Access Control - Time & Attendance, Mustering and Mantraps Guide

By: Brian Rhodes, Published on Jun 13, 2018

Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure, they can provide significant management, safety, and security advantages over locks and key alone.

In this note we examine three of the most powerful features available in modern systems:

  • Time & Attendance
  • Mustering
  • Mantraps

We explain each of these features in depth inside.

Time and Attendance

One of the most powerful features of EAC is the time/date stamp associated with every event in a system.

Not only do systems log when door opens, they also record whose credential was used to open them, typically down to the second, making them ideal for keeping track of employee attendance.

Time Logging makes it possible to 'track' a user's movement through a system, and provide a concrete record of where a person was at a given time. These logs have even been used to solve murders and otherwise establish presence at certain times with high precision.

Time Clock Function

With relatively minor adjustments, most access systems can use 'time logging' with time clocks

Many workers are paid an hourly wage. Clearly establishing when they start their job and when they stop working is crucial, as 'time' is indeed 'money'. Capturing this time has traditionally been the function of precise clocks, where workers insert cards to have a the time indelibly punched out on a given day. Indeed, "punching the timeclock" is a common saying.

However, the method is not problem free. First and foremost, abuse is a risk, where an employee punches more than only his/her card. This type of fraud is at the forefront of many HR and Corporate issues. Many seek to eliminate this risk/temptation entirely. While time clocks are primarily intended to protect the employer, the employee also benefits from having a clear record of attendance to lean on when calculating paid vacation days, sick days, or overtime pay.

********** ****** ****** ******** that *********** ********** ***** ******. While ***** ******** *** not ** ** *********** as ******* ***** ******, they *** ******* *********** management, ******, *** ******** advantages **** ***** *** key *****.

** **** **** ** examine ***** ** *** most ******** ******** ********* in ****** *******:

  • **** & **********
  • *********
  • ********

** ******* **** ** these ******** ** ***** inside.

Time *** **********

*** ** *** **** powerful ******** ** *** is *** ****/**** ***** associated **** ***** ***** in * ******.

*** **** ** ******* log **** **** *****, they **** ****** ***** credential *** **** ** open ****, ********* **** to *** ******, ****** them ***** *** ******* track ** ******** **********.

**** ******* ***** ** possible ** '*****' * user's ******** ******* * system, *** ******* * concrete ****** ** ***** a ****** *** ** a ***** ****. ***** logs **** **** **** used ** ***** ******* *** ********* ********* ******** at ******* ***** **** high *********.

Time ***** ********

**** ********** ***** ***********, most ****** ******* *** use '**** *******' **** **** ******

**** ******* *** **** an ****** ****. ******* establishing **** **** ***** their *** *** **** they **** ******* ** crucial, ** '****' ** indeed '*****'. ********* **** time *** ************* **** the ******** ** ******* clocks, ***** ******* ****** cards ** **** * the **** ********* ******* out ** * ***** day. ******, "******** *** timeclock" ** * ****** ******.

*******, *** ****** ** not ******* ****. ***** and ********, ***** ** a ****, ***** ** employee ******* **** **** only ***/*** ****. **** type ** ***** ** ** *** ********* of **** ** *** Corporate ******. **** **** ** ********* this ****/********** ********. ***** **** clocks *** ********* ******** to ******* *** ********, the ******** **** ******** from ****** * ***** record ** ********** ** **** on **** *********** **** vacation ****, **** ****, or ******** ***.

[***************]

***** *** *** ****** for **** & ********** often ***** ******* ***** separate ******* *** *** sole ******* ** ********* 'In' *** '***' ******* in *** ******. **** a *** ****** ******, a ****** ** ******* listing ******** ** ***** two *******, ******* *** 'In' ******* *** *********** the '***' ********* ******* an ******** ****** ** attendance.

Multi-Factor ***** *****

** ***** ** ***** the ******* ** '***** punching' (* **** *** systems ******** **** '********'), **** *** ********** readers ***** ******* ******** authentication *******, ********* *********** or **** *******. **** 'extra **************' ******* **** no *** *** ******** misrepresent ********** ** ******* person.

**** ****** *** **** & ********** ******* ******* biometrics, ********* ********** *** examples *****:

***** ***** ** ******* are ********* **** ** 'standalone' ********* ******* **** require ** *** ****** interface, *** **** ********* cost **** ********** **** with ****** ********. *** systems ****** **** ** interface ** ******* **** data. 

Payroll ***********

**** *** ********* ****** 'time *** **********' ********, this ** ********** **** than ********** ****** *******. Many *** ******* **** format **** ** ** can ** ******** ******** into ******* *******. *******, this ** ********* * manual *******, *** ********** or ******* ***** ******* instruction ** *** ****** platform ** ******* *******.

*** ********** ***** **** shows ******'* ******* ****** ****** of **** *** ********** data:

** ***** *****, '**** & **********' ******** *** be ***** ** *** Access ********, *** ** additional '******* ******' ** added ** *** ******** for ****** ***********. **** additional ******** ******* *** default ******* ********, ** adoption ** ***** ******* may **** ******** **** 'non-security' ************. 

Risk ***** ****** *** ***** *********

***** ***** ****** ** host **** ***** ********* can ** ************, ** is *** ******* *****:

  • Clock *****: In effect, the EAC system clock serves as the payroll clock. While a variety of solutions for synchronizing/standardizing time exist, such as *** ******* *** ******* **** ******, differences ******* ****** *** other ********** *** ****** significant ********. **** *** is **** *** **** and **********, ******* ****** time ** **** **** the ***** ******** **** is *****.
  • Single ****** ********: Or rather '******* *** **** **** in *** ******'. ** * ****** of **********, ** **** EAC ****** ***** *******, so **** **** **** Clock. *** ******* ** granting ****** ******* ******* doors *** ***** ** solved ** ******* ********** keys, ** ****** ******** exists *** **** *** Attendance ********. *** ***** want ** **** ** older ****** ********* ** a ******, **** ** case, *** *** *** time *** ****** ** offline, ******** ********* *** timeclock *******.
  • Passback *********: For access systems using 'Anti-Passback' controls, logic discrepancies can cause low-level conflicts with Time Clock readers. If an employee 'scans In' to the timeclock, and then immediately 'scans In' to a normally secured door, the EAC system may generate an alarm or deny access unless the timeclock reader is isolated from passback rules. Given the large number or doors across multiple sites, or large populations of employees in a single system, these sort of errors can be common and hard to troubleshoot.

Benefits *** ***** ****** *** ****/**********/*******

*******, ** ***** **** business ***** ** *** access ** **** '**** and **********' ********, *********:

  • Less ** ***, ********: While a single system can be a weakness, it can also be efficient. Many facilities prioritize the upkeep of facility access systems, and issuing a credential for access also means it can be used for payroll. The investment in one facility system can be leveraged by another.
  • Expanded ******** ********: In normal use, if an employee has a security credential revoked in an EAC system, they immediately become invalid in the payroll system. In addition, tying the two systems together can prevent an unauthorized employee from gaining access to an 'Time In' reader before an allotted shift and help manage overtime payouts, and payroll hour allocations are enforceable by physical access controls. 

*********

******* ******** ******* ** using *** ****** **** to ****** ****** ** a ******** ** ******** areas. ***** * *********** of **** *** *****, Mustering ****** ** ***** to ******** ***** **** are, **** ****** ** emergency.

*****, *** **** ****** / ************* ******* *** two ***** ** *********, depending ** *** **** administrative ********* ** ********:

  • **** ********
  • ****** *****-**

Area ********

*** ******* ** ********* uses ****** ******* ** generate * ****** ** occupants ** * ******* area. ***** **** ** occupant ***** * **** to ***** *** ***** an ****, *** ****** system **** *** ****, date, *** ********** ****** of *** **********. **** data *** ** **** to ********* *** ** in *** **** ** any ***** ****, ********* emergency **********.

Manual *****-**

*************, ********* *** ** implemented ** **** ******* as * '***-**' *******, where * ********** ****** located ** ** ********** point ** ******* ** cardholders ***** **** ********. Then **** **** ** names *** ** ******** against *** ******** **** of ******** *** ****** scan **** **** ****** during *********. *** ****** screen ***** ** ** example ****** ****** **** a '********* ******':

** ****** *** ****, the **** ** ********* is ** ******* *** specific ***********, ** ** they *** *** ********* present ****** ** ****, then ********** ****** *** be ***** ** *********** where **** ***. ** an ********* *********, *** resources ** ****** *** the *********** *** *******, and ****** ** ******** list ** *** ** present ***** ***** ***** to ***** *******.

Where ** ********* ****?

***** **** '********* **** Calls', ********* ********* *** be ******* ** ******* ways. ** ********** ** mining **********, ********* *** be **** *** '**** Out/ *** ***' **********, where ********* ****** *** be ********* ** ** area ********** ***** *** maintenance ********* *** ********* for. ** **** *** maintenance ****** *** ******* in ** ** ****, but *** *** ******* out, *** ******** *** de-energized ***** ******** *** be ********* ***.

********, ** ********** ***** frequent ********** *** *********, like *******, ********, ** passenger *********, ********* *** be ********** ** ****** that *** ******* ** a ***** *** ******* in ** ************** ****** system. 

********* ** *** ********* is ***********, ** *** send ************* ** ***** reports ** ********** *********. Not **** *** '******** reports' ** **** ** nearby ******** ****** ** evacuation ****, ** *** send ****** ** **** messages ** ******* ********* alerting **** ** *********** (ie: ****** ******, **** threats, ** ***** ********* circumstances).

Additional ****** ********

********* ** *** * system ********** *********, ********** software ************* *** ******** may ** ********. ** 'mustering *******' *** ****, then *********** **** ******** may ** ** **** than ********* * *** checkboxes. **** ************* ***** requires ***** *********** ***** readers ** *** ****** to ******* ********* *** not ********* ** *** system, ** *** **** cross-reference ***** ** ******** schedules ** ******* ********* are ****.

*******, ***** ***** ** ********* may ******* ********** *******. In ***** ** **** an ******** ********* ** who ** ******* ** an ****, ********* **** 'scan ***' **** **** leave. **** ****** ********** openings ****** ******* '******** **' *** access, ** *** ******** of ** *** ******, even **** ******** ** not ****** ** **, adds **** *** ********** to * ******.

********

*** ** *** ****** techniques ** ****** ******* is ***** **** *****. Mantraps **** **** ** ******** ***** *** ********* ****** ** only ******* ** ******** people, **** *** ***** benefit ** '********' ** imposter.

****** **** ** ******** vary *** **** ******** over *** *****, *** the ******* ** ***** applied ** * ****** of ********** ********** ** a ****** ** ****. In **** ****, ** look ** ********, *** they *** *********, *** where **** *** ****.

*** **** ***** ******** a ****** ******* * mantrap ** ***: 

****** *** *** ********** of *** ** *****:

  • *** ******* **** ****** opens ******* *** ****, until *** ****** ****** scans * **********
  • *** ****** **** *******, and *** ******* **** locks, ********** ****** **** entering *** '********' ****. 
  • *** ******* **** ******* locked ***** *** ****** door ****** *** *******.

*** '***********' ****** ** the ******* ****** **** one **** ** ** unlocked *** **** ** a ****. ***** **** restricting ******, *** ******* of *** ********* *** permit *** *********** ****** the **** ** ** normalized (***********, ********, ****) before *********** ** ** the ****** ****, ** even ***********. **** **** this ***, "********" *** often ****** "********", *** even ** ******** ** not *** ******* ****, the ******* ********** ** doors ** *** ****.

Three ******* *******

*********, ******** *** *********** in ********** ***** ** of ***** ******* ****:

Access ******* *****

****** ********** ***** *** configured ***** ******* ***** ** ****/****** ***** ** system ******. **** **********-***** *** systems (********* **************, ******** *****, ***) offer '*******' ************** ** part ** ***** ******* with ** ********** **** beyond ********** *** ***** to *** ******.

Specialty ***********

*** ************ ******* ****** or *** ********* *** supporting ******* *************, *** party ********** ***** *** used ** ********* ******** on ****** *****. *** image ***** ***** *** typical '******' ********** **** is ********* ** ********* doors ** *** **** way **** ******** ****** is *********:

Retrofit ********

** ***** *****, '******** in * ***' (** 'airlock ******') *** *****, especially ***** ******** *** desired, *** ********** *** doors ** *** ********. In **** *****, ***** 'kits' **** **** ********* controllers, *** *** ** configured ** **** **** existing *** ******* ** desired.

***** ******** ******* * ****** ***** on *** ****** ** occupants ** * '********' room; *******, *** ****** ** a ****. ** ***** to ********** ****, * restricted ***** **** ** constructed ********** ** ******* doors, ******, *** *** wall ********. ***** **** cannot ** ******** ************, a "***" ****** *** to ******* ************* ******* partitions ** **** ***** in *** ****. *** images ***** **** ** example '***', *********** ****** an ******** ******* ** adjacent ** ** ******** door:

*** ********* ***** ***** the **** *** ***** take, ***** ******** ******* the ****** ****, ******* for ** ** *****, validating ****** *** **** opening *** **** ******** door.

Mantrap ****

** * **** *****, the '*** *****' ****** is ********* *** ***** expensive ****** ** *** is ******* ***** ****. 

********* *********** **** * gap, ***** **** ***** EAC ** *** ******* in ***, *** * controlled ******* ** ***** required. *** *******, * specialty ********** ***** ~$***, rather **** ********** ** EAC ****** *** ********** cost **** ******** ******** functionality.

******** ******** **** * high ****, ********* ******* ~$5000 - $*****, *** this ***** *** ** less *********, **** **********, and ******* ********** **** a '***** *****' *******.

Common ****

***** **** '********** *******' into * *****, ******** are **** ******** ** prevent ************* ** *****-***** manufacturing ** ******* ************, and ** ********-********* ****** controls **** '**********'. **** ***** *** most ******* ******* **** feature, ** **** * suspect ** ******** *** be ******** **** * police ******* ******* ****** opportunity ** ******. 

** **** *****, * sallyport ********** *** ******** of * ****/****** **** with * ******-**** ******** door. ** ***** ***** the ******** **** ** up, *** **** **** is ******, ********** ******* from ******** **** *** outside *******. ********, **** the ******** **** ** down, *** ****** **** is ********, ******** * suspect *** ***** *** booking/holding ****, *** ****** to ****** ** *** outside *******. 

Safety *****

*** ******** ***** **** apply ** *** ** maglocks ****** ******* ** the ********* **** ************** ** *** ********. *** example, * ***** *********** or **** ** ********** differently **** ** ****** building *** ** ****** from **** ** *** 'life/safety' *********** ********. ******** to *** ***** ***** apply ***** ******** * clear ************** ** *** building ****.

*** **** **********/*********/********** ***************, Life ****** ******* *** 'golden ****', ***** ***** that **** ****** **** always ** **********. ** this ****, ******** *** be **** ** **** people *** ** ** area, *** **** ****** be **** ** **** people ****** ***. ** the ********** ***** *** not **** ** ******* free ********* ******, **** other ******* ****** ****** paths **** ** ** present ****** *** ****.

** **** *****, ******** RTE ******** ******** *** fire ***** ********** *** required, ** **** ** an ********* ** *** can *********** ** ******* inside * "********" ****. 

Comments (1)

Food for thought,

In regards to cloning cards, is there any system out there right now that has the ability to set a time interval between reader locations that will generate an alarm if the card is read at each location within that time interval.

The simple way to look at this...I should not be able to read my card at a Seattle location at 7am and also walk through a door in San Diego 15 minutes later. Perhaps before my card works on any reader in a building I need to scan it at a security check point to enable my access, where I smile and also get my picture taken.

In performing the above action either someone has cloned my card or I found a teleport machine.

With all the reports available on these systems does this exist? Especially after card cloning has run amuck for years now.

In other words I should not be able to go thru a door in one building on the tenth floor and then read in another building on the 10th floor again in a minute time span.

How can one use their EAC to analyze for cloned cards? Seems they should just build a report off of card trace...that looks at all cards in a chronological order.

Any cool features such as this?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Installation Course - Register Now on Aug 15, 2019
Register Now for the September 2019 Video Surveillance Install Course. This is a unique installation course in a market where little practical...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
Milestone "GDPR-ready" Certification Claim Critiqued on Aug 12, 2019
Milestone is touting that its latest XProtect VMS is "GDPR-ready" with a 'European Privacy Seal'. However, our investigation raises significant...
ProdataKey (PDK) Access Company Profile on Aug 09, 2019
 Utah based ProdataKey touts low cost cloud access, wireless controllers, and no dealer required national distribution availability.  But how does...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Responsibility Split Selecting Locks - Statistics on Jul 22, 2019
A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often...
History of Video Surveillance on Jul 19, 2019
The video surveillance market has changed significantly since 2000, going from VCRs to ab emerging AI cloud era.  The goal of this history is to...

Most Recent Industry Reports

TMA Apologizes to Amazon / Ring on Aug 23, 2019
Not only is Amazon / Ring making major incursions into the residential security market, the organization representing the biggest incumbents, The...
China Dahua Replaces Their Software With US Pepper on Aug 22, 2019
What does a US government banned company do to improve its security positioning in the US? Well, Dahua is unveiling a novel solution, partnering...
Security Integrators Outlook On Remaining Integrators In 2025 on Aug 22, 2019
The industry has changed substantially in the last decade, with the rise of IP cameras and the race to the bottom. Indeed, more changes may be...
First GDPR Facial Recognition Fine For Sweden School on Aug 22, 2019
A school in Sweden has been fined $20,000 for using facial recognition to keep attendance in what is Sweden's first GDPR fine. Notably, the fine is...
Anyvision Facial Recognition Tested on Aug 21, 2019
Anyvision is aiming for $1 billion in revenue by 2022, backed by $74 million in funding. But does their performance live up to the hype they have...
JCI Sues Wyze on Aug 21, 2019
The mega manufacturer / integrator JCI has sued the fast-growing $20 camera Seattle startup Wyze. Inside this note: Share the court...
Dahua 4K Camera Shootout on Aug 20, 2019
Dahua's new Pro Series 4K N85CL5Z claims to "deliver superior images in all lighting and environmental conditions", but how does this compare to...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Uniview Beats Intel In Trademark Lawsuit on Aug 19, 2019
Uniview has won a long-running trademark lawsuit brought by Intel, with Beijing's highest court reversing an earlier Intel win, centered on...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact