RFID Access Control System March, 2003 Softrónica.

Slides:



Advertisements
Similar presentations
Chapter 3: Introduction to Data Communications and Networking
Advertisements

California Access Controls Inc Exciting features that are extremely easy to use Exciting features that are extremely easy to use Access Control.
NexSentry Imaging Solutions
SYNAPSE I.S. Ticket Sales & Management. SYNAPSE I.S. What is Olympia ? Olympia is NOT just another internet sales service. Olympia is a tool for the ticketing.
Narita International Airport Corporation All Rights Reserved. Yoshihiro Ozawa Planning Department Narita International Airport Corporation 21 April 2005.
Card Verification Support
2014/6/2 Giga-Tms 1 The latest Biometric Technology.
LifeExpo Registration & Accreditation Electronic System Welcome.
The Complete Visitor Management System
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Blackboard® IP Devices
PulseHR Time and Attendance software development and coding web development, web hosting IT project management and consulting Str. Ghioceilor.
e-Solutions for Access Control, CCTV, Attendance Monitoring, Personal Identification, Building Management and Fire Detection SECURITY & SAFETY IS ONE.
ADMS Automatic Data Master Server
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Gateplus Time Attendance and Access Control System.
To be the only one-stop-shop for all Highway Management needs in the minds of customers by constantly innovating new products and services with breakthrough.
DAKNET Presented By: rreema.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Computer Networking Devices Seven Different Networking Components.
Smart Guard of Your Data Storage EXAGATE monitors, manages and warns for you.
Intercard The Right System March 6, 2012 Alberto Borrero Vice-President, Int´l Marketing & Sales Intercard Mobile: Skype: aborrero
G4 Control and Management Solution for Data- Centers and Computer Rooms.
Chapter 10: Authentication Guide to Computer Network Security.
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Number Five Software One provider Multiple Solutions professional card design software The most flexible and powerful solution for card issuing! The best.
Ken Dorsey KA8OAD. What is EchoLink? The simple answer is EchoLink software uses VoIP technology to link ham radio stations together around the world.
Page 1 - © Richard L. Goldman Mainframe Networking ©Richard L. Goldman January 7, 2002.
Truly Powerful. Flexibility, Scalability, Reliability User Friendly Software  Predefined parameters  Scaled down for easy admin  Personalised reporting.
1 Sales Academy Training Inner Range Product Advantages, Competitors & The Future.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 Reference sites Amgen Puerto Rico Telephone Phillip Morris Hewlett Packard Kremlin Expo ’98, Portugal.
1.Overview 2. Hardware 3. Software Interface 4. Triggering 5. Installation 6. Configuring.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
SYSTEM ADMINISTRATION Chapter 1 Logical and Physical Network Topologies.
1 NexSentry Command Center Powerful security management system with UNIX server and Windows NT 4 Operator Stations.
1 Reference sites Amgen Phillip Morris Hewlett Packard Kremlin Expo ’98, Portugal.
Intro to Network Design
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Smart Parking System PREPARED BY : GHADEER AQRAA AND MARAH JABER.
Chapter2 Networking Fundamentals
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
1 ARC reporting ARCCerny Verze INTERNET ARC events reporting Control panel 3. PSTN Telephone network - CID 1. GSM network – GPRS IP CID.
Introduction to Networks Mr. Grimming. Types of Networks Wide Area Network (WAN) Cover large geographic area Nodes connected by coaxial cable, microwave.
Activity 1 5 minutes to discuss and feedback on the following:
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
PYRESCOM - Mas des Tilleuls Canohès -FRANCE Tél. : +33 (0)4. 68
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
IPEmotion License Management PM (V1.2).
NETWORK VIDEO SURVEILLANCE. CCTV Closed-Circuit Television (CCTV) is the use of video cameras to transmit signal to a specific place on a designated device.
U-PROX SMART HANDLE Fully incorporated Wireless Handle and Furniture Locking Set.
Amgen Phillip Morris Hewlett Packard Kremlin Expo ’98, Portugal
COSEC Visitor Management
Security service management of tomorrow
PARKING AUTOMATION SYSTEM
OCR GCSE ICT Data capture methods.
OCR GCSE ICT Data capture methods.
Wavestore Integrates…
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
Wavestore Integrates…
Network Models, Hardware, Protocols and number systems
Presentation transcript:

RFID Access Control System March, 2003 Softrónica

General The Access Control System from Softrónica is the logical consequence of the long time experience of Softrónica in the RFID activities. The system has been developed considering features as flexibility, simplicity of implementation, easy to use, high customer value and reliability. System control through Ethernet makes it possible to use the existing network infrastructure, or easily build new nodes, by using standard off-the-shelf hardware. The system supports wall mount short rage and/or long range antenna device for hurdle free access to rooms or events in combination with automatic doors, turnstiles or any other door opening system. Optional features for advanced security with the additional implementation of biometrics.

Softrónica Architecture of the System Standard Access Zone VIP Access Zone WAN Main ServerBackup Server Internet Access

Softrónica Standard Access Checkpoint In Access areas with high traffic, a turnstile, revolving door or other person separation system controlled by an RFID long range antenna type Monolit controls individual access. The surface of an antenna can be used for information and advertising. Approaching the RFID reader with smart card, the RFID system sends the data to the computer of this control zone. After a real time verification of the card data and in case the person is authorized, the systems releases the door. For high security areas a biometric feature can be added. Using face recognition the advantage of hand free access is not affected. In access zones with multiple gates or doors a master computer controls a set of grouped standard clients. For easy supervising by the guard the relevant access data can be displayed in real time on a monitor.

Softrónica Standard Access (II) Zone-Computer Capturing zone Turnstile Antenna RFID Direction Entrance 1Entrance 3 Bus RS485 Entrance 2

Softrónica VIP Welcome Access Point For control and access with average traffic and with additional options. The basic system consists of two antennas of radio frequency identification (RFID) to detect and to read the information of the smart cards when a person passes by the antenna. The antenna could be considered as a gate, a door or even short range. The surface of a long range antenna might be used for specific advertisements. When approaching with a badge, the RFID system reads the card data and transmitts the data to zone computer that verifies the card data. In case the person is known and authorized the system releases the entrance, on a individual way. For example by an assigned computer that presents/displays a personalized welcome message for the guest. Optionally a portrait is displayed or a voice message says welcome. With a step sensor an alarm is initiated when a person passes without permission

Softrónica VIP with Greeting Module (II) RFID Antenna Direction Control station

Softrónica Door Access Points Access control for individual doors in all kind of environment. Each door is equiped with a full featured short range reader. The readers are controlled by a RS485 bus which connects all readers either to a computer a controller or to a device server which converts the RS485 port to Ethernet 10-BaseT. The system operate in online and offline mode. In the online mode, the data is stored in computer. In offline mode, the data is downloaded from a computer to an access control communication controller. This device is used to control the opening and closing in real time. It also stores all the access point configuration information, and the user information, so it can be sent to the host under request. RS485to host (Ethernet) Converter or controller

Softrónica Badge Personalisation Equipment needed for the personalisation of badges: - Computer with database - Camera - Thermotransfer Printer color or monochrom - RFID Reader/Writer for Time needed for the emission of a credential is approx. 1 – 2 minute with high quality picture. Personalisation Computer Short Range Reader CYCLP5000 Card Printer If needed with Security features Camera

Softrónica Edition of Badges The cards are issued with personalisation system consisting of camera, printer, reader/writer for RFID cards and software. The information of the issued card is stored in a data base and the card are encoded. The format process uses a coding key, with the algorithm and a unique electronic signature. Such a formatted card for a system will not be valid for another one. Cards are secure and can not be duplicated. The card can be printed with the image of the user, names, number of identification, expiration date, name and logo of the company.

Softrónica Mobile Data Terminals Equipment for mobile use in security, ticketing or other application. Simple reading of the information contained in the card, checking the credentials of a card. Available with several device options, WirelessLan, GSM, DECT MINEC Terminal HP i-Paq Terminal with RFID Reader/Writer

Softrónica Server High reliability data base server also in redundant configuration for high security applications. For example Computer DELL Power 2600 Edge series or similar Operating system LINUX for a powerfull data base.