1 / 36

WELCOME

WELCOME. Keyscan’s Access Control. KIMA SECURITY INC. All Market Sectors Commercial Institutional Industrial/Manufacturing Residential. Access Control Market. KIMA SECURITY INC. Stand alone systems operate independently no transaction records Integrated Systems

marilynk
Download Presentation

WELCOME

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WELCOME Keyscan’s Access Control KIMA SECURITY INC.

  2. All Market Sectors Commercial Institutional Industrial/Manufacturing Residential Access Control Market KIMA SECURITY INC.

  3. Stand alone systems operate independently no transaction records Integrated Systems inter-connected group of components produce transaction records Market Categories KIMA SECURITY INC.

  4. Chapter 3What Is Electronic Access Control? KIMA SECURITY INC.

  5. WHO WHERE WHEN Access control is based on ... KIMA SECURITY INC.

  6. Controls doors / elevators / parking gates / garages Operates 24 hours / 7 days / 12 months Specifies individual access at each door Monitors access points for alarms Access control features KIMA SECURITY INC.

  7. Integrates with other building systems Communicates via modem or networks for multiple building control Reports site activity for security management auditing Access control features (cont’d) KIMA SECURITY INC.

  8. Access Control vs. Keys better security avoids re-installing locks Advantages KIMA SECURITY INC.

  9. Access Control vs. Combination Locks controls access by time records the credential and access time Advantages KIMA SECURITY INC.

  10. Access Control vs. Security Personnel access control always on guard at every controlled access point even in a power failure no HR issues absenteeism etc. Advantages KIMA SECURITY INC.

  11. Cost savings saves on labour costs saves on cost of replacing lost assets or damaged property saves time resolving lost assets saves effort re-acquiring keys on terminations Advantages KIMA SECURITY INC.

  12. Chapter 4How Electronic Access Control Works KIMA SECURITY INC.

  13. Rapid sequence of events between... access control unit (ACU) reader electrically controlled locking device door contacts request to exit device credential – card, token, PIN, human physiological characteristic personal computer How It Works KIMA SECURITY INC.

  14. The credential is presented to a reader. How It Works KIMA SECURITY INC.

  15. Reader transmits credential’s identity to control unit. How It Works KIMA SECURITY INC.

  16. How It Works The control unit signals locking device at door. KIMA SECURITY INC.

  17. The ACU monitors the door contacts. How It Works KIMA SECURITY INC.

  18. How It Works Request to Exit device signals control unit on a legitimate exit. KIMA SECURITY INC.

  19. The access control unit and the computer transfer data and site activity. How It Works

  20. Proximity reader widely used in medium & high security applications variety of styles and shapes indoor and outdoor formats functions behind glass or drywall no contact required / hands free sensitive to metal & voltage interference Hardware Components KIMA SECURITY INC.

  21. Keypad reader used alone in low security areas used in tandem for higher security weather resistant no expense of a card, tag, or token when used alone PINs susceptible to viewing or borrowing Hardware Components KIMA SECURITY INC.

  22. Hardware Components Barcode reader • used alone in low security areas • low cost format • cards are programmable & economical • cards easy to duplicate • read head susceptible to dirt and moisture KIMA SECURITY INC.

  23. Hardware Components Magnetic stripe reader • used alone in low security areas such as colleges & universities • cards are programmable • read head susceptible to dirt and moisture • cards can be de-magnetized KIMA SECURITY INC.

  24. Hardware Components Kwik Key reader • outmoded technology seldom used KIMA SECURITY INC.

  25. Hardware Components Wiegand reader • seldom used, however, Wiegand communication protocol prevalently in use KIMA SECURITY INC.

  26. Hardware Components Radio frequency (RF) reader • low security areas such as parking applications • long read range up to 100 feet • transmitters control up to 4 different doors • transmitters multi-functional - RF & proximity • transmitters susceptible to damage KIMA SECURITY INC.

  27. Hardware Components Infrared reader • was used for parking applications • seldom used technology KIMA SECURITY INC.

  28. Hardware Components Biometric reader • used in high security applications • many different formats - finger print, hand scan, retina scan etc. • eliminates unauthorized entry with borrowed credential KIMA SECURITY INC.

  29. Hardware Components Smart card reader • integrates with smart card technology • smart cards store data & values • smart cards are multi-functional KIMA SECURITY INC.

  30. Hardware Components Reader communication protocols • Wiegand communication protocol widely used • generic 26-bit Wiegand protocol - less secure • proprietary Wiegand protocol - more secure • Keyscan uses proprietary 36-bit Wiegand protocol - no duplicate cards • Keyscan systems can read multiple Wiegand bit formats KIMA SECURITY INC.

  31. Hardware Components Electric Locking Devices • electric door strikes • fail safe & fail secure • magnetic locks • fail safe only • installation regulated by local building & fire codes All locks must be installed in a fashion to allow free exit in an emergency. KIMA SECURITY INC.

  32. Hardware Components Request to Exit Devices • push button - manually operated when exiting door • motion sensors - automatically signal system when exiting door • crash bar - manually operated when exiting door KIMA SECURITY INC.

  33. Hardware Components Door Monitoring Devices • door contacts • surface mount • concealed mount (preferred) • door sensors • integrated with locking device KIMA SECURITY INC.

  34. Typical Door Layout Hardware Components KIMA SECURITY INC.

  35. Credentials proximity cards/tags/tokens magnetic stripe cards smart cards RF transmitters PINs biometrics Personal Computer administer & monitor system Hardware Components KIMA SECURITY INC.

  36. Kima Security Inc 85 Marjoram DR, Ajax, Ontario, L1S 7P4 Phone 416-508-8554 Fax 1-866-341-1276 E-mail sales@kima.ca Contacts KIMA SECURITY INC.

More Related