Access Control


As more and more security threats are arising in the day to day lives of people, Door security Access control systems are becoming essential and a vital part of physical security systems in today’s modern world. It has become mandatory to monitor, record and restrict who is going in and who is going out through the entries and exits of offices, buildings and business premises and also who is accessing each door of a building.  With the latest technology in RFID smart card scanning, biometric finger printing, facial recognition or palm vein readers, we have the most innovative and secure solutions to handle your access control needs and also integrate the same with your time attendance, Asset Tracking, Person Tracking, etc.  
Key features in our Access Control solution include
  • Access Zone : Access Zone is a predefined physical area for which specific access policies are required. Access Zones can be created by dividing the organization into various departments like, R&D, finance, production, marketing and IT. Our software controls who (User) goes where (Access Zone) and when (Time) for each Access Zone. Using this feature, employee of one department can be restricted from entering into another department. Sub zones can also be created within an access zone to regulate further entry. 
  • Access Mode : User can enter into a zone by showing his credentials (Finger, Palm Vein, RF Card, PIN, Facial Recognition) to the reader. Admin can select any one or combination of any two or three credential options as an Access Mode on the door controllers to access any particular zone. 
  • Access Level : Access Level gives privileges to a user to enter into a controlled area. Access Levels are assigned separately to zones and users, ranging from 1 to 15. If user access level is greater than or equal to the zone access level, the user is allowed in that zone. Different access levels can be assigned for different times like working hours, break hours and non-working hours. 
  • First-In User Rule : In some organizations, employees or workers are not allowed to enter certain work areas unless a designated person enters first to ensure higher level of safety and security. Our software keeps the door locked until the designated first user registers his entry. Once the First-In entry is registered, other users are also allowed to enter during the working time of the First-In user. 
  • 2-Person rule : Certain sensitive zones contain valuable assets like cash, gold, data, intellectual property, etc. Security of such assets should not be entrusted to any single individual. 2-Person Rule allows entry only when two persons from an authorized group jointly use their access rights within a specified time. 2-Person Rule helps in eliminating frauds. This feature can also be used to ensure user's entry in certain hazardous areas. 
  • Man-Trap : Many times, two or more doors are arranged in a sequence to regulate traffic or control dust and heat. The second door should open only after the first has completely closed. Man-Trap offers programmable delay to regulate traffic or the flow rate of people. It also prevents any intruder from escaping in a hurry. 
  • Guard Tour : Guard Tour facilitates enforcing vigil patrol of security guards or such pre-fixed movement of other people. The guards have to show his credentials (palm, fingerprint or card) on defined checkpoints at specified time period. Guard Tour can be programmed to cover all required locations in a specific sequence. The maximum time period to complete a tour and total number of such tours in a defined time can also be defined. Successful completions and deviations logged for future review and reports. Deviation can also trigger immediate notification or alarm. 
  • Dead-Man Zone : It is essential to track the physical safety of an employee who is working in hazardous environments like railroads, mines, chemical labs, etc. Dead-Man Zone makes it compulsory for the employee to confirm his presence at pre-defined interval. If the user fails to punch within the pre-defined duration, an alarm is activated to draw attention of others. This feature can also be used to ensure guards remain awake during night shifts.
  • Anti-Pass-Back : Anti-Pass-Back prevents a card holder from passing his card back to another person to gain unauthorized entry. Second entry using the same card is allowed only after an exit is registered for every entry. Anti-Pass-Back helps organization in maximizing security by preventing fraudulent use of cards and maintaining an accurate record of the number of people in a specific zone. Anti-Pass-Back works in two modes:
    1) Anti-Pass Back Global : In this mode, system verifies user's exit marking on all zones before allowing re-entry.
    2) Anti-Pass Back Local : In this mode, system verifies user's exit marking on local zone (same zone of entry) only before allowing re-entry.
  • Do Not Disturb (DND) Zone : Do Not Disturb Zone feature is useful for meeting rooms, conference halls where people inside the area do not want to be disturbed by outside people. Users are restricted to enter DND zone till it is activated on the device. Certain users like VIP person can override DND rule. 
  • Route Based Access : Route based Access ensures users follow specific route to reach their destinations preventing them from wandering intentionally or unknowingly. A user must reach locations in a particular sequence which is defined on his smart card. The user cannot access devices which are not part of his route or out of sequence. This feature is very useful in large and sensitive areas like ports, pharmaceutical labs, R&D centers and mines where contract workers or external agencies need to reach their place of work following defined route. 
  • Occupancy Control : Occupancy Control is used to control the number of users within a designated zone. Maximum number of users in a zone can be defined and when the count reaches this limit, our software blocks additional users from entering the zone. This is useful for facilities like seminar halls, conference rooms and cafeterias where space is for a limited number of people. 
  • Smart Identification : Smart Identification is very useful where a large number of users are accessing one device. User's fingerprint and other information are stored on the smart card instead of the device. User has to show his credential along with the smart card. The device allows access and marks attendance based on the result.