Access Control Advanced Features Guide

Author: Brian Rhodes, Published on Sep 15, 2015

Electronic access offers features that traditional mechanical locks cannot. While these feature may not be as fundamental as keeping doors secure, they can provide significant management, safety, and security advantages over locks and key alone.  In this note we examine three of the most powerful features available in modern systems:

  • Time & Attendance including time clocks, multi-factor authentication, payroll integration, costs, risks and benefits
  • Mustering covering area tracking vs checking in, use cases, additional design requirements, and system support
  • Mantraps inclduing EAC logic vs speciality controllers vs retrofit openings, costs, common uses and safety codes

We explain each of these features in depth inside.

********** ****** ****** ******** **** *********** ********** ***** ******. ***** ***** feature *** *** ** ** *********** ** ******* ***** ******, they *** ******* *********** **********, ******, *** ******** ********** **** locks *** *** *****.  ** **** **** ** ******* ***** of *** **** ******** ******** ********* ** ****** *******:

  • **** & ********** ********* **** ******, *****-****** **************, ******* ***********, costs, ***** *** ********
  • ********* ******** **** ******** ** ******** **, *** *****, ********** design ************, *** ****** *******
  • ******** ********* *** ***** ** ********** *********** ** ******** ********, costs, ****** **** *** ****** *****

** ******* **** ** ***** ******** ** ***** ******.

[***************]

**** *** **********

*** ** *** **** ******** ******** ** *** ** *** time/date ***** ********** **** ***** ***** ** * ******. *** only ** ******* *** **** **** *****, **** **** ****** whose ********** *** **** ** **** ****, ********* **** ** the ******, ****** **** ***** *** ******* ***** ** ******** attendance.

**** ******* ***** ** ******** ** '*****' * ****'* ******** through * ******, *** ******* * ******** ****** ** ***** a ****** *** ** * ***** ****. ***** **** **** even **** **** ** ***** ******* *** ********* ********* ******** ** ******* ***** **** **** *********.

**** ***** ********

**** ********** ***** ***********, **** *** ******* *** *** '**** logging' **** **** ******

**** ******* *** **** ** ****** ****. ******* ************ **** they ***** ***** *** *** **** **** **** ******* ** crucial, ** '****' ** ****** '*****'. ********* **** **** *** traditionally **** *** ******** ** ******* ******, ***** ******* ****** cards ** **** * *** **** ********* ******* *** ** a ***** ***. ******, "******** *** *********" ** * ****** ******.

*******, *** ****** ** *** ******* ****. ***** *** ********, abuse ** * ****, ***** ** ******** ******* **** **** only ***/*** ****. **** **** ** ***** ** ** *** ********* ** **** ** *** ********* ******. **** **** ** ********* **** ****/********** ********. ***** **** ****** *** primarily ******** ** ******* *** ********, *** ******** **** ******** from ****** * ***** ****** ** ********** ** **** ** **** calculating **** ******** ****, **** ****, ** ******** ***.

***** *** *** ****** *** **** & ********** ***** ***** setting ***** ******** ******* *** *** **** ******* ** ********* 'In' *** '***' ******* ** *** ******. **** * *** period ******, * ****** ** ******* ******* ******** ** ***** two *******, ******* *** '**' ******* *** *********** *** '***' intervals ******* ** ******** ****** ** **********.

*****-****** ***** *****

** ***** ** ***** *** ******* ** '***** ********' (* risk *** ******* ******** **** '********'), **** *** ********** ******* ****** ******* ******** ************** *******, including *********** ** **** *******. **** '***** **************' ******* **** no *** *** ******** ************ ********** ** ******* ******.

**** ****** *** **** & ********** ******* ******* **********, ********* resembling *** ******** *****:

***** ***** ** ******* *** ********* **** ** '**********' ********* systems **** ******* ** *** ****** *********, *** **** ********* cost **** ********** **** **** ****** ********. *** ******* ****** need ** ********* ** ******* **** ****. ******* ********* ****** readers can ** **** ** **** **** ************ (*.*., *** *** **/******'* *** ***** **** *** *******).

******* ***********

**** *** ********* ****** '**** *** **********' ********, **** ** frequently **** **** ********** ****** *******. **** *** ******* **** format **** ** ** *** ** ******** ******** **** ******* systems **** ****** ** ****. *******, **** ** ********* * ****** *******, *** ********** or ******* ***** ******* *********** ** *** ****** ******** ** collect *******. *** ********** ***** **** ***** ******'* ******* ****** ****** ** **** *** ********** ****:

** ***** *****, '**** & **********' ******** *** ** ***** in *** ****** ********, *** ** ********** '******* ******' ** added ** *** ******** *** ****** ***********. **** ********** ******** becomes *** ******* ******* ********, ** ******** ** ***** ******* may **** ******** **** '***-********' ************.

****** **********-***** ********* ***** ********** '******** ******' *********, *********:

**** & ********** *****

*******: *** ***** ****** *** * ******* **** ****** *** ** you **** ** ***** ***** ********, **** *** ********** ********* readers ***** ******* ~$*** *** ~$**** ****, **** ****-******** ******* fingerprint ******* ******* ****** $*** ****. (*** *** ****** ** *********** ******* *** **** ******.) ******** ******* *** ** ******** *** ***** sites, *** ********* *** *** ****** ***** ******** ****** *********** or ********** ** ******* ***** *******.

***** ********: ******* ***** ** *** * **** *** ********** ****** ***** from '****' ******* ** ~$****. **** ********* ***** * '** ********** ****' ********* ************* ** ***** ***** ******, *** *** **** **** be ******** ************ **** * ******* ********. 

******** ********: *** ***** ******** / *********** ****** ******** **** ********* *********, but ********* ***** ******* ~$*** *** ~$****, ********* ********* ** the **** ** * *******'* ******** ****** *** ****** ** sites **** ** *********. *** **** ********** ****** *******, ***** modules **** ***** ~$*,*** ****.

**** *** *** *****?

***** ***** *** ** **** **** ***** ******** *** ** advantageous, ** ** *** ******* *****:

  • Clock *****: In effect, the EAC system clock serves as the payroll clock. While a variety of solutions for syncronizing/standardizing time exist, such as *** ******* *** ******* **** ******, *********** ******* *** *** ***** ********** can ****** *********** ********. **** *** ** **** *** **** and **********, ******* ****** **** ** **** **** *** ***** standard **** ** *****.
  • Single ****** ********: Or rather '******* *** **** **** ** *** ******'. ** * ****** ** **********, ** **** *** ****** drops *******, ** **** **** **** *****. *** ******* ** granting ****** ******* ******* ***** *** ***** ** ****** ** issuing ********** ****, ** ****** ******** ****** *** **** *** Attendance ********. *** ***** **** ** **** ** ***** ****** timeclock ** * ******, **** ** ****, *** *** *** time *** ****** ** *******, ******** ********* *** ********* *******.
  • Passback *********: For access systems using 'Anti-Passback' controls, logic discrepancies can cause low-level conflicts with Time Clock readers. If an employee 'scans In' to the timeclock, and then immediately 'scans In' to a normally secured door, the EAC system may generate an alarm or deny access unless the timeclock reader is isolated from passback rules. Given the large number or doors across multiple sites, or large populations of employees in a single system, these sort of errors can be common and hard to troubleshoot.

**** *** *** ********?

*******, ** ***** **** ******** ***** ** *** *** ** host '**** *** **********' ********, *********:

  • Less ** ***, ********: While a single system can be a weakness, it can also be efficient. Many facilities prioritize the upkeep of facility access systems, and issuing a credential for access also means it can be used for payroll. The investment in one facility system can be leveraged by another.
  • Expanded ******** ********: In normal use, if an employee has a security credential revoked in an EAC system, they immediately become invalid in the payroll system. In addition, tying the two systems together can prevent an unauthorized employee from gaining access to an 'Time In' reader before an allotted shift and help manage overtime payouts, and payroll hour allocations are enforceable by physical access controls. 

*********

******* ******** ******* ** ***** *** ****** **** ** ****** people ** * ******** ** ******** *****. ***** * *********** of **** *** *****, ********* ****** ** ***** ** ******** where **** ***, **** ****** ** *********.

*********'* *** **********

*****, *** **** ****** / ************* ******* *** *** ***** of *********, ********* ** *** **** ************* ********* ** ********:

  • **** ********
  • ******** **

**** ********: *** ******* ** ********* **** ****** ******* ** ******** * roster ** ********* ** * ******* ****. ***** **** ** occupant ***** * **** ** ***** *** ***** ** ****, the ****** ****** **** *** ****, ****, *** ********** ****** of *** **********. **** **** *** ** **** ** ********* who ** ** *** **** ** *** ***** ****, ********* emergency **********.

******** **: *************, ********* *** ** *********** ** **** ******* ** * 'opt-in' *******, ***** * ********** ****** ******* ** ** ********** point ** ******* ** *********** ***** **** ********. **** **** list ** ***** *** ** ******** ******* *** ******** **** of ******** *** ****** **** **** **** ****** ****** *********. The ****** ****** ***** ** ** ******* ****** ****** **** a '********* ******':

** ****** *** ****, *** **** ** ********* ** ** account *** ******** ***********, ** ** **** *** *** ********* present ****** ** ****, **** ********** ****** *** ** ***** to *********** ***** **** ***. ** ** ********* *********, *** resources ** ****** *** *** *********** *** *******, *** ****** an ******** **** ** *** ** ******* ***** ***** ***** to ***** *******.

***** ** ********* ****?

***** **** '********* **** *****', ********* ********* *** ** ******* in ******* ****. ** ********** ** ****** **********, ********* *** be **** *** '**** ***/ *** ***' **********, ***** ********* should *** ** ********* ** ** **** ********** ***** *** maintenance ********* *** ********* ***. ** **** *** *********** ****** has ******* ** ** ** ****, *** *** *** ******* out, *** ******** *** **-********* ***** ******** *** ** ********* for.

********, ** ********** ***** ******** ********** *** *********, **** *******, daycares, ** ********* *********, ********* *** ** ********** ** ****** that *** ******* ** * ***** *** ******* ** ** electronically ****** ******. 

********* ** *** ********* ** ***********, ** *** **** ************* or ***** ******* ** ********** *********. *** **** *** '******** reports' ** **** ** ****** ******** ****** ** ********** ****, it *** **** ****** ** **** ******** ** ******* ********* alerting **** ** *********** (**: ****** ******, **** *******, ** other ********* *************).

********** ****** ********

********* ** *** * ****** ********** *********, ********** ******** ************* and ******** *** ** ********. ** '********* *******' *** ****, then *********** **** ******** *** ** ** **** **** ********* a *** **********. **** ************* ***** ******** ***** *********** ***** readers ** *** ****** ** ******* ********* *** *** ********* in *** ******, ** *** **** *****-********* ***** ** ******** schedules ** ******* ********* *** ****.

*******, ***** ***** ** ********* *** ******* ********** *******. ** ***** to **** ** ******** ********* ** *** ** ******* ** an ****, ********* **** '**** ***' **** **** *****. **** access ********** ******** ****** ******* '******** **' *** ******, ** *** ******** of ** *** ******, **** **** ******** ** *** ****** to **, **** **** *** ********** ** * ******.

****** ********

************** ** *** ******* ****** ** ****** ******* ********, *** is ********* ********* ** ********** ***** *********. *** *******:

  • *****: ***** ******** ** ***** ******* ********* ** *** ** *********** ******** readers ** "********** ******", ******* ******* ******** ******* ********* ********* that ******** * **** ** ***** ** ** **** ** demand. 
  • ***: **** ****** ******** ********* *******, ** **** ** *****/****** linking **** *** ** **** ** ****** '********* *******'. **** 'Time & **********' ******* *** ****, ********* ******* *** ** filtered ** *** ** ********* ******* ** * ********.
  • *****: ******* ******** **** ********* ******* *** ********* ******* ****** in *** ********, *** *** ** ********** **** ***** *******.

** ********* ** ********* ** ***, **** **** ** ***** carefully ***** *** ** ** *********** ** **** ****** ******* software ** ********** *** ************ **** *******.

********

*** ** *** ****** ********** ** ****** ******* ** ***** used *****. ******** **** **** ** ******** ***** *** ********* ****** ** **** ******* ** ******** ******, **** the ***** ******* ** '********' ** ********. ****** **** ** mantraps **** *** **** ******** **** *** *****, *** *** concept ** ***** ******* ** * ****** ** ********** ********** in * ****** ** ****. ** **** ****, ** **** at ********, *** **** *** *********, *** ***** **** *** used.

********

*** **** ***** ******** * ****** ******* * ******* ** use: 

****** *** *** ********** ** *** ** *****:

  • *** ******* **** ****** ***** ******* *** ****, ***** *** inside ****** ***** * **********
  • *** ****** **** *******, *** *** ******* **** *****, ********** anyone **** ******** *** '********' ****. 
  • *** ******* **** ******* ****** ***** *** ****** **** ****** and *******.

*** '***********' ****** ** *** ******* ****** **** *** **** to ** ******** *** **** ** * ****. ***** **** restricting ******, *** ******* ** *** ********* *** ****** *** environment ****** *** **** ** ** ********** (***********, ********, ****) before *********** ** ** *** ****** ****, ** **** ***********. When **** **** ***, "********" *** ***** ****** "********", *** even ** ******** ** *** *** ******* ****, *** ******* sequencing ** ***** ** *** ****.

***** *******

*********, ******** *** *********** ** ********** ***** ** ** ***** primary ****:

*** *****

****** ********** ***** *** ********** ***** ******* ***** ** ****/****** ***** ** ****** ******. **** **********-***** *** ******* (********* **************, ******** *****, ***) ***** '*******' ************** ** **** ** their ******* **** ** ********** **** ****** ********** *** ***** to *** ******.

********* ***********

*** ************ ******* *** ** *** ********* *** ********** ******* configuration, *** ***** ********** ***** *** **** ** ********* ******** on ****** *****. *** ***** ***** ***** *** ******* '******' controller **** ** ********* ** ********* ***** ** *** **** way **** ******** *** ** *********:

******** ********

** ***** *****, '******** ** * ***' (** '******* ******') *** *****, ********** ***** ******** *** desired, *** ********** *** ***** ** *** ********. ** **** cases, ***** '****' **** **** ********* ***********, *** *** ** configured ** **** **** ******** *** ******* ** *******. ***** ******** feature * ****** ***** ** *** ****** ** ********* ** * 'passthru' ****; *******, *** ****** ** * ****. ** ***** ** accomplish ****, * ********** ***** **** ** *********** ********** ** several *****, ******, *** *** **** ********. ***** **** ****** be ******** ************, * "***" ****** *** ** ******* ************* sliding ********** ** **** ***** ** *** ****. *** ****** below **** ** ******* '***', *********** ****** ** ******** ******* or ******** ** ** ******** ****:

*** ********* ***** ***** *** **** *** ***** ****, ***** entering ******* *** ****** ****, ******* *** ** ** *****, validating ****** *** **** ******* *** **** ******** ****.

******* ****

** * **** *****, *** '*** *****' ****** ** ********* the ***** ********* ****** ** *** ** ******* ***** ****. 

********* *********** **** * ***, ***** **** ***** *** ** not ******* ** ***, *** * ********** ******* ** ***** required. *** *******, * ********* ********** ***** ~$***, ****** **** installing ** *** ****** *** ********** **** **** ******** ******** functionality.

******** ******** **** * **** ****, ********* ******* ~$**** - $10000, *** **** ***** *** ** **** *********, **** **********, and ******* ********** **** * '***** *****' *******.

****** ****

***** **** '********** *******' **** * *****, ******** *** **** employed ** ******* ************* ** *****-***** ************* ** ******* ************, and ** ********-********* ****** ******** **** '**********'. **** ***** *** **** ******* ******* **** *******, ** that * ******* ** ******** *** ** ******** **** * police ******* ******* ****** *********** ** ******. 

** **** *****, * ********* ********** *** ******** ** * jail/prison **** **** * ******-**** ******** ****. ** ***** ***** the ******** **** ** **, *** **** **** ** ******, preventing ******* **** ******** **** *** ******* *******. ********, **** the ******** **** ** ****, *** ****** **** ** ********, allowing * ******* *** ***** *** *******/******* ****, *** ****** to ****** ** *** ******* *******. 

****** *****

*** ******** ***** **** ***** ** *** ** ******** ****** largely ** *** ********* **** ************** ** *** ********. *** *******, * ***** *********** ** **** is ********** *********** **** ** ****** ********, *** ** ****** from **** ** *** '****/******' *********** ********. ******** ** *** which ***** ***** ***** ******** * ***** ************** ** *** building ****.

*** **** **********/*********/********** ***************, **** ****** ******* *** '****** ****', which ***** **** **** ****** **** ****** ** **********. ** this ****, ******** *** ** **** ** **** ****** *** of ** ****, *** **** ****** ** **** ** **** people ****** ***. ** *** ********** ***** *** *** **** to ******* **** ********* ******, **** ***** ******* ****** ****** paths **** ** ** ******* ****** *** ****.

** **** *****, ******** *** ******** ******** *** **** ***** interfaces *** ********, ** **** ** ** ********* ** *** can *********** ** ******* ****** * "********" ****. 

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Door Closer Startup Lifedoor Aims To Prevent Fire Deaths on Jan 24, 2018
A startup named Lifedoor has a device with one basic function: Close doors during a fire. Closing doors is so powerful, UL and FDNY Fire Chiefs say...
PoE Powered Access Control Tutorial on Jan 19, 2018
Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
The 2018 Surveillance Industry Guide on Jan 16, 2018
The 300 page, 2018 Video Surveillance Industry Guide, covering the key events and the future of the video surveillance market, is now available,...
Multicasting Surveillance Tutorial on Jan 04, 2018
Network bandwidth can be a concern for some surveillance systems. While improvements in video codecs, such as smart codecs for H.264 and H.265,...
Access Control Course Winter 2018 on Jan 04, 2018
Learn more below about the Winter 2018 IPVM Access Control Course. Register here. IPVM offers the most comprehensive access control course in the...
Cabling Best Practices Guide on Jan 03, 2018
Surveillance cabling can be a major problem. Poorly installed and maintained networks are often costly, lengthy, frustrating ordeals to...
Multi-Imager Camera Guide on Jan 02, 2018
Multi-imager usage continues to grow, with most manufacturers now offering at least one model, making them an attractive option for covering wide...
2018 Access Control Book Released on Jan 02, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing, significantly updated for...

Most Recent Industry Reports

Why 3VR Failed on Feb 16, 2018
3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
"Fear Mongering": Hikvision USA Cybersecurity Director Dismisses Chinese Government Ownership Concerns on Feb 16, 2018
The facts are: The Chinese government created Hikvision and is Hikvision's controlling shareholder. Hikvision's Chairman, a Communist Party...
16:9 vs 4:3 Video Aspect Ratio Statistics on Feb 16, 2018
What aspect ratio do security integrators prefer? The 'standard' 4:3 or the 'wide' 16:9 one? 100+ integrators told us what they preferred, with...
Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Last Chance February 2018 Camera Course on Feb 15, 2018
This is the last chance to get into the Winter camera course, starts next Tuesday. Register now. IPVM provides the best education, live online...
Hikvision DeepInMind Tested Terribly on Feb 15, 2018
While Hikvision is heavily marketing deep learning and 'AI' as their next big thing, new IPVM test results of their DeepInMind NVR shows their deep...
Genetec CEO: You Cannot Buy Trust on Feb 14, 2018
Genetec's CEO, Pierre Racz, delivered a direct message at their channel partner conference: Racz has become a focal point in the industry debate...
Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Hanwha Wisenet X 5MP Camera Tested (XNV-8080R) on Feb 13, 2018
Wisenet X is Hanwha's high-end camera line. We tested their Wisenet X 1080p camera last year. Now Hanwha is offering 5MP cameras listing super low...
Top Problems For Integrator Project Management on Feb 13, 2018
Security projects routinely encounter issues that jeopardize deadlines, create confusion, and shrink profits. Unfortunately, there are common...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact