Thursday, September 27, 2012

A Primer on Electronic Access Control (EAC)

Security has 3 parts:

  1. Surveillance
  2. Access Control (who can go where and when)
  3. Intrusion Detection

Identification categories, from least to most secure:

  • object ID - key, card - can be stolen, lost
  • data - password, keycode - can be forgotten, give to unauthorized parties
  • personal attribute - retinal scan, fingerprints - difficult to fake
  • a combination of 2 or all of the above

EAC online system - can be reprogrammed centrally.  Generic example:

  1. lock (elec. strike)
  2. ID reader 
  3. door contact - determines if door is open or closed only. signals fault depending on reader/REX*
  4. REX - request to exit sensor.  temporarily overrides door fault alarm for exiting
  5. access panel connected to the 4 devices above, processes request - wired to PC, which keeps records

*Priority 1 fault: contact is open w/o as successful scan
Priority 2 fault:  door propped open.  happens after a successful scan

EAC offline system - self-contained, no connection to PC.  Must be reprogrammed locally.

notes from a presentation at HOLT by:
Ingersoll Rand 
Stephen Pemberton