Electronic Card Access
System
Compiled by
Prasanna Narangoda
Anaccesscontrolsystemisasystemwhichenables
anauthoritytocontrolaccesstoareasandresourcesin
agivenphysicalfacilityorcomputer-basedinformation
system.Anaccesscontrolsystem,withinthefieldof
PhysicalSecurityisgenerallyseenasthesecondlayer
inthesecurityofaphysicalstructure.
Access Control System
System Components
Access Controller
Card Reader
Electromagnetic locks, Door holders & Electric drop bolts
Door Contacts
Access Cards
Emergency Push Button
Exit Push Button
Access Controller
ThisisthemaincomponentorHubofthesystem.Thecontroller
canworkasastandalonecontrollerornetworknode. The
controllercapacitycanbespecifiedasthenoofdoorsitcan
control.
The decision making process in an access control
Controller checks,
The card encoding & verifies current authorization
Number is allowed to enter the access point
Time for entry is valid
Day of the week is valid
The controller only grants access if the conditions are met.
Specifications of Door
Controllers……….
No. of Doors it can control
No. of Records/employees and
no of events it can store (memory
capacity)
Type of Readers it can handle
(proximity, biometric, magnetic
stripe, barcode etc)
Type & no. of Inputs / Outputs
available
Communication protocol, distance
& media
Power supply voltage
Proximity Card Readers
A Contactless integrated circuit
device.
Have a range of 0-3 inches in
most instances
ISO / IEC 14443 & ISO/IEC
15693
Bar Code Readers
Simple to create & Easy to Use
Low Cost
Wiegand Readers
Swipe Reader
Insertion Reader
oUsually maintenance free
oNo encoding or programming required
oReaders are weather resistant and can operate in very high
or low temperatures.
oNot effected by radio frequency
oAvailable as swipe, insertion, turnstile, or card/key systems
oCost is reasonable
Biometric readers
Eye recognition Palm Reader
o
An electronic devise used to determine person’s identity by
detecting and matching person’s physical features such as
fingerprints, eyes or voice
oFingerprint type is the most common
oCompare the template stored in memory to the scan obtained
during the process of identification
oExpensive and used in very high security applications
Finger Reader
Door Holders
Electromagnetic Door Locks
oThis is the device used to lock Doors. Once the signal is
received from Controller power supply to the lock or holder is
de-energized. Hence the door will release.
oTwo parts, main component with electro- magnet and
metal plate
Electromagnetic Door Locks & Door Holders
Electromagnetic Door Locks mounting..
Electromagnetic Door Locks……….
Electric Drop Bolts
An Electric Drop Bolt is a motor or solenoid actuated symmetrical
dead- bolt mechanism.
used for specific applications where Electric Strikes and
Electromagnetic Locks cannot be used, such as double action 180
degree swing through or sliding doors.
Recommend for frameless glass doors
In many cases Electric Drop Bolts are used as additional or
secondary locking device. The locking status and door status of the
drop bolt can be remotely monitored.
oDoor contacts are used to check whether the door has actually
open / close base on the signal received from controller.
oDoor contacts are only dry contacts, no power required
oConsists with two components.
Door Contacts
Access Cards
Emergency Push buttons
Emergency Push Buttons are used to override the access
control system controls.
Access Control System Function
Anaccesscontrolpoint,whichcanbeadoor,turnstile,parkinggate,
elevator,orotherphysicalbarrierwheregrantingaccesscanbe
electricallycontrolled. Typicallytheaccesspointisadoor.Anelectronic
accesscontroldoorcancontainseveralelements.Atitsmostbasic,
thereisastand-alone electriclock.Thelockisunlockedbyanoperator
withaswitch.Toautomatethis,operatorinterventionisreplacedbya
reader.Thereadercouldbeakeypadwhereacodeisentered,itcould
beacardreader,oritcouldbeabiometricreader.Readersdonot
usuallymakeanaccessdecisionbutsendacardnumbertoanaccess
controlpanelthatverifiesthenumberagainstanaccesslist.Tomonitor
thedoorpositionamagneticdoorswitchisused. Inconceptthedoor
switchisnotunlikethoseonrefrigeratorsorcardoors.Generallyonly
entryiscontrolledandexitisuncontrolled. Incaseswhereexitisalso
controlledasecondreaderisusedontheoppositesideofthedoor.In
caseswhereexitisnotcontrolled,freeexit,adevicecalledarequest-to-
exit(REX)isused. Request-to-exitdevicescanbeapushbuttonora
motiondetector.Whenthebuttonispushedorthemotiondetector
detectsmotionatthedoor,thedooralarmistemporarily
Access Control Topology
Typical Access Control Door Wiring
1. Serial Controllers
Controllers are connected to a host PC via a serial RS-485
communication line.
Advantages:
RS-485 standard allows long cable runs, up to 4000 feet (1200 m)
Relatively short response time. The maximum number of devices on an
RS-485 line is limited to 32, which means that the host can
frequently request status updates from each device and display
events almost in real time.
High reliability and security as the communication line is not shared with
any other systems.
Disadvantages:
RS-485 does not allows Star-type wiring unless splitters are used
RS-485 is not well suited for transferring large amounts of data (i.e.
configuration and users). The highest possible throughput is
115.2 kbit/s, but in most system it is downgraded to 56.2 kbit/s or
less to increase reliability.
2. Serial Main and Sub-Controllers
Alldoorhardwareisconnectedtosub-controllers(doorcontrollersordoor
interfaces).Sub-controllersusuallydonotmakeaccessdecisions,and
forwardallrequeststothemaincontrollers.Maincontrollersusually
supportfrom16to32sub-controllers.
Advantages:
Work load on the host PC is significantly reduced, because it only needs
to communicate with a few main controllers.
The overall cost of the system is lower, as sub-controllers are usually
simple and inexpensive devices.
All other advantages listed in the serial controller is applicable.
Disadvantages:
Operationofthesystemishighlydependentonmaincontrollers.In
caseoneofthemaincontrollersfails,eventsfromitssub-
controllersarenotretrievedandfunctionsthatrequireinteraction
betweensubcontrollers(i.e.anti-passback)stopworking.
Somemodelsofsub-controllers(usuallylowercost)havenomemory
andprocessingpowertomakeaccessdecisionsindependently.
Ifthemaincontrollerfails,sub-controllerschangetodegraded
modeinwhichdoorsareeithercompletelylockedorunlocked
andnoeventsarerecorded. Suchsub-controllersshouldbe
avoidedorusedonlyinareasthatdonotrequirehighsecurity.
Main controllers tend to be expensive, therefore such topology is not
very well suited for systems with multiple remote locations that
have only a few doors.
All other RS-485-related disadvantages listed in the serial controller is
applicable apply.
3. Serial main controllers & intelligent
readers
Alldoorhardwareisconnecteddirectlytointelligentorsemi-
intelligentreaders.Readersusuallydonotmakeaccess
decisions,andforwardallrequeststothemaincontroller.Onlyif
theconnectiontothemaincontrollerisunavailable,thereaders
usetheirinternaldatabasetomakeaccessdecisionsandrecord
events.Semi-intelligentreaderthathavenodatabaseandcannot
functionwithoutthemaincontrollershouldbeusedonlyinareas
thatdonotrequirehighsecurity.Maincontrollersusuallysupport
from16to64readers.
All advantages and disadvantages are the same as the ones listed
in the Serial main Sub Controllers.
Inspiteoftherapiddevelopmentandincreasinguseof
computernetworks,accesscontrolmanufacturers
remainedconservativeanddidnotrushtointroduce
network-enabledproducts.Whenpressedforsolutions
withnetworkconnectivity,manychosetheoption
requiringlessefforts:additionofaterminalserver,a
devicethatconvertsserialdatafortransmissionviaLAN
orWAN.
4. Serial controllers with terminal servers.
4. Serial controllers with terminal servers…..
Advantages:
Allows utilizing existing network infrastructure for connecting separate
segments of the system.
Provides convenient solution in cases when installation of an RS-485 line
would be difficult or impossible.
Disadvantages:
Increases complexity of the system.
Creates additional work for installers: usually terminal servers have to
be configured independently, not through the interface of the
access control software.
Serial communication link between the controller and the terminal server
acts as a bottleneck: even though the data between the host PC
and the terminal server travels at the 10/100/1000Mbit/s network
speed it then slows down to the serial speed of 112.5 kbit/s or
less. There are also additional delays introduced in the process of
conversion between serial and network data.
4. Network-enabled main controllers.
Transmission of
configurationandusersto
themaincontrollersisfaster
andmaybedoneinparallel.
Thismakesthesystemmore
responsiveanddoesnot
interruptnormaloperations.
Nospecialhardwareis
requiredinordertoachieve
redundanthostPCsetup: in
casetheprimaryhostPC
fails,thesecondaryhostPC
maystartpollingnetwork
controllers.
5. IP controllers.
Controllers are connected to a host PC via Ethernet LAN or WAN
Advantages:
Simplifiesinstallationofsystemsconsistingofmultiplesitesseparated
bylargedistances.BasicInternetlinkissufficienttoestablish
connectionstoremotelocations.
Wideselectionofstandardnetworkequipmentisavailabletoprovide
connectivityindifferentsituations(fiber,wireless,VPN,dualpath,
PoE)
Disadvantages:
The system becomes susceptible to network related problems, such as
delays in case of heavy traffic and network equipment failures.
Access controllers and workstations may become accessible to hackers
if the network of the organization is not well protected. This threat
may be eliminated by physically separating the access control
network from the network of the organization. Also it should be
noted that most IP controllers utilize either Linux platform or
proprietary operating systems, which makes them more difficult
to hack. Industry standard data encryption is also used.
Disadvantages:
Maximum distance from a hub or a switch to the controller is 100 meters
(330ft).
Operation of the system is dependent on the host PC. In case the host
PC fails, events from controllers are not retrieved and functions
that required interaction between controllers (i.e. anti-passback)
stop working. Some controllers, however, have peer-to-peer
communication option in order to reduce dependency on the host
PC.
What is Anti –Pass Back ??
The main purpose of anti pass back system is to prevent a card holder
passing from their card back to a second person to gain entry into the
same control area.
Cables
Type of cables depend on the manufacturer standards.