '********** *******' **** * *****, ******** *** **** employed ** ******* ************* ** *****-***** ************* ** ******* ************, and ** ********-********* ****** ******** **** '**********'. **** ***** *** **** ******* ******* **** *******, ** that * ******* ** ******** *** ** ******** **** * police ******* ******* ****** *********** ** ******.

** **** *****, * ********* ********** *** ******** ** * jail/prison **** **** * ******-**** ******** ****. ** ***** ***** the ******** **** ** **, *** **** **** ** ******, preventing ******* **** ******** **** *** ******* *******. ********, **** the ******** **** ** ****, *** ****** **** ** ********, allowing * ******* *** ***** *** *******/******* ****, *** ****** to ****** ** *** ******* *******.

Safety *****

*** ******** ***** **** ***** ** *** ** ******** ****** largely ** ************ **** **************** *** ********. *** *******, * ***** *********** ** **** is ********** *********** **** ** ****** ******** *** ** ****** from **** ** *** '****/******' *********** ********. ******** ** *** which ***** ***** ***** ******** * ***** ************** ** *** building ****.

*** **** **********/*********/********** ***************, **** ****** ******* *** '****** ****', which ***** **** **** ****** **** ****** ** **********. ** this ****, ******** *** ** **** ** **** ****** *** of ** ****, *** **** ****** ** **** ** **** people ****** ***. ** *** ********** ***** *** *** **** to ******* **** ********* ******, **** ***** ******* ****** ****** paths **** ** ** ******* ****** *** ****.

** **** *****, ******** *** ******** ******** *** **** ***** interfaces *** ********, ** **** ** ** ********* ** *** can *********** ** ******* ****** * "********" ****.

Comments (1)

Food for thought,

In regards to cloning cards, is there any system out there right now that has the ability to set a time interval between reader locations that will generate an alarm if the card is read at each location within that time interval.

The simple way to look at this...I should not be able to read my card at a Seattle location at 7am and also walk through a door in San Diego 15 minutes later. Perhaps before my card works on any reader in a building I need to scan it at a security check point to enable my access, where I smile and also get my picture taken.

In performing the above action either someone has cloned my card or I found a teleport machine.

With all the reports available on these systems does this exist? Especially after card cloning has run amuck for years now.

In other words I should not be able to go thru a door in one building on the tenth floor and then read in another building on the 10th floor again in a minute time span.

How can one use their EAC to analyze for cloned cards? Seems they should just build a report off of card trace...that looks at all cards in a chronological order.

Any cool features such as this?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Bandwidth vs Low Light Shootout - Avigilon, Axis, Bosch, Dahua, Geovision, Hanwha, Hikvision, Uniview, Vivotek on Feb 08, 2019
Nighttime bandwidth spikes are a major concern in video surveillance, but do all manufacturers' cameras perform the same? Are some more consistent...
HID Launches Origo To Fix Mobile Credential Problems on Feb 05, 2019
HID is releasing Origo, an overhaul of its mobile credential platform, this time drastically restructuring the way it is priced and packaged. HID's...
Designing Access Control Guide on Jan 30, 2019
Designing an access control solution requires decisions on 8 fundamental questions. This in-depth guide helps you understand the options and...
Access Control Turnstiles Guide on Jan 28, 2019
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stop...
Genetec Favorability Report 2019 on Jan 25, 2019
Genetec's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing solid, but...
Testing Bandwidth vs. Frame Rate on Jan 23, 2019
Selecting frame rate has a major impact on surveillance bandwidth and storage consumption. But with smart codecs now common and cameras more...
Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...

Most Recent Industry Reports

Casino Surveillance Pro Interview: James Lathrop on Feb 15, 2019
James Lathrop has been working in casinos for almost 25 years. During that time, he says he has held "just about every job you can do in the...
Hikvision 2018 Revenue Tops $7 Billion USD But Growth Slows To Low on Feb 15, 2019
Hikvision's annual revenue topped $7 billion for the first time in 2018, although growth slowed sharply. In this post, we analyze the latest...
Hanwha Smaller Multi Imager Tested (PNM-9000VQ) on Feb 14, 2019
Hanwha's first repositionable multi imager PNM-9081VQ tested well, but was huge, over 12" wide and weighing in at over 10 pounds. Now, they have...
ADT And 'The Defenders' Silent About Massive Complaints on Feb 14, 2019
ADT's largest dealer, "The Defenders" has been the subject of a massive number of complaints over many years and many forums, most recently a CBS...
Hikvision Chairman Praises United Front on Feb 14, 2019
Hikvision’s controlling shareholder held a meeting last month praising the United Front, a Communist Party organization known for its secretive...
Sales Turnover At Anyvision on Feb 13, 2019
Anyvision raised a $43 million Series A and according to their newest investor: what you need to do is push the gas pedal and build an...
Cisco Meraki Cloud VMS/Cameras Tested on Feb 13, 2019
Cisco Meraki says their cameras "bring Meraki magic to the enterprise video security world". According to Meraki, their magic is their management...
Uniview / UNV Favorability Results 2019 on Feb 12, 2019
Uniview / UNV, the self-proclaimed #3 China manufacturer, while starting late, has been working to make inroads internationally. In IPVM's 2019...
Nortek Mobile Access Reader BluePass Examined on Feb 12, 2019
Nortek's Linear access control division claims to make mobile credentials "more secure and easier to use than ever before" with their BluePass...
Solink Raises $12 Million - Company Profile on Feb 12, 2019
Most industry professionals have never heard of Solink, a company whose tagline is: It's time to revolutionize the way business uses...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact