• No results found

Access Control, Integrated

N/A
N/A
Protected

Academic year: 2021

Share "Access Control, Integrated"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Access Control,

Integrated

An essential

essential

essential

essential guide to integration

integration

integration

integration of your security

systems and the benefits

benefits

benefits that can bring

benefits

Duncan Gooch Product Manager

Issue 1.1_03/2011

(2)

Contents Contents Contents Contents

1 Introduction... 3

1.1 What Does Integration Actually Mean?... 3

1.2 Who Are the ‘Integration Stakeholders’? ... 3

1.3 How would Integration Benefit My Project?... 3

2 How does Data Integration to Access Control Work? ... 4

2.1 Overview ... 4

2.2 Read-Only Database Connections ... 4

2.3 Fusion Scripting Tool... 5

2.4 Real-Time Event Exporting ... 5

2.5 Command Import ... 5

2.6 Card Import Function ... 5

2.7 User Export Function... 5

2.8 OPC Server... 5

3 Bringing Video to Access Control ... 6

4 Fire Door Monitoring and Control... 6

5 Lift System Integration ... 6

6 Intruder Integration ... 6

7 Conclusion... 6

(3)

1 1 1

1 INTRODUCTIONINTRODUCTIONINTRODUCTION INTRODUCTION

There’s no doubt that ‘Integration’ has become something of a buzz word in the security industry in recent years. Manufacturers are keen to stress to prospective clients the ability of their products to integrate with others. At the same time, clients are increasingly searching for truly integrated solutions which will allow them to not only

maximise the capabilities of each individual product, but more importantly to enjoy the benefits that only true integration can deliver.

1 1 1

1....1111 What Does Integration Actually Mean?What Does Integration Actually Mean?What Does Integration Actually Mean?What Does Integration Actually Mean?

There is a danger that ‘integration’ becomes a slightly over-used claim; so what do we actually mean by a term that potentially covers a multitude of definitions and probably means many different things to many different people? At its most basic level, it’s possible to define integration as the act of combining two or more separate items with the aim making the whole more effective than the sum of the individual parts.

In this context, the process of integration actually brings together a number of different, but potentially linked, sub-systems to form one homogeneous whole – establishing interfaces through which each system is able to

communicate. Clearly to achieve this, the language of each sub-system must be common, or at least have certain elements of commonality, and so for this to be possible it is vital that the correct interfaces are carefully specified. Essentially, integration is just the ‘glue’ that allows these systems to work together.

Once two or more sub-systems are integrated, then some of the key benefits can begin to be realised, with well designed and managed integrated systems delivering operational and cost advantages to a wide number of groups. 1

1 1

1....2222 Who Are the ‘Integration Stakeholders’?Who Are the ‘Integration Stakeholders’?Who Are the ‘Integration Stakeholders’?Who Are the ‘Integration Stakeholders’?

There are a wide range of integration stakeholders, each of whom may be involved at a different stage of the process. At the start, consultants, architect and system designers must consider the requirements that they demand from a system and the design of the system architecture - taking into account factors such as the security of the perimeter of the building and specific areas within it; the safety of its occupants and the needs of the system users. Consideration will also need to be given to the deliverables that are required in terms of reporting and performance, for instance if and how systems will need to integrate across areas such as HR, time and attendance and building management systems.

The installation company will then be tasked with setting up and commissioning the system - delivering the requirements of the specification as well as the individual needs of the security manager, IT manager and other system users - all of whom may need support to maximise the system’s effectiveness.

Throughout the process, leading manufacturers will provide support both for their own systems and to ensure that the effectiveness of the integrated whole is maximised.

Although the shape and scope of systems will vary according to the specific needs of individual projects, integration can benefit a host of applications across a wide range of market sectors in both the public and private sectors - from schools, universities and hospitals to offices, banks, manufacturing plants and transport hubs.

1 1 1

1....3333 How would Integration Benefit My Project?How would Integration Benefit My Project?How would Integration Benefit My Project?How would Integration Benefit My Project?

Clearly there are advantages to an integrated solution, but how are these realised in practice? Again this goes back to understanding each user’s specific needs, but two typical examples of system components will help demonstrate the potential that integration can unlock.

From a user’s and building management point of view, smart card solutions provide the advantage of needing to have just one single card to cover multiple applications. The development of smart card technology brought a highly cost-effective form of integration to the market. In this case, the ‘glue’ is the card itself and its ability to be used for a wide range of applications, which as well as physical access control can include cashless vending, library services, time and attendance systems, transportation and photocopier control.

At the other end of the spectrum sit fully integrated management systems - providing seamless integration capability across a number of different applications.

For example, a number of modern, intelligent systems provide third-party data integration with multiple

management systems - such as HR, time and attendance, vending, building management systems (such as power, air conditioning and lift controls) and other proprietary database applications such as School Information

(4)

Management Systems (SIMS). Manufacturers often provide full data integration packs for applications such as SIMS, allowing read-only database access, the ability to export live events to PC, mobile phone, email or PDA as well as a number of synchronisation tools to make sure that the process is fast and straightforward.

These systems are also capable of effectively integrating with CCTV systems - as well as specific packages (such as guard patrol) and sophisticated biometric systems. Their inherent flexibility enables outputs from the sub-systems to be monitored against pre-set criteria, triggering activities in other systems based on certain events (for example the activation of CCTV recording when specific access control readers are swiped).

Integration then can operate at a whole host of levels from a simple combination of functions in a smart card, to a fully integrated system which brings together applications from across every area of an organisation. A full Integrated Security Management System (ISMS) can integrate any combination, or all of a wide range of systems including access control; CCTV; digital video; intruder and fire systems; building management systems; time and attendance and payroll systems as well as logical security.

2 2 2

2 HOW DOES DATA INTEGRHOW DOES DATA INTEGRHOW DOES DATA INTEGRATIONHOW DOES DATA INTEGRATIONATION TO ACCESS CONTROL WATION TO ACCESS CONTROL W TO ACCESS CONTROL W TO ACCESS CONTROL WORK?ORK?ORK?ORK? 2

2 2

2....1111 OverviewOverviewOverviewOverview

Leading access control manufacturers have developed a range of technologies and systems to provide effective and seamless integration. For example, TDSi provides a suite of tools that allow the EXgarde access control management system to be integrated and shared with third-party systems. Typically this may include packages such as Building Management, HR and Time and Attendance Systems.

These tools are summarised in the diagram below and then covered individually in a little more detail later in this section:

2 2 2

2....2222 ReadReadReadRead----Only Database ConnectionsOnly Database ConnectionsOnly Database Connections Only Database Connections

A read-only database connection allows a third-party system to view the contents of the access control database via ODBC, OLE DB, JDBC and Microsoft DotNET connections. The external connections to the database can easily be controlled by setting up database users within the access control system.

Once the connection is set up, the third-party system can view any object within the database - such as users and cards. As the name suggests, information can be viewed within the access control system, but it cannot be changed. For that, a scripting tool would be required.

Read-Only Database Connection

Fusion Scripting Tool

Real-Time Event Export

User Import Function

User Export Function

A cc e ss C o n tr o l D a ta b a se OPC Interface Command Import Tool

(5)

2 2 2

2....3333 Fusion Scripting ToolFusion Scripting ToolFusion Scripting ToolFusion Scripting Tool

This tool is used to allow certain changes to be made within the access control database. For security reasons, certain items cannot be changed, but all of the main items may be, such as the creation, modification and deletion of users and cards, as well as the ability to assign users to specific access groups and issue cards to them.

The tool links to a table in the third-party database (or External Database System - EDBS) via ODBC and changes are effected in the access control database based on custom scripts that provide the instruction for tasks to be carried out.

All actions that are implemented by Fusion are executed in real-time and logged in the database – in exactly the same way that a normal operator’s changes would be.

The system can be further enhanced with a synchronisation tool, which searches for a file containing changes. The synchronisation tool then compares these changes to information contained within the database and instructs Fusion to automatically make any necessary changes. This has the distinct benefit of providing complete control of user maintenance from a third-party system, eliminating the need for the double-entry of information and

practically eliminating the risk of errors occurring. 2

2 2

2....4444 RealRealRealReal----Time Event ExportingTime Event ExportingTime Event ExportingTime Event Exporting

This tool is ideal for sending information to a third-party system that can then filter and act on event information as it occurs. For example, a CCTV system could filter on an access-granted event for a specific user and use this information to switch to a camera.

Events can be sent to a serial port, database or file. 2

2 2

2....5555 Command ImportCommand ImportCommand ImportCommand Import

This allows commands to be sent to the access control system through a secure log-in. The tool reads a file (CSV-based) and allows users, access groups and key boxes and cards to be added, together with the assignment of cards to users, and users to access groups.

This feature is particularly useful when migrating from one access control system to another. 2

2 2

2....6666 Card Import FunctionCard Import FunctionCard Import FunctionCard Import Function

Allowing card numbers to be imported into the access control system, this tool is useful if, for example, a large number of cards need to be loaded during the commissioning phase of a system.

2 2 2

2....7777 User Export FunctionUser Export FunctionUser Export FunctionUser Export Function

This allows all users to be exported from the access control system, together with their respective images. Again this feature is particularly useful when migrating from one system to another, or if a large amount of user data needs to be manipulated it can be exported to a spreadsheet application and re-imported once complete. 2

2 2

2....8888 OPC ServerOPC ServerOPC ServerOPC Server

Part of the Fusion tool, the OPC Server supports Data Access (DA) and Alarm and Event (AE) interfaces.

The DA interface provides tags for door controllers, doors and users. It also allows the changing of the door status - for example, a remote application can release a door.

(6)

3 3 3

3 BRINGING VIDEO TO ACBRINGING VIDEO TO ACBRINGING VIDEO TO ACCESS CONTROLBRINGING VIDEO TO ACCESS CONTROLCESS CONTROLCESS CONTROL

Incorporating a visual element adds a new dimension to access control, significantly enhancing system security. Features include:

 Display and activate live video from any camera linked into the system from a graphical site plan and obtain an instant view of the situation from a single user interface

 Associate video with particular access control events and quickly locate relevant video  Search and access video that has been associated with an access event

 Automatically display live view from a selected camera when an access control event occurs, providing an instant way of verifying that the user is who they say that they are

4 4 4

4 FIRE DOOR MONITORINGFIRE DOOR MONITORINGFIRE DOOR MONITORING AND CONTROLFIRE DOOR MONITORING AND CONTROL AND CONTROL AND CONTROL

Integrating the access control and fire systems provides an effective, complementary solution:  Display active fire inputs on a graphical site plan and if required, raise an alarm situation  Release selected fire doors1

 Automatically print a report of all occupants within defined areas  Install a reader at the fire muster point to allow users to badge against

1This feature should never be used as the primary method of releasing fire doors - call points, mechanical releases

or fire relays should always be installed, as appropriate. 5

5 5

5 LIFT SYSTEM INTEGRATLIFT SYSTEM INTEGRATLIFT SYSTEM INTEGRATIONLIFT SYSTEM INTEGRATIONIONION

The access control system can be used to control the floor selection buttons within the lift car. This controls the access that individuals may be granted to the floors of a building, thereby improving site security. For example an employee may be allowed to access floors 2, 3 and 4, but may not access the management offices on floor 5.

 Only enable floor selection buttons to which a user is allowed access  Monitor floor selection button usage through the access control software 6

6 6

6 INTRUDER INTEGRATIONINTRUDER INTEGRATIONINTRUDER INTEGRATION INTRUDER INTEGRATION

Nuisance alarms are one of the largest issues associated with an intruder system. These can be significantly reduced if not eliminated when the access control and intruder systems are integrated.

 Only allow those users who can unset the alarm into the area, meaning that those that do not have the means to cannot accidentally trip the alarm

 Get indication when there may still be users in an area before setting the alarm 7

7 7

7 CONCLUSIONCONCLUSIONCONCLUSION CONCLUSION

By effectively integrating systems, significant cost and operational benefits can be achieved. For example, information can be shared across the system, allowing data to be kept and maintained consistently across the whole. As data only needs to be entered once to populate a number of systems, savings in terms of both time and cost will be achieved as well as an important reduction in the risk of anomalies being present across data held in separate systems.

Well designed integrated systems will prove to be cost-effective and maximise the return on investment as the benefits of each individual system are enhanced by the advantages of integration. Integration will also deliver increased security, with systems working in harmony (for example access control, CCTV and DVR) as well as

providing flexibility for both system set up and future capabilities – new modules and additional functionality can be added easily in the future as the requirements of the user evolve.

So, whilst integration may at times appear to be a rather nebulous concept, the reality is that it has real substance and delivers tangible benefits, resulting in processes working effectively in combination (or combinations),

generating benefits in terms of increased operational efficiency, reduced costs and increased security, with systems able to be upgraded, expanded and amended to suit future requirements.

References

Related documents

Stand downtown reykjavik cruise terminal iceland on time from which literally towers over the name for cruise ships small enough to pay in iceland is doing the port.. Volcanic

As the Director of Employee Services and Labor Relations at the Highline School District, I am primarily responsible for the development and implantation of human resource

11 The 2015 Act, by renaming the pre- contractual duties as the duty of ‘fair presentation of the risk’ and retaining the first sentence of section 17 of the MIA 1906 has

Local variables can be declared and used in AnyLogic fields where you enter actions (sequences of statements), such as Startup code of agent class, Action field of events

Members in which the reinforcement provided is less than the minimum amounts given in Section 12 should also be treated as plain concrete for the purposes of structural design.

198 يقارعلا يزكرلما كنبلل ةعباتلا ثابحلااو ءاصحلال ةماعلا ةيريدلما ( ةنس نم لكل ةيونسلا اتهارشن في 2003 ( و ) 2004 ،) لاو ةجردبو ليودلا كنبلا

We use the test to determine if the monetary assets in the M3 monetary aggregate and private consumption are additively separable for the euro area using quarterly data from 1991

Integrate security applications and unify security systems – including access control, photo identification and credentialing, digital video surveillance, alarm monitoring,