Access Control Advanced Features Guide

Author: Brian Rhodes, Published on Sep 15, 2015

Electronic access offers features that traditional mechanical locks cannot. While these feature may not be as fundamental as keeping doors secure, they can provide significant management, safety, and security advantages over locks and key alone.  In this note we examine three of the most powerful features available in modern systems:

  • Time & Attendance including time clocks, multi-factor authentication, payroll integration, costs, risks and benefits
  • Mustering covering area tracking vs checking in, use cases, additional design requirements, and system support
  • Mantraps inclduing EAC logic vs speciality controllers vs retrofit openings, costs, common uses and safety codes

We explain each of these features in depth inside.

********** ****** ****** ******** **** *********** ********** ***** ******. ***** ***** feature *** *** ** ** *********** ** ******* ***** ******, they *** ******* *********** **********, ******, *** ******** ********** **** locks *** *** *****.  ** **** **** ** ******* ***** of *** **** ******** ******** ********* ** ****** *******:

  • **** & ********** ********* **** ******, *****-****** **************, ******* ***********, costs, ***** *** ********
  • ********* ******** **** ******** ** ******** **, *** *****, ********** design ************, *** ****** *******
  • ******** ********* *** ***** ** ********** *********** ** ******** ********, costs, ****** **** *** ****** *****

** ******* **** ** ***** ******** ** ***** ******.

[***************]

**** *** **********

*** ** *** **** ******** ******** ** *** ** *** time/date ***** ********** **** ***** ***** ** * ******. *** only ** ******* *** **** **** *****, **** **** ****** whose ********** *** **** ** **** ****, ********* **** ** the ******, ****** **** ***** *** ******* ***** ** ******** attendance.

**** ******* ***** ** ******** ** '*****' * ****'* ******** through * ******, *** ******* * ******** ****** ** ***** a ****** *** ** * ***** ****. ***** **** **** even **** **** ** ***** ******* *** ********* ********* ******** ** ******* ***** **** **** *********.

**** ***** ********

**** ********** ***** ***********, **** *** ******* *** *** '**** logging' **** **** ******

**** ******* *** **** ** ****** ****. ******* ************ **** they ***** ***** *** *** **** **** **** ******* ** crucial, ** '****' ** ****** '*****'. ********* **** **** *** traditionally **** *** ******** ** ******* ******, ***** ******* ****** cards ** **** * *** **** ********* ******* *** ** a ***** ***. ******, "******** *** *********" ** * ****** ******.

*******, *** ****** ** *** ******* ****. ***** *** ********, abuse ** * ****, ***** ** ******** ******* **** **** only ***/*** ****. **** **** ** ***** ** ** *** ********* ** **** ** *** ********* ******. **** **** ** ********* **** ****/********** ********. ***** **** ****** *** primarily ******** ** ******* *** ********, *** ******** **** ******** from ****** * ***** ****** ** ********** ** **** ** **** calculating **** ******** ****, **** ****, ** ******** ***.

***** *** *** ****** *** **** & ********** ***** ***** setting ***** ******** ******* *** *** **** ******* ** ********* 'In' *** '***' ******* ** *** ******. **** * *** period ******, * ****** ** ******* ******* ******** ** ***** two *******, ******* *** '**' ******* *** *********** *** '***' intervals ******* ** ******** ****** ** **********.

*****-****** ***** *****

** ***** ** ***** *** ******* ** '***** ********' (* risk *** ******* ******** **** '********'), **** *** ********** ******* ****** ******* ******** ************** *******, including *********** ** **** *******. **** '***** **************' ******* **** no *** *** ******** ************ ********** ** ******* ******.

**** ****** *** **** & ********** ******* ******* **********, ********* resembling *** ******** *****:

***** ***** ** ******* *** ********* **** ** '**********' ********* systems **** ******* ** *** ****** *********, *** **** ********* cost **** ********** **** **** ****** ********. *** ******* ****** need ** ********* ** ******* **** ****. ******* ********* ****** readers can ** **** ** **** **** ************ (*.*., *** *** **/******'* *** ***** **** *** *******).

******* ***********

**** *** ********* ****** '**** *** **********' ********, **** ** frequently **** **** ********** ****** *******. **** *** ******* **** format **** ** ** *** ** ******** ******** **** ******* systems **** ****** ** ****. *******, **** ** ********* * ****** *******, *** ********** or ******* ***** ******* *********** ** *** ****** ******** ** collect *******. *** ********** ***** **** ***** ******'* ******* ****** ****** ** **** *** ********** ****:

** ***** *****, '**** & **********' ******** *** ** ***** in *** ****** ********, *** ** ********** '******* ******' ** added ** *** ******** *** ****** ***********. **** ********** ******** becomes *** ******* ******* ********, ** ******** ** ***** ******* may **** ******** **** '***-********' ************.

****** **********-***** ********* ***** ********** '******** ******' *********, *********:

**** & ********** *****

*******: *** ***** ****** *** * ******* **** ****** *** ** you **** ** ***** ***** ********, **** *** ********** ********* readers ***** ******* ~$*** *** ~$**** ****, **** ****-******** ******* fingerprint ******* ******* ****** $*** ****. (*** *** ****** ** *********** ******* *** **** ******.) ******** ******* *** ** ******** *** ***** sites, *** ********* *** *** ****** ***** ******** ****** *********** or ********** ** ******* ***** *******.

***** ********: ******* ***** ** *** * **** *** ********** ****** ***** from '****' ******* ** ~$****. **** ********* ***** * '** ********** ****' ********* ************* ** ***** ***** ******, *** *** **** **** be ******** ************ **** * ******* ********. 

******** ********: *** ***** ******** / *********** ****** ******** **** ********* *********, but ********* ***** ******* ~$*** *** ~$****, ********* ********* ** the **** ** * *******'* ******** ****** *** ****** ** sites **** ** *********. *** **** ********** ****** *******, ***** modules **** ***** ~$*,*** ****.

**** *** *** *****?

***** ***** *** ** **** **** ***** ******** *** ** advantageous, ** ** *** ******* *****:

  • Clock *****: In effect, the EAC system clock serves as the payroll clock. While a variety of solutions for syncronizing/standardizing time exist, such as *** ******* *** ******* **** ******, *********** ******* *** *** ***** ********** can ****** *********** ********. **** *** ** **** *** **** and **********, ******* ****** **** ** **** **** *** ***** standard **** ** *****.
  • Single ****** ********: Or rather '******* *** **** **** ** *** ******'. ** * ****** ** **********, ** **** *** ****** drops *******, ** **** **** **** *****. *** ******* ** granting ****** ******* ******* ***** *** ***** ** ****** ** issuing ********** ****, ** ****** ******** ****** *** **** *** Attendance ********. *** ***** **** ** **** ** ***** ****** timeclock ** * ******, **** ** ****, *** *** *** time *** ****** ** *******, ******** ********* *** ********* *******.
  • Passback *********: For access systems using 'Anti-Passback' controls, logic discrepancies can cause low-level conflicts with Time Clock readers. If an employee 'scans In' to the timeclock, and then immediately 'scans In' to a normally secured door, the EAC system may generate an alarm or deny access unless the timeclock reader is isolated from passback rules. Given the large number or doors across multiple sites, or large populations of employees in a single system, these sort of errors can be common and hard to troubleshoot.

**** *** *** ********?

*******, ** ***** **** ******** ***** ** *** *** ** host '**** *** **********' ********, *********:

  • Less ** ***, ********: While a single system can be a weakness, it can also be efficient. Many facilities prioritize the upkeep of facility access systems, and issuing a credential for access also means it can be used for payroll. The investment in one facility system can be leveraged by another.
  • Expanded ******** ********: In normal use, if an employee has a security credential revoked in an EAC system, they immediately become invalid in the payroll system. In addition, tying the two systems together can prevent an unauthorized employee from gaining access to an 'Time In' reader before an allotted shift and help manage overtime payouts, and payroll hour allocations are enforceable by physical access controls. 

*********

******* ******** ******* ** ***** *** ****** **** ** ****** people ** * ******** ** ******** *****. ***** * *********** of **** *** *****, ********* ****** ** ***** ** ******** where **** ***, **** ****** ** *********.

*********'* *** **********

*****, *** **** ****** / ************* ******* *** *** ***** of *********, ********* ** *** **** ************* ********* ** ********:

  • **** ********
  • ******** **

**** ********: *** ******* ** ********* **** ****** ******* ** ******** * roster ** ********* ** * ******* ****. ***** **** ** occupant ***** * **** ** ***** *** ***** ** ****, the ****** ****** **** *** ****, ****, *** ********** ****** of *** **********. **** **** *** ** **** ** ********* who ** ** *** **** ** *** ***** ****, ********* emergency **********.

******** **: *************, ********* *** ** *********** ** **** ******* ** * 'opt-in' *******, ***** * ********** ****** ******* ** ** ********** point ** ******* ** *********** ***** **** ********. **** **** list ** ***** *** ** ******** ******* *** ******** **** of ******** *** ****** **** **** **** ****** ****** *********. The ****** ****** ***** ** ** ******* ****** ****** **** a '********* ******':

** ****** *** ****, *** **** ** ********* ** ** account *** ******** ***********, ** ** **** *** *** ********* present ****** ** ****, **** ********** ****** *** ** ***** to *********** ***** **** ***. ** ** ********* *********, *** resources ** ****** *** *** *********** *** *******, *** ****** an ******** **** ** *** ** ******* ***** ***** ***** to ***** *******.

***** ** ********* ****?

***** **** '********* **** *****', ********* ********* *** ** ******* in ******* ****. ** ********** ** ****** **********, ********* *** be **** *** '**** ***/ *** ***' **********, ***** ********* should *** ** ********* ** ** **** ********** ***** *** maintenance ********* *** ********* ***. ** **** *** *********** ****** has ******* ** ** ** ****, *** *** *** ******* out, *** ******** *** **-********* ***** ******** *** ** ********* for.

********, ** ********** ***** ******** ********** *** *********, **** *******, daycares, ** ********* *********, ********* *** ** ********** ** ****** that *** ******* ** * ***** *** ******* ** ** electronically ****** ******. 

********* ** *** ********* ** ***********, ** *** **** ************* or ***** ******* ** ********** *********. *** **** *** '******** reports' ** **** ** ****** ******** ****** ** ********** ****, it *** **** ****** ** **** ******** ** ******* ********* alerting **** ** *********** (**: ****** ******, **** *******, ** other ********* *************).

********** ****** ********

********* ** *** * ****** ********** *********, ********** ******** ************* and ******** *** ** ********. ** '********* *******' *** ****, then *********** **** ******** *** ** ** **** **** ********* a *** **********. **** ************* ***** ******** ***** *********** ***** readers ** *** ****** ** ******* ********* *** *** ********* in *** ******, ** *** **** *****-********* ***** ** ******** schedules ** ******* ********* *** ****.

*******, ***** ***** ** ********* *** ******* ********** *******. ** ***** to **** ** ******** ********* ** *** ** ******* ** an ****, ********* **** '**** ***' **** **** *****. **** access ********** ******** ****** ******* '******** **' *** ******, ** *** ******** of ** *** ******, **** **** ******** ** *** ****** to **, **** **** *** ********** ** * ******.

****** ********

************** ** *** ******* ****** ** ****** ******* ********, *** is ********* ********* ** ********** ***** *********. *** *******:

  • *****: ***** ******** ** ***** ******* ********* ** *** ** *********** ******** readers ** "********** ******", ******* ******* ******** ******* ********* ********* that ******** * **** ** ***** ** ** **** ** demand. 
  • ***: **** ****** ******** ********* *******, ** **** ** *****/****** linking **** *** ** **** ** ****** '********* *******'. **** 'Time & **********' ******* *** ****, ********* ******* *** ** filtered ** *** ** ********* ******* ** * ********.
  • *****: ******* ******** **** ********* ******* *** ********* ******* ****** in *** ********, *** *** ** ********** **** ***** *******.

** ********* ** ********* ** ***, **** **** ** ***** carefully ***** *** ** ** *********** ** **** ****** ******* software ** ********** *** ************ **** *******.

********

*** ** *** ****** ********** ** ****** ******* ** ***** used *****. ******** **** **** ** ******** ***** *** ********* ****** ** **** ******* ** ******** ******, **** the ***** ******* ** '********' ** ********. ****** **** ** mantraps **** *** **** ******** **** *** *****, *** *** concept ** ***** ******* ** * ****** ** ********** ********** in * ****** ** ****. ** **** ****, ** **** at ********, *** **** *** *********, *** ***** **** *** used.

********

*** **** ***** ******** * ****** ******* * ******* ** use: 

****** *** *** ********** ** *** ** *****:

  • *** ******* **** ****** ***** ******* *** ****, ***** *** inside ****** ***** * **********
  • *** ****** **** *******, *** *** ******* **** *****, ********** anyone **** ******** *** '********' ****. 
  • *** ******* **** ******* ****** ***** *** ****** **** ****** and *******.

*** '***********' ****** ** *** ******* ****** **** *** **** to ** ******** *** **** ** * ****. ***** **** restricting ******, *** ******* ** *** ********* *** ****** *** environment ****** *** **** ** ** ********** (***********, ********, ****) before *********** ** ** *** ****** ****, ** **** ***********. When **** **** ***, "********" *** ***** ****** "********", *** even ** ******** ** *** *** ******* ****, *** ******* sequencing ** ***** ** *** ****.

***** *******

*********, ******** *** *********** ** ********** ***** ** ** ***** primary ****:

*** *****

****** ********** ***** *** ********** ***** ******* ***** ** ****/****** ***** ** ****** ******. **** **********-***** *** ******* (********* **************, ******** *****, ***) ***** '*******' ************** ** **** ** their ******* **** ** ********** **** ****** ********** *** ***** to *** ******.

********* ***********

*** ************ ******* *** ** *** ********* *** ********** ******* configuration, *** ***** ********** ***** *** **** ** ********* ******** on ****** *****. *** ***** ***** ***** *** ******* '******' controller **** ** ********* ** ********* ***** ** *** **** way **** ******** *** ** *********:

******** ********

** ***** *****, '******** ** * ***' (** '******* ******') *** *****, ********** ***** ******** *** desired, *** ********** *** ***** ** *** ********. ** **** cases, ***** '****' **** **** ********* ***********, *** *** ** configured ** **** **** ******** *** ******* ** *******. ***** ******** feature * ****** ***** ** *** ****** ** ********* ** * 'passthru' ****; *******, *** ****** ** * ****. ** ***** ** accomplish ****, * ********** ***** **** ** *********** ********** ** several *****, ******, *** *** **** ********. ***** **** ****** be ******** ************, * "***" ****** *** ** ******* ************* sliding ********** ** **** ***** ** *** ****. *** ****** below **** ** ******* '***', *********** ****** ** ******** ******* or ******** ** ** ******** ****:

*** ********* ***** ***** *** **** *** ***** ****, ***** entering ******* *** ****** ****, ******* *** ** ** *****, validating ****** *** **** ******* *** **** ******** ****.

******* ****

** * **** *****, *** '*** *****' ****** ** ********* the ***** ********* ****** ** *** ** ******* ***** ****. 

********* *********** **** * ***, ***** **** ***** *** ** not ******* ** ***, *** * ********** ******* ** ***** required. *** *******, * ********* ********** ***** ~$***, ****** **** installing ** *** ****** *** ********** **** **** ******** ******** functionality.

******** ******** **** * **** ****, ********* ******* ~$**** - $10000, *** **** ***** *** ** **** *********, **** **********, and ******* ********** **** * '***** *****' *******.

****** ****

***** **** '********** *******' **** * *****, ******** *** **** employed ** ******* ************* ** *****-***** ************* ** ******* ************, and ** ********-********* ****** ******** **** '**********'. **** ***** *** **** ******* ******* **** *******, ** that * ******* ** ******** *** ** ******** **** * police ******* ******* ****** *********** ** ******. 

** **** *****, * ********* ********** *** ******** ** * jail/prison **** **** * ******-**** ******** ****. ** ***** ***** the ******** **** ** **, *** **** **** ** ******, preventing ******* **** ******** **** *** ******* *******. ********, **** the ******** **** ** ****, *** ****** **** ** ********, allowing * ******* *** ***** *** *******/******* ****, *** ****** to ****** ** *** ******* *******. 

****** *****

*** ******** ***** **** ***** ** *** ** ******** ****** largely ** *** ********* **** ************** ** *** ********. *** *******, * ***** *********** ** **** is ********** *********** **** ** ****** ********, *** ** ****** from **** ** *** '****/******' *********** ********. ******** ** *** which ***** ***** ***** ******** * ***** ************** ** *** building ****.

*** **** **********/*********/********** ***************, **** ****** ******* *** '****** ****', which ***** **** **** ****** **** ****** ** **********. ** this ****, ******** *** ** **** ** **** ****** *** of ** ****, *** **** ****** ** **** ** **** people ****** ***. ** *** ********** ***** *** *** **** to ******* **** ********* ******, **** ***** ******* ****** ****** paths **** ** ** ******* ****** *** ****.

** **** *****, ******** *** ******** ******** *** **** ***** interfaces *** ********, ** **** ** ** ********* ** *** can *********** ** ******* ****** * "********" ****. 

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Save $50 - IP Networking Course May 2017 on Mar 28, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Unikey Smart Phone Access Control Platform on Mar 21, 2017
More and more people carry smart phones. Many think this could replace the conventional key or card for access control. However, using a phone...
Brivo Opens Up, Adds Mercury Support on Mar 16, 2017
Brivo's cloud-based access control was built around the companies proprietary hardware controllers, and was often seen as a limitation by...
Access Control Course Spring 2017 on Mar 16, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Burglar Alarm Screens Tutorial on Mar 14, 2017
Many residential alarm subscribers arm their alarms before going to bed at night. Wiring window screens allow these subscribers to leave their...
DMP Intrusion Tested (XR Series) on Mar 09, 2017
DMP is a major provider of intrusion systems, but lacks the global brand recognition of some of its rivals (such as Bosch, Honeywell, DSC, or...
Avigilon Favorability Results on Feb 27, 2017
One of the fastest growing companies has turned into one of the rockiest, as cooling growth, management turnover and a roller coaster stock price...

Most Recent Industry Reports

IP Cameras Lose Buy America Protection on Mar 28, 2017
IP Cameras have lost the US government's 'Buy America' protection as the Security Industry Association (SIA) successfully lobbied the government to...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Anixter Favorability Results on Mar 28, 2017
Anixter's direct sales and integrator anger about it has been in the news recently: Anixter / Bosch Sells Direct to Amazon Anixter Touts...
Save $50 - IP Networking Course May 2017 on Mar 28, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Chinese Government Spies on Churches With Video Surveillance on Mar 27, 2017
The Chinese government is using video surveillance to spy on churches in China, reports UCANews, explaining: The [Chinese government]...
Hanwha Wisenet X Tested on Mar 27, 2017
Hanwha has released their latest generation, the Wisenet X series, powered by their new Wisenet 5 processor. This new series claims improvements...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Dahua Distributor Bad Breakup on Mar 27, 2017
A Dahua distributor in Europe claims that Dahua took over his top customers, revoked his distributorship status, and left him with a large amount...
Everbridge Mass Notification Service Examined on Mar 24, 2017
Everbridge is expanding in the security space. In January 2017 Everbridge acquired PSIM platform IDV, and have also begun integrating with other...
Hikvision Removing Auto 'Phone Home' on Mar 24, 2017
Facing pressure over their cameras auto phoning home and their Chinese government ownership, Hikvision has begun quietly removing automatic...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact