SlideShare a Scribd company logo
1 of 34
Access Controls
Capt SB Tyagi, COAS CC*, FISM,
          CSC, CSP



                                 1
Access Control Measure




•Challenges for Security professionals –

•Change in security concept world over after
 WTC, USA incident on 11 Sept. 2001.

•Escalation in suicide attacks by terrorists –

•Dimension of Security drastically changed in India
 after attack on Indian Parliament on 13 Dec. 2001.
                                                      2
Why Access Control?
•Security professional now pay more emphasis on
intelligence gathering and proactive and preventive
Security management.
•The potential cost to business when security is
breached can weigh heavily on a company’s safety,
reputation, viability and ultimate profitability.

•Staff’s well being, product integrity, secret
processes, collateral and intellectual property is all at
great risk.

•Access Control provides the ability to control,
monitor and restrict the movement of people, assets
or vehicles in, out and around a building or site and
detect, delay and / refuse access to unauthorized.    3
Today’s bustling, exciting
 business needs the ability to:


•To know who is in the premise.
•Know where people are
•Restrict access to certain areas where
sensitive business activities are going on
•Access Control provides "owners" with the
ability to protect their people, assets and
intellectual property.

                                          4
Delay Element placement

♦ Delay should follow detection
♦ Maximized at the target for cost
  effectiveness
♦ In depth with multiple barriers layers
  demanding adversary's different
  skills, better planning and variety of
  tolls to defeat it
♦ Activated dispensable close to target

                                           5
Product Options
With continuing developments in technology the
variety of products for Access Control has
improved to meet the specific needs of the market.

The flexibility of offerings means there should be a
product to meet most requirements.
Access Control Systems can function as stand
alone or on-line systems connected to an operator
station.

Products range from –
•Token Based Systems
•Digital Key pads
•Biometrics Readers
•Audio/Video Entry Systems
                                                       6
Access Control System: Integration
Increasing complexity of security requirements and
the improvement in flexible technology solutions
led to the integration of Access Control products
with other security systems.

Access Control Systems now offer interfaces to:-

•     Alarm Management
•     CCTV System
•     Video Badging
•     Time and Attendance
•     Building Management System
•     Guard Tours Management
• Intruder Alarm System
                                                   7
ACCESS CONTROL SYSTEM
                           PC

                                   PRINTER



               READER
SAFE         CONTROLLER


                                SMART CARD READER /
                                FINGER SCAN




                                TRIPOD TURNSTILE
       MOTORISED VEHICLE
           BARRIER




                                                      8
Token Based Systems
•The fastest growing area, token-based systems, combines security
and convenience to offer solutions for applications including
building or site security, asset tracking, patient protection and
vehicle identification. Based on existing international standards,
available token technologies include

•Proximity, Hands-free, Magnetic Stripe, Wiegand, Biometrics, Smart
Card


•Cards and Readers: -

Some Access Control Systems supports all reader technologies to
meet the widest variety of application needs.

Multiple technologies can be used on the same system and even on
the same door, providing maximum design flexibility

Single card can be used for multiple functionality including access
control, time & attendance, cash-less vending and video/photo ID
                                                                      9
Types of Cards & Readers
•        Magnetic Stripe
•        Proximity
•        Wiegand
•        Hands Free
•        Smart Card
•        Watermark Magnetics
•        Barcode




                               10
Watermark Magnetics™ is a form of magnetic stripe
technology that uses a unique manufacturing
process to incorporate an indelible “Watermark”
number into the data stripe.




                                               11
Proximity Cards:
Technology uses a tuned RF circuit to emit a unique
identification over relatively short ranges. The card
requires no contact with the reader for the data to be
read




                                                    12
Benefits:
•Uses passive cards (no battery) for long lifetime
•Non-contact readability for convenient & easy use.
•Small unobtrusive readers.
•Maintenance frees.
•Cards can be supplied in credit card size with
integral magnetic stripe for multi-function
applications.



Applications:
     •Medium/High security.
     •Where convenience of use is a high priority.
     •Where multi-function cards are desirable.

                                                     13
STYLISH SIMPLICITY FOR EASE
           OF USE
  IT IS USER FRIENDLY

                              14
PROXIMITY READERS USING
     CARDS AND FOBS
 UP TO 99 CARDS/FOBS PER
           DOOR
                           15
All cards / fobs are individually
added / deleted by code entry
at the keypad  


  FAIL SAFE /FAIL SECURE
          RELAY
         OPERATION

                                16
PROXIMITY CARDS ARE…


*** SECURE,
  ***STYLISH,
    ***STRAIGHT FORWARD




                          17
Digital Keypads
In this case, the
"token" is simply a
numeric code entered
into a keypad on or
near the door. Codes
can usually be set to
different lengths and
most keypads have
the capacity for more
than one code.
                        18
Cryptag RF-ID Cards
Cryptag RF-ID card technology uses radio frequency (RF)
circuits encoded with unique data which are embedded into a
plastic card which can transmit identification data to a card
reader when within the reader’s RF range. The card does not
require insertion into or physical contact with a reader in order
for data to be obtained.




                                                                19
Benefits:

•         Almost impossible to duplicate cards due to
          RF circuitry and microchips embedded.
•         Non-contact readability provides easy use.
•         “On-the-fly” identification is available where
          the proximity card is interrogated without the
          cardholder having to stop or “show” the card
          to a reader.
•         Low maintenance reader due to non-contact
          of cards.
•         Slot-less reader and concealed installation
makes vandalism less likely.
   

                                                           20
Benefits:
•Equipment such as portable computers can be

“tagged” as a deterrent to theft.
•Variety of reader ranges and area coverage
available.
•Encrypted     communications      eliminates
interference with other electronic and RF based
systems.
•Passive tags available that do not require
batteries thus reducing on-going costs.
Applications:
•       High security hands-free applications.
•       Ideal for non-interventional tracking of
        people, vehicles and assets.
        Especially suitable for disabled, elderly and
                                                        21
Wiegand Cards
Wiegand Technology uses short lengths of special
alloy wire with unique magnetic properties
embedded into the card. The number of wire
lengths and their location within the data strip
determine the identification of the card.




 Applications: High Security.
                                                   22
Benefits:
•         Data strips are embedded within the card
and cannot be seen on the card surface.
•         Almost impossible to duplicate cards as
attempts to expose the embedded codes             will
move their precise location thereby making the
card unusable.
•         Readers can be used indoors and outdoors.
          Specials finish readers available.




                                                         23
What is Biometrics?
•Based on scientific fact that few
body parts of every human being
have distinct features unique and
different than others.
•Finger prints, shapes of iris, retina,
body odor etc. are few such
attributes which are used for
identification purpose.

•Biometric    characteristic     or  a
biometric trait, is a measurable
physiological or behavioral trait of a
living person that can be used to
determine or verify the identity
                                          24
What is Biometrics?
•Physiological biometrics (also known as static
biometrics): Biometrics based on data derived from
the measurement of a part of a person's anatomy.
Examples include fingerprints and iris patterns, as
well as facial features, hand geometry and retinal
blood vessel patterns.

•Behavioral biometrics (dynamic biometrics): based
on data derived from measurements of an action
performed by a person and, distinctively,
incorporating time as a metric — i.e., the measured
action has a beginning, middle and end. Examples
include voice (speaker verification) and signature.

                                                  25
Types of Biometrics
•      Fingerprint Biometrics
•      Hand Geometry Biometrics
•      Retina Recognition
•      Face Recognition
•      Palm / vain pattern
•      Voice Recognition

          Finger Print Biometrics




                                    26
How it works?
There is an optical device that uses digital
holography to 3-D scan a finger and compare it
against a previously enrolled template. Templates
are stored as an ASCII file against as ID number.



This system comprises of a reader, a processor
and a power supply. To enroll a person takes 25
seconds approximately. A person carries out
verification by entering PIN (personal identification
number) or swiping their card and placing their
finger on the reader platen.

                                                        27
Standalone Fingerprint Module
•Verification means that the system is used to verify
the identity of the person seeking access. This is
the most secure access control mode available.


                  •Identification means that the
                  system is being used to identify
                  the person without requiring
                  provision of any other source of
                  identification - except himself.


                 •Identification System can be
                 configured to be non-invasive
                 and user-friendly.
                                                    28
What are the benefits?
         • For Users:

         •Convenience - (in Identification
         mode) no card key to keep track of or
         access code to remember

• For Administrators:

•Peace of mind - secured areas are protected from
inadvertent lapses in security and from knowledge
that you are no longer reliant on token-based
security alone.
                                                 29
What are the benefits?


          •Affordability- in many cases, enhance
          security without replacing existing
          security devices.

• Compliance – If you simply don’t want someone
being where they shouldn’t be, system can be
configured to actively look for individuals, identify
them, & notify administrator if person approaches
secured area.


                                                   30
Benefits:
•Fully featured biometrics fingerprint reader.
•Multiple finger enrolment.
•Very low false acceptance rate of less than 0.0001
•Fast verification.
•Requires a 3 dimensional finger - thus copies or
 images provide no risk or threat to security.

Applications:
•        Very high security
•        Access control to buildings, car parks, isolated
         and remote facilities.
•        ATM, vault and safe control.
•        Identity verification of visitors to secure
         installations.
•        Prisons and military establishments.            31
Suitability of System
                    Magnetic   Proximity   Wiegand   Cryptag
                    Stripe
Security            Medium     High        High      High
Cost                Low        Medium      Medium    High
Vandal Resistance   Medium     Medium      Medium    High

Multi-Functional    Yes        Yes         Yes       No

End User Encoding   Yes        No          No        No

Video ID Option     Yes        Yes         Yes       Yes
Keypad Option       Yes        Yes         Yes       Yes
9-Key-Fob Option    No         Yes         Yes       Yes

Hands Free          No         No          No        Yes
Car Tagging         No         Yes         No        Yes
Asset Tagging       No         No          No        Yes
Environmental       High       High        High      V. High
Tolerance                                                      32
Suitability of System
                  SmartCard WatermarkMag Stripe
                                       Fingerprint   Barcode

Security          High     Very High    Very High    Low
Cost              High     Medium       High         Medium
Vandal Resistance Medium   Medium       Low          Low
Multi-Functional Yes       Yes          No           Yes
End User          No       No           No           Yes
Encoding
Video ID Option   Yes      Yes          No           Yes
Keypad Option     Yes      Yes          Yes          Yes
Key-Fob Option    Yes      No           No           No
Hands Free        No       No           No           No
Car Tagging       No       No           No           No
Asset Tagging     No       No           No           No
Environmental     High     Medium       Low          Medium
Tolerance                                                      33
http://www.wix.com/sbtyagi/iciss
         Capt S B Tyagi
        sbtyagi1958@gmail.com




                                   34

More Related Content

What's hot

ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.Advanced Card Systems Ltd.
 
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?Andreas Jakl
 
Winmate trusted mobile security solution
Winmate trusted mobile security solutionWinmate trusted mobile security solution
Winmate trusted mobile security solutionAllan (Yun-Chin) Lin
 
Hid smartid product_catalog_en
Hid smartid product_catalog_enHid smartid product_catalog_en
Hid smartid product_catalog_ensanzen enterprises
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Androidtodbotdotcom
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
Draft SP 800-157 - Derived PIV Credentials
Draft SP 800-157 - Derived PIV CredentialsDraft SP 800-157 - Derived PIV Credentials
Draft SP 800-157 - Derived PIV Credentialspuffyduffduff
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapHai Nguyen
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentationBhadra Gowdra
 
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorIJSRED
 

What's hot (19)

Smartphone Authentication
Smartphone AuthenticationSmartphone Authentication
Smartphone Authentication
 
Smart Cards Evolution
Smart Cards EvolutionSmart Cards Evolution
Smart Cards Evolution
 
IQ-R_catalog
IQ-R_catalogIQ-R_catalog
IQ-R_catalog
 
ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.ACR100 product presentation by Advanced Card Systems Ltd.
ACR100 product presentation by Advanced Card Systems Ltd.
 
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?
Which new scenarios are enabled by Windows 10 for NFC, Bluetooth LE & Beacons?
 
Winmate trusted mobile security solution
Winmate trusted mobile security solutionWinmate trusted mobile security solution
Winmate trusted mobile security solution
 
CCTV Catalogue
CCTV CatalogueCCTV Catalogue
CCTV Catalogue
 
Smart card
Smart cardSmart card
Smart card
 
Smart card
Smart cardSmart card
Smart card
 
Hid smartid product_catalog_en
Hid smartid product_catalog_enHid smartid product_catalog_en
Hid smartid product_catalog_en
 
Smart card
Smart cardSmart card
Smart card
 
Smart cards
Smart cardsSmart cards
Smart cards
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Android
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Draft SP 800-157 - Derived PIV Credentials
Draft SP 800-157 - Derived PIV CredentialsDraft SP 800-157 - Derived PIV Credentials
Draft SP 800-157 - Derived PIV Credentials
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 
E-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print SensorE-Passport Using RFID Tag and Finger Print Sensor
E-Passport Using RFID Tag and Finger Print Sensor
 

Similar to Access controls

Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3grantlerc
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Arpan Patel
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
SmartWorld Portfolio
SmartWorld PortfolioSmartWorld Portfolio
SmartWorld PortfolioSmart World
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportTariq Tauheed
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfssuser5b47c8
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016Jatin Mehta
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Ioannis Krontiris
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmSai Kumar
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint RecognitionSecurity Session
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesskumartarget
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io tChintan Patel
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokenssaniacorreya
 

Similar to Access controls (20)

Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
SmartWorld Portfolio
SmartWorld PortfolioSmartWorld Portfolio
SmartWorld Portfolio
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 
SS83Recycler
SS83RecyclerSS83Recycler
SS83Recycler
 
Smart card
Smart cardSmart card
Smart card
 
Machine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric PassportMachine Readable Travel Documents (MRTD) - Biometric Passport
Machine Readable Travel Documents (MRTD) - Biometric Passport
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdf
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
 
Biometrics
BiometricsBiometrics
Biometrics
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Ravi i ot-enablingtechnologies
Ravi i ot-enablingtechnologiesRavi i ot-enablingtechnologies
Ravi i ot-enablingtechnologies
 
2 cyber security challenges in io t
2 cyber security challenges in io t2 cyber security challenges in io t
2 cyber security challenges in io t
 
Smartcards and Authentication Tokens
Smartcards and Authentication TokensSmartcards and Authentication Tokens
Smartcards and Authentication Tokens
 

More from Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 

Access controls

  • 1. Access Controls Capt SB Tyagi, COAS CC*, FISM, CSC, CSP 1
  • 2. Access Control Measure •Challenges for Security professionals – •Change in security concept world over after WTC, USA incident on 11 Sept. 2001. •Escalation in suicide attacks by terrorists – •Dimension of Security drastically changed in India after attack on Indian Parliament on 13 Dec. 2001. 2
  • 3. Why Access Control? •Security professional now pay more emphasis on intelligence gathering and proactive and preventive Security management. •The potential cost to business when security is breached can weigh heavily on a company’s safety, reputation, viability and ultimate profitability. •Staff’s well being, product integrity, secret processes, collateral and intellectual property is all at great risk. •Access Control provides the ability to control, monitor and restrict the movement of people, assets or vehicles in, out and around a building or site and detect, delay and / refuse access to unauthorized. 3
  • 4. Today’s bustling, exciting business needs the ability to: •To know who is in the premise. •Know where people are •Restrict access to certain areas where sensitive business activities are going on •Access Control provides "owners" with the ability to protect their people, assets and intellectual property. 4
  • 5. Delay Element placement ♦ Delay should follow detection ♦ Maximized at the target for cost effectiveness ♦ In depth with multiple barriers layers demanding adversary's different skills, better planning and variety of tolls to defeat it ♦ Activated dispensable close to target 5
  • 6. Product Options With continuing developments in technology the variety of products for Access Control has improved to meet the specific needs of the market. The flexibility of offerings means there should be a product to meet most requirements. Access Control Systems can function as stand alone or on-line systems connected to an operator station. Products range from – •Token Based Systems •Digital Key pads •Biometrics Readers •Audio/Video Entry Systems 6
  • 7. Access Control System: Integration Increasing complexity of security requirements and the improvement in flexible technology solutions led to the integration of Access Control products with other security systems. Access Control Systems now offer interfaces to:- •     Alarm Management •     CCTV System •     Video Badging •     Time and Attendance •     Building Management System •     Guard Tours Management • Intruder Alarm System 7
  • 8. ACCESS CONTROL SYSTEM PC PRINTER READER SAFE CONTROLLER SMART CARD READER / FINGER SCAN TRIPOD TURNSTILE MOTORISED VEHICLE BARRIER 8
  • 9. Token Based Systems •The fastest growing area, token-based systems, combines security and convenience to offer solutions for applications including building or site security, asset tracking, patient protection and vehicle identification. Based on existing international standards, available token technologies include •Proximity, Hands-free, Magnetic Stripe, Wiegand, Biometrics, Smart Card •Cards and Readers: - Some Access Control Systems supports all reader technologies to meet the widest variety of application needs. Multiple technologies can be used on the same system and even on the same door, providing maximum design flexibility Single card can be used for multiple functionality including access control, time & attendance, cash-less vending and video/photo ID 9
  • 10. Types of Cards & Readers •        Magnetic Stripe •        Proximity •        Wiegand •        Hands Free •        Smart Card •        Watermark Magnetics •        Barcode 10
  • 11. Watermark Magnetics™ is a form of magnetic stripe technology that uses a unique manufacturing process to incorporate an indelible “Watermark” number into the data stripe. 11
  • 12. Proximity Cards: Technology uses a tuned RF circuit to emit a unique identification over relatively short ranges. The card requires no contact with the reader for the data to be read 12
  • 13. Benefits: •Uses passive cards (no battery) for long lifetime •Non-contact readability for convenient & easy use. •Small unobtrusive readers. •Maintenance frees. •Cards can be supplied in credit card size with integral magnetic stripe for multi-function applications. Applications: •Medium/High security. •Where convenience of use is a high priority. •Where multi-function cards are desirable. 13
  • 14. STYLISH SIMPLICITY FOR EASE OF USE IT IS USER FRIENDLY 14
  • 15. PROXIMITY READERS USING CARDS AND FOBS UP TO 99 CARDS/FOBS PER DOOR 15
  • 16. All cards / fobs are individually added / deleted by code entry at the keypad   FAIL SAFE /FAIL SECURE RELAY OPERATION 16
  • 17. PROXIMITY CARDS ARE… *** SECURE, ***STYLISH, ***STRAIGHT FORWARD 17
  • 18. Digital Keypads In this case, the "token" is simply a numeric code entered into a keypad on or near the door. Codes can usually be set to different lengths and most keypads have the capacity for more than one code. 18
  • 19. Cryptag RF-ID Cards Cryptag RF-ID card technology uses radio frequency (RF) circuits encoded with unique data which are embedded into a plastic card which can transmit identification data to a card reader when within the reader’s RF range. The card does not require insertion into or physical contact with a reader in order for data to be obtained. 19
  • 20. Benefits: •         Almost impossible to duplicate cards due to RF circuitry and microchips embedded. •         Non-contact readability provides easy use. •         “On-the-fly” identification is available where the proximity card is interrogated without the cardholder having to stop or “show” the card to a reader. •         Low maintenance reader due to non-contact of cards. •         Slot-less reader and concealed installation makes vandalism less likely.     20
  • 21. Benefits: •Equipment such as portable computers can be “tagged” as a deterrent to theft. •Variety of reader ranges and area coverage available. •Encrypted communications eliminates interference with other electronic and RF based systems. •Passive tags available that do not require batteries thus reducing on-going costs. Applications: •       High security hands-free applications. •       Ideal for non-interventional tracking of people, vehicles and assets. Especially suitable for disabled, elderly and 21
  • 22. Wiegand Cards Wiegand Technology uses short lengths of special alloy wire with unique magnetic properties embedded into the card. The number of wire lengths and their location within the data strip determine the identification of the card. Applications: High Security. 22
  • 23. Benefits: •         Data strips are embedded within the card and cannot be seen on the card surface. •         Almost impossible to duplicate cards as attempts to expose the embedded codes will move their precise location thereby making the card unusable. •         Readers can be used indoors and outdoors. Specials finish readers available. 23
  • 24. What is Biometrics? •Based on scientific fact that few body parts of every human being have distinct features unique and different than others. •Finger prints, shapes of iris, retina, body odor etc. are few such attributes which are used for identification purpose. •Biometric characteristic or a biometric trait, is a measurable physiological or behavioral trait of a living person that can be used to determine or verify the identity 24
  • 25. What is Biometrics? •Physiological biometrics (also known as static biometrics): Biometrics based on data derived from the measurement of a part of a person's anatomy. Examples include fingerprints and iris patterns, as well as facial features, hand geometry and retinal blood vessel patterns. •Behavioral biometrics (dynamic biometrics): based on data derived from measurements of an action performed by a person and, distinctively, incorporating time as a metric — i.e., the measured action has a beginning, middle and end. Examples include voice (speaker verification) and signature. 25
  • 26. Types of Biometrics • Fingerprint Biometrics • Hand Geometry Biometrics • Retina Recognition • Face Recognition • Palm / vain pattern • Voice Recognition Finger Print Biometrics 26
  • 27. How it works? There is an optical device that uses digital holography to 3-D scan a finger and compare it against a previously enrolled template. Templates are stored as an ASCII file against as ID number. This system comprises of a reader, a processor and a power supply. To enroll a person takes 25 seconds approximately. A person carries out verification by entering PIN (personal identification number) or swiping their card and placing their finger on the reader platen. 27
  • 28. Standalone Fingerprint Module •Verification means that the system is used to verify the identity of the person seeking access. This is the most secure access control mode available. •Identification means that the system is being used to identify the person without requiring provision of any other source of identification - except himself. •Identification System can be configured to be non-invasive and user-friendly. 28
  • 29. What are the benefits? • For Users: •Convenience - (in Identification mode) no card key to keep track of or access code to remember • For Administrators: •Peace of mind - secured areas are protected from inadvertent lapses in security and from knowledge that you are no longer reliant on token-based security alone. 29
  • 30. What are the benefits? •Affordability- in many cases, enhance security without replacing existing security devices. • Compliance – If you simply don’t want someone being where they shouldn’t be, system can be configured to actively look for individuals, identify them, & notify administrator if person approaches secured area. 30
  • 31. Benefits: •Fully featured biometrics fingerprint reader. •Multiple finger enrolment. •Very low false acceptance rate of less than 0.0001 •Fast verification. •Requires a 3 dimensional finger - thus copies or images provide no risk or threat to security. Applications: •        Very high security •        Access control to buildings, car parks, isolated and remote facilities. •        ATM, vault and safe control. •        Identity verification of visitors to secure installations. • Prisons and military establishments. 31
  • 32. Suitability of System Magnetic Proximity Wiegand Cryptag Stripe Security Medium High High High Cost Low Medium Medium High Vandal Resistance Medium Medium Medium High Multi-Functional Yes Yes Yes No End User Encoding Yes No No No Video ID Option Yes Yes Yes Yes Keypad Option Yes Yes Yes Yes 9-Key-Fob Option No Yes Yes Yes Hands Free No No No Yes Car Tagging No Yes No Yes Asset Tagging No No No Yes Environmental High High High V. High Tolerance 32
  • 33. Suitability of System SmartCard WatermarkMag Stripe Fingerprint Barcode Security High Very High Very High Low Cost High Medium High Medium Vandal Resistance Medium Medium Low Low Multi-Functional Yes Yes No Yes End User No No No Yes Encoding Video ID Option Yes Yes No Yes Keypad Option Yes Yes Yes Yes Key-Fob Option Yes No No No Hands Free No No No No Car Tagging No No No No Asset Tagging No No No No Environmental High Medium Low Medium Tolerance 33
  • 34. http://www.wix.com/sbtyagi/iciss Capt S B Tyagi sbtyagi1958@gmail.com 34