Products/Services >>

..............................................................................................................................................................................................................................................................................................



ACCESS CONTROL SYSTEMS

Introduction
Access Control Systems replace standard locks and keys with an electronically programmable means of regulating entry and exit within an area. Access can be granted because the user has information or a pass. Access Control Systems give precise monitoring 24-hours in 7days for all critical areas that need to be protected. This non-intrusive technology provides a high profile presence and can also keep accurate entrance and exit time and data records of personnel within the building thus providing a very powerful management control tool as every member of staff can be managed effectively. It will also prevent fraudulent practices due to unauthorized access to sensitive areas.

Design Overview
The system is designed in such a way that a user is given an access level and needs only one access card to gain access to any of the doors or entrance.

System Description
Proximity Card Systems are made up of the following basic components: Controller, Single Reader Interface, Card Reader, Power supply unit, Electromagnetic lock, Request to exit Button (REX Button), Door Closer.
 

IVORY SYSTEMS proposes the NETBOX pioneering technology delivers a unique combination of security and convenience. It provides an effective and cost-conscious solution to ensuring the integrity and practicability of your security policy.

This system fully supports all Microsoft and computer industry standards for servers,  redundancy & fail over, and network protocols.

NETBOX Total Security Knowledge Management System

The NETBOX Total Security Management Solution provides a number of functions including the ability to regulate access through specific doors to secured areas, record and store Digital Video activities on the premises and also manage and track corporate assets.

The system is designed to work in any Microsoft Windows operating system environment. It is the only Security management solution that is Microsoft Gold Certified. The Access control SystemÒ is available as a standalone solution or as an integrated solution.

The system to be installed comprises cards, readers, an intelligent access controller and software, which provides fully, distributed intelligent access control of One to twenty doors with unlimited capacity in term of expansion.

The system uses an active proximity card to identify its holder and either grant or deny access to a door. To achieve this, the number or code contained in the card is read by a reading head under control of an electronic circuit known as Intelligent System Controller.

Intelligent System Controller
The controller provides the intelligence and memory needed for the access control decision.  It activates a door lock and monitors the door status.

The Intelligent Controller communicates with the Card Reader via the Reader Interface modules.

The controller takes the access decisions (whether or not to let the cardholder through the door) and operates the door using an electrical door lock mechanism.  The Controller stores the data to determine which cardholders are allowed where at what times.  

This serves as the predominant Access Control Engine. It communicates to the central database via an Ethernet TCP/IP LAN connection, direct connection, and even via Modem dial-up communication. It supports a minimum of 13,000 cardholders and 25,000 events. This allows it to make access control decisions and store event transactions even when communication is lost with the host PC.

Reader Interface Module
This provides a link between the Intelligent System Controller and the Card reader. It communicates access requests from the reader to the controller. The reader interface module also comes with the capacity to support Proximity, Magnetic/Swipe, Pin/keypad, Biometrics, Smart Cards and Finger Print Verification Readers. In all, it can simultaneously support a maximum of 8 card formats.

Access Software
This is the brain behind the system. It is used in System configuration and monitoring, allowing other On Guard application modules to be seamlessly integrated into the Access control module. The Software is designed to run in any Windows operating environment and is Microsoft Gold certified, ensuring compatibility.

Proximity/Biometric/Swipe Reader
The reader communicates to the ISC through the RI to process information from the Access Card

 
FINGER PRINT BIOMETRIC READER
SWIPE CARD READER
 

Access Card
Access token require by authorized personnel to be allowed access into the secured area.

Server Software
This application allows the System Administrator to add/delete users, monitor transaction at the doors, monitor alarm, add more access point i.e. doors and design site map.

Personal Computer
The Netbox Software shall be installed on this PC. Personal Computer System should be provided / allocated for the Access Control system, to enable the online capability and other functions as requested. This only gives room for a power user i.e. the accessing of information is only restricted to the PC allocated for it.

Door Lock and Release Devices
These are other Hardware for Access Control System is listed below;

  • Magnetic Lock
  • Standard Door Closer
  • Request to Exit Button
  • Standard Power Supply Unit

 

Home I Company Profile I Products / Services I Clientele I Contact Us I Webmail
.............................................................................................................................................................................................................................................................................

Copyright © 2013 Ivory Systems. All rights reserved
Site designed by: TENKO COMMUNICATIONS