Posts Tagged ‘ Access Control readers ’

IDTECK Access Control IFDC/IEDC Web Interface Demo

Written By:
Monday, June 8th, 2015

Almost any Ethernet enabled device nowadays has the ability to be accessible from a computer to configure some or all of its settings. They are running a service that allow us to interact with the device from our PC over the network using almost any web browser.

The service is called Web Service and on certain devices it will be disabled. In this demonstration I will go through how to enable the features and some of the settings of the Web Service of the IDTECK 4 Door and 8 door Access Control Boards.

First, let’s make sure that you know what you will need in order to get this configured correctly.

The following items need to be set first:

Access Control Board: 4 Door Access Control Board or 8 Door Access Control Board

POE+: Get the Single Port POE 30w Injector Here

An Ethernet Cable

A PC with an Ethernet port which is connected in your network as well as the board.

iMDC Emulator V 1.30: Here

First you will need to make sure that the Web service is enabled in the board itself. This is regularly turned OFF because many customers would rather use the Enterprise Software instead. This is due to the fact that using the software will enable you to use many more features than using the web service. The web service will be more user-friendly and is just to get your access control up and running quickly. This is only recommended to be used if you don’t want to install a server with a database and communication server. This method only offers basic settings to get the system going.


Connect the board to the POE+ and wait until the unit boots up and then open iMDC emulator to find the device in the network. The boot up time is about 40 seconds.

Open the software and click on the tab labeled IMDC Search. Click on the “Search IMDC-MAIN” button and the MAC address of the board should appear. Double click on the MAC address to populate the IP address information in the software. Change the IP address to something that matches your Network scheme and make sure it  is not been used by another device in your network. After you have input all of the information necessary, click on the “Download Information” button. Please wait about 45 seconds for the changes to take place.

iMDC Tool

Proceed to open your web browser. Type the newly created IP address you have assigned to the board and hit enter. You might get a error on your Browser like the picture shown below:

IEDC Certificate

It is absolutely safe to click on “Continue with this Website”, so click on that option and the following page will show:

Web Service

Type the username and password. By default it is “admin” just without quotes. After you have logged in you will be presented with the main menu of the web service.

Main Menu WS

NOTE: It is recommended that you change the default username and password for the Web Service. Never leave default passwords in devices that are accessible from the network.

Once in the web interface, you can now begin to configure the board. Go to the system tab and make sure your board has the correct language. Also, you can change the device name if you prefer. click on Submit to save the settings.  Go to System>Device Settings and be sure the time and date are set correctly.

Navigate to System>Additional Func. In here you can adjust settings such as Time unit setting, Door Open Alarm Delay, and Arm/Disarm Mode. Also, you can configure the Arm and Disarm Code. These settings only apply if the board is connected to an alarm system. Go to Event priority settings to configure what events will display in the event logs. Select the event you are interested in showing through the event logs and add it to the registered priority events window by clicking the arrow pointing to the right. Click submit when done. The initialization tab will allow you to restart the board, reset time schedules, or reset system settings.

To add/register users is easy. Click under Card/Schedule>User Registration. You will see the following page:

Time Schedule

On an IDTECK Card, the last 8 digits will be the ones you will input in the Card ID. The first digits indicate the Manufacturer’s Initials, then the next digits will be the site number. This can be custom made for certain locations where they have different site areas and they will be identified by a number. An example will be having a mechanic’s department were the site number is 200 and the web department site will have a separate site number. All of this can help you administer and manage your personnel more efficiently. Here you can also create a unique password for that card holder. You can set the card itself with a particular mode in which the card can operate. For example, you can configure that card to be a Master card that allows you to unlock certain doors, or you can also assign certain roles based on the position role the card holder may have in the company. In this section you can also set the validity of the card itself from when to when the card will be active.  Lastly, you can set up a Time Schedule based on a time slot and have control of what time that car holder will have rights to enter the premises.

Click on the Event Management to review events such as Alarm events. When someone enters the building and they scan there cards, an invent will be generated.  You can select to view up to 100 events at one time. You can filter events by Card ID, ID Event, Input Event, etc.


Click on Web Account>Web Account Management to add different web users that will have access to configure this board over the network. Click on Utility to change the session timeout if you want to extend the period of the web interface after it logs out by itself.

Lastly, lets click on the In/Output settings tab. On this tab you will find settings to configure your readers in general. You can force your users to have to enter the premises scanning there cards and typing a password. You can also setup a Duress Code. This is in the event of a person trying to use you to get inside, and by typing this code in the keypad will allow you to open the door but at the same time it will send a covert signal to the access control panel to call your local authority. NOTE: in order for this to work properly you will need to have the access control board connected to your security alarm panel.

Reader Settings

In this window you can also configure Two-Person Authentication when you will need at least 2 cards to open a door or to enter an extremely secure area. Wire disconnection option allows you to log an event if someone cuts some of the wires in the access control board. Lastly, Anti-passback mode, when enabled, prevents someone to exit the premises without having to enter first. For example, if I enter a building that has anti-passback enabled and I give my card to someone to get in the same building using the same door, then the anti-passback will block that person from going out of the building. The reason for this is because he never entered the building using my his card, so when he tries to leave he will not be able to. For this to work you will need a combination of two readers, one on the secure side and another one on the insecure side. Same thing will apply if people that work in this building enter it without scanning there cards. Once they are trying to get out using there card, anti-passback will be activated.

Input Settings setup will allow you to configure the inputs that the board supports. Depending on the model you are using, the input amount will be different. You can set the input type as well, if it is a door contact, exit button or a sensor. Check the right option based on the input device you are using.  Also Change the Signal Type, such as NO (Normally Open), NC (Normally Close). Time Schedule is also available for you to enable or disable.

Input Settingsoutput settings

Exit Doors settings can also be configured from this page. Select the desired channel you would like to configure and label the Door Name to easily identify under the event viewer. Assign the correct input channel when installing door contacts or exit buttons.

Exit Door

This concludes the overview of the IDTECK web service access control. For more information visit our IDTECK Access Control Products or our forum 


How to Wire an IDTECK iEDC Control Board – 8 Door Access Control

Written By:
Thursday, December 11th, 2014

In this article I will explain how to wire Access Control Readers, Mag locks and other I/O Devices to the IDTECK iEDC 8 Door Access Control Board, model number ACP-iEDC.

This board is a combination of our ACP-iFDC (4 Door) Board and an Expansion Board (ERIO).

Lets take a look at the board and some of the I/O ports. This will help us to determine and understand the acronyms and in where these ports are located.

IDTECK  iEDC I-O ports

Based on the table above, this 8 door access control board provides a variety of inputs and outputs we can use to control our facility. One of the coolest thing about this access control board is the ability to power up the board with a POE switch 802.3at. You could basically power up the readers at least and have the mag locks power up separately (recommended).

The access control reader I will be using for this demonstration is the ACR-RF10. The ACR-RF10 is an Indoor/Outdoor Access Control Proximity Reader. The communication data is 26 Bit Wiegand, and is manufactured to fit on the frame around a door, but it can also be wall mounted.

You can use a variety of our Proximity Cards and tags with this reader. Keyfobs/Stick on Tags will register up to 2 inches away. Slim Proximity Cards will work up to 2.75 inches and our Clam Shell Cards up to 4 inches away.

Another great feature of this Board is the ability to be accessible through the WEB. I will be covering this point a bit later.

Lets take a look at the reader wires and determine the colors we need to use:

Access Control Reader wiring

Reader connections

Notice on the picture above the wires you will find in this reader will be as follow:

1- Red (positive)

2- Back (negative)

3- Green (D0 – Wiegand)

4- white (D1 – Wiegand)

5- LED

6- Buzzer

This is how the wires need to be connected to this board. As you can see, the reader is being powered by the board itself, so it is safe to use the POE+ to power the board and power the readers. The reader’s power requirements is 150mA ea.

To connect the mag lock it is necessary to use external power for the lock itself. Connect the positive wire from the lock to the RNC1 port (Relay Normally Close). Do the same thing for each of the locks. If using multiple locks then connect the positive wire from it to RNC2, RNC3 and so on. Connect the negative wire of the mag lock to the negative terminal of the external power supply we are using, and then connect a positive wire from the external power supply to the COM terminal of your board. Use jumpers from the COM terminal to the other COM terminals, therefore you will be able to provide power to other relays from that external power supply.

Lock wiring

NOTE: Make sure you always use diodes to protect the board in case of power issues. Follow up the diagram above for diode installation and wire connections to the board.

Connecting a door contact and push to exit button is very simple. This board will have a total of 16 inputs to which each if them is represented with input number

For example: Input 1 will be labeled GND follow by Input_1. This first port will be for the push to exit button. The following port will be for a door contact and it will be labeled GND following by Input_2, and so on. In theory it will be 2 ports per door for a total of 16 ports.

Door contact and exit

This concludes the process of wiring some of the basic devices to the board.

NOTE: If you would like to daisy-chain these boards together on the same network, it is required to assign a unique address to each board to avoid communication problems. Below you can see the dipswitch configuration and location in the board.

ID unique address

When installing several of these boards, each iEDC board most be grounded properly to prevent any power differences when fluctuation occurs. Connect each of the GND terminals (12VDC port only) together. See figure below:



Access Granted – Introduces Access Control

Written By:
Friday, August 8th, 2014


Recently, here at TechPro Security Products, we have introduced a new line of Access Control products. We have teamed up with IDTECK, one of the biggest names in the security industry. IDTECK is a big security company based out of Seoul Korea, specializing in their top of the line access control systems. Established in 1989 IDTECK has come a long way from introducing their first explosion proof RF reader in 1995, to starting their research in biometrics in 2005, into becoming the leader in the access control industry today. They have made some great accomplishments and now you can order their products here in the states on

There are people who think their camera system is enough, although sometimes that may not be the case. Security Cameras may only prevent 75% of break-ins, while access control will prevent over 90%. Also, keep in mind that access control is much more than just swiping a card on a reader and gaining access to a door. It can mean gate access. Say you live in a gated association and when you press a button to make the gate go up and drive in. Or in some cases you may not even have to press a button, it may be automatic when you come within 50’ of the reader. Offered online are several long range readers so whenever you get close enough to said reader access is granted. This comes in handy for various reasons like long range access control, hands free identification, personal tracking, and parking control.

When it comes to general access control such as scan a card and gain access, or even using some kind of biometric readers to gain access to a door, we have you covered. 4 doors, 8 doors, or 32 doors its all here. Using the iFDC, which is a 4 door access control panel, you can control up to 4 doors using the iFDC boards and 4 standard card readers or proximity readers. 100,000 users are supported, and also the unit can be powered through PoE (Power over Ethernet). There are 8 relay outputs to handle things like your maglocks, strobes, or sirens. Also 8 inputs to handle your door sensors or exit buttons. This system is the most ideal system offered for a 4 door access control system. When it comes to 8 door access control we have the best system offered today, our iEDC 8 door access control package is the most reliable package on the market. There are a total of 16 relay inputs and outputs for your maglocks, door sensors, strobes, sirens, and exit buttons. Basically the same thing as the iFDC 4 door package but doubled. Still PoE capable, and also both the iFDC and iEDC have embedded web servers. Also the iEDC offers what is called a Duress mode, this is a function that can save someones life and possibly save you a lot of money in stolen or damaged property. An example of how it works is, a woman may be more vulnerable to a masked man trying to gain access to a building said woman has access to, well if she swipes her card and enters a PIN into the keypad she has just alerted either the security department in the building or the proper authorities outside of the building. This is an excellent feature to help ease the mind of an employee that may or may not be in harms way.

Also, Time and Attendance is a big deal of access control. This allows business owners to monitor the coming and going of employees. We offer a time and attendance management software that will allow you to manage simple payroll such as time in and time out, or advanced which allows you to monitor your employees time off for break and so on. This software works with most of our packages so this way small business or big business you are covered. If you have an employee that takes too many smoke breaks and is hard to prove he is smoking more than working this is a more than effective way to solve the issue. If you have an employee showing up late or too early and don’t want them to go over there hours this is a efficient way of managing your payroll issues.

All of these things could not work if was not for the most vital part of the system. Your readers and your cards. Forget your card and you are stuck in some cases, or something happens to your reader and all the software in the world can’t help you. This is why we have such a variety of readers and cards.

Starting with the readers, we offer a wide range of proximity readers that are weather proof. They can handle anywhere from 4 inches to 12 inches of read distance depending on the model. For example our ACR-RF10 can read a proximity card or smart card up to four inches away. Then on the other hand the ACR-RF30 can read the cards up to 12 inches away. We also offer a vandal proof series of readers. These are proximity card and smart card readers that are for lack of better term destruction proof. Although we DO NOT know what would happen if it was shot with a gun, we do know however that it is safe from people smashing it with a hammer or painting over the numbers if it is a keypad. These are a lot heavier to hold in your hand than normal readers so it is easy to see that they are indeed vandal proof.

Now, we have a few different cards all do relatively the same things. The most popular would be the clam shell cards. We offer a printable and a non-printable version of this card.  We also carry a keyfob that may be easier to carry around and be more accessible. The sticker card is something that would be ideal for someone who doesn’t want some extra thing they have to carry it around. You can stick it to the back of your phone or something along those lines. And then there is the long range card that is compatible with our long range readers mentioned earlier.

There are several things that go into making an access control system work the way you need it too. Here at we have everything you need to make it happen. Just remember while your security camera system may be a deterrent to intruders, there may be just one person that decides he/she can still get away with it. While this may be true, if you had an access control system you wouldn’t have to worry about that because he/she would not be granted access. There are several reasons why one of these systems should be in place, what ever yours may be give us a call at 866.573.8878 or check us out online at


Access Control Demystified

Written By:
Tuesday, July 8th, 2014

If you’ve never worked with or around an access control system, it may seem like a complex convoluted nightmare of wiring, circuit boards, card readers, and rather confusing software.  In the text to follow, I’ll explain and attempt to remove the mysticism that stands between you and access control wizardry.

One of the most important concepts to understand is that there are 4 basic components in play at every door: inputs, the controller, outputs, and the software.

An input lets the controller know that an event has occurred. For example, someone swiped a card, someone opened the door, someone left the door open, someone on the inside requested to exit, etc… Think of these as the eyes and ears of the system.

Then there’s the controller. Based on how you’ve configured your controller, it will take all the inputs related to a door and determine how to react. Keep in mind, the logic for how to react is usually software configurable. For example, when someone swipes a badge, it determines if it should unlock the door or keep it locked. Think of this as the brains of the system.

All that input and logic is practically nothing without the outputs from the controller. This is typically a relay that either turns a device on, or off. For example, mag-locks, door strikes, alarms, buzzers, lights, etc. The limit to what a controller can use for an output with today’s technology is really limited only by your imagination. Think of these as the hands, feet, and mouth of the system.

Lastly, there’s the software. This comes in many different forms. However, it is extremely important for you to master this component of the system. The software tells the controller how it should react to the various inputs. It also allows you to configure various options. I’ll go into this more later. In the meantime, think of this as the subconscious mind of the system that tells the controller how to react.

Access Control Inputs:

So you have a door you want to control, and you’re wondering what types of input you may want. There are a few obvious choices that come to mind rather quickly. Let’s start with those:

Basic Card Readers:

2 1 4 3

These come in a wide variety of colors, shapes, sizes, and even vandal proofing. However, there are other differences that you will find far more important than aesthetics.  For example, it is extremely important that you pair your reader with the appropriate card types.  For example in the four pictures above, the 2 brands of readers do not support each other’s cards. Furthermore, within each manufacturer you may find cards that work with certain models of readers and not with others. To make your life easier there are hybrid readers capable of reading multiple types. These are usually a bit more costly and only needed if you somehow ended up with an odd mixture of card types. For the most part, I encourage you to stick with 1 type of card and matching reader throughout your entire organization.

There’s also the protocol with which the reader speaks to the controller. Just like when you engage someone in conversation, it’s generally best if you speak a common language. Just like languages, some readers and controllers can speak in multiple. Among the most common communication protocols (languages) that readers can speak you will find Wiegand with varying “bits”.

While I could bore you to death with exactly how the Wiegand protocol works, I’ll cut to the chase and tell you that the most important factors are that both the reader and the controller are configured to the same EXACT protocol. It is also exceptionally important that they be wired appropriately.

Most readers will have between 6 to 8 wires coming out of them. There are some industry standards for color codes, but ALWAYS consult the manufacturer for proper wiring. Red is usually Positive, but if it’s not you could end up with unanticipated results (and that funny smell of burnt capacitors.) The wires you will typically find are:

DC Voltage Positive +, DC Voltage Negative – (also referred to as ground), D0 or Data 0, D1 or Data 1, Beep or Buzzer, LED control

As I mentioned, these will vary depending on the model of reader. Some may be present, others may not. You may even find additional options.

Advanced Card and Bio-metric Readers:

5 4 3 2 1

These readers take things a little further than “do you have the right card?” In secure environments you may want to authenticate a person based on something beyond the physical card. For example, do you have the card AND do you know a pin code. You may also have a situation where you need to give access to someone without ever meeting them to give them a physical card. Perhaps you want to allow their cell phone to be their key or just a combination of numbers. Maybe you need extra security and you want an access card to be present, a finger print to be matched, AND a code to be given. The possible combinations are limitless. These advanced readers require a little more effort to configure and enroll your users. However, in the right situations they are definitely worth the extra effort. These typically have the same inputs and outputs as normal readers but they use special programming to configure the additional features.

Request to Exit devices:

8 7 6

So you’ve got all that fancy reader stuff in place to keep unwanted individuals out. However, you need a way to allow those who have entered the building to exit.  Some controllers will allow you to place a second reader on the inside of the door to allow egress. However, in all but the most secure environments, you will find that fire codes require you to allow simple and quick egress. Most installations will require a “Push to Exit” button and a “Request to Exit” PIR/Motion sensor. These devices usually require very limited wiring. Most likely you will need power (commonly 12v DC, but consult the devices manual) and a simple 2-wire connection to the controller. Most commonly the controller expects this circuit to be normally open and will react by opening the door the moment the circuit becomes closed. Many controllers allow you to configure the functionality of this input to be either normally closed or normally open. They may even allow you to specify a delay in reaction time. In addition to the PIR and Push to Exit you can use a wireless relay to toggle door release. You could use almost any device that has a relay to trigger a door event. These devices can be wired directly to the locking mechanism if desired. However, this prevents the controller from logging how the unlocking event was triggered. I only recommend this if you have no need for a record of when someone exited the building.

Door Contacts/Closure Sensors:

10 9

These things are very simple switches that tell the controller if the door is open or closed. This can be useful in certain controllers for triggering an alert or an alarm if a door is left open beyond a specified amount of time. This will discourage people from leaving a door ajar and allowing a potentially unwanted visitor to wander in.

These typically only require a 2-wire connection to the controller and are generally wired as normally closed. If someone tampers with or disconnects the wires from the contact it will consider the door to be open.

Not all contacts are attached to the door in plain sight. Many are built into the locking mechanism. Door strikes often have a relay that senses if the door is latched are not. Mag Locks tend to have a closure sensor that detects when the plate is firmly pulled to the magnet. These make excellent closure sensors.

It should also be noted that you can wire a closure sensor to a buzzer or an LED without the need for a controller. You may need a relay to accomplish your desired result, but the only limit is your creativity.

Access Control Outputs:

So you’ve got all these fancy entry/exit devices in places to tell the controller what’s going on. Now it’s time to give it the ability to interact with the door.

Electronic Door Strikes:

12 11

Door Strikes are typically used on doors that have a mechanism that allows egress by simply turning a door handle or pushing on a push bar. These are often used in environments where you need the system to “Fail-Secure”. Fail-Secure means that in the event of a power failure the door should remained locked. Some Strikes can be configured to either “Fail-Secure” or “Fail-Safe” but the most common use is in a Fail-Secure environment. Fail-Safe is the opposite of fail secure, in a power failure the door remains unlocked allowing entry/exit to anyone.

Door strikes are typically wired to the Normally Open side of the door controller relay. This means when the door should be locked, no power is sent to the strike. When the door is supposed to be unlocked, power is applied and the latch is released allowing the door to be opened.

Most door strikes only have 2 wires (for power when activated). However, others may contain a closure sensor as mentioned in the Inputs section. This makes the strike both an input and an output device for the controller.


15 14 13

Mag Locks are large electromagnets with a lot of force. They commonly come in 600lb, 1200lb, and 1500lb of pull strength. The amount of force that would be required to pull a door open is not something a normal person can achieve easily. This makes them ideal for a locking mechanism. Although they are usually fail-safe devices as they only have strength when energized with electricity.

Mag-Locks typically only have 2 wires that need to be attached to a Normally Closed relay on the door controller. This means that when the door should be locked, the circuit remains closed and power flows to the mag-lock. When the door should be opened, the circuit is opened blocking the flow of power and releasing the magnet.

Many mag locks will also have closure or bond sensor which can report the door status to the controller. This would make them both an input and output device if used.

LEDs, Buzzers, Sirens, DVRs, NVRs, Alarms, The endless possibilities:

Controller boards can be used to control a wide variety of equipment. Usually this is done through the door relay or through an alarm condition relay. It is important to note that you may need to use an external relay (as in not the one built on to the board) if the voltage of the device your trying to control differs from the other devices the on-board relay is controlling.

While it may seem complicated, it’s very simple. A relay is a switch that is controlled by another device. If you apply power to a relay, it switches from its “Normal” state to its “Abnormal state”. If you wire a device to “Normally Closed” then it will allow electricity to flow to the device until power is applied to the relay at which point it will stop the flow of electricity to the Normally Closed side. Conversely, if you attach a device to the “Normally Open” side of a relay it will prevent the flow of electricity to the device until power is applied to the relay, at which point it will allow the flow of electricity to the device.

With that being said, you can wire almost anything to a relay. Some common uses you will see include LED’s and Buzzers to alert that a door is open, an input on a DVR/NVR to trigger the taking of a snapshot or video of an event, connection to an alarm system to warn of after-hours door openings, etc… again, the possibilities are limited only by your imagination and willingness to wire in the devices you want.


It is also worth mentioning that many controllers support connectivity to a network. They can use this for outputs. Such as sending an e-mail when a door is left open or when a disabled card attempts to gain entry. Consult the manufacturer of the controller to determine what your options are.

Access Control Boards:

These come in a massive variety of functionality. Once you’ve settled on the manufacturer you like, it’s time to determine what your requirements are.  Most commonly this will be determined by the number of doors you need to control and the end users expectations of functionality.

While I could show you a lot of different examples, for the purposes of this document we’re going to look at a single door controller and briefly examine its functionality.

DX Series Single Door Controller:


Starting at the top left is a connector for a reader. You may notice, there are 2 of these. As I mentioned previously, you can control egress in certain situations by placing a reader inside the door. This controller allows for 2 readers at a door. This is not a requirement, 1 reader is sufficient per door in most cases. The pins on this board for the reader are as follows:

+12 = Positive (+) 12V DC

GND = Ground or Negative (-) 12V DC

D1 = Data 1 (One of the two connections that Wiegand uses to communicate)

D0 = Data 0 (The other connection Wiegand uses to communicate)

LED = Controls the LED on a reader to let people know they were granted access. This can also be tied to the beeper or buzzer in a reader to give an audible sound or both to provide audio and visual indication.

The second reader connection is the same as the first. So I’ll skip the second 5 pin connector.

The 2-pin connector facing up is intended for 12V DC power for the board

The 2-pin connector facing to the right near the top  is for the door contact or door closure sensor.

The 3-pin connector is a relay for controlling the outputs at the door. Remember, unless otherwise told by the manufacturer, you should wire mag locks to the N/C or Normally Closed side of the relay and Strikes go to the N/O or Normally Opened side of the relay. The common goes back to whatever polarity of power is needed to activate the device.

And the bottom right facing connector is for your push to exit/request to exit devices. You can tie multiple devices into this allowing the door to be released in a variety of ways.

This board also contains an RJ-45 jack (difficult to see from this angle, but it is the silver box looking component near the center of the board. In this instance the RJ-45 is for connecting the controller to a network for programming. It should be noted that there are some controllers on the market that use RJ-45 connectors for low voltage and not just data communication, you should always consult the manual before connecting one of these boards to a switch or other networking equipment.

Access Control Software:

Software is an area that I will only briefly discuss because this is probably the most diverse area of an access control system. Some controllers use built in software on a web interface, some require a computer running a commercial piece of software, and still others require Enterprise class software with large scalable database support. Make sure you understand the needs of your users, the capabilities of the software, and the requirements of the software before purchasing a controller. Software prices range from free to extremely expensive. So make sure you factor this into your design.

At its core, the software is usually merely a method for telling the board what users get access to which doors and at what times. This can come in the form of adding a card or setting a pin.

Depending on the controller, the software may also provide additional features such as setting egress delays, or specifying alerts via e-mail, or even changing the way inputs/outputs work. Keep in mind this will vary between manufacturers, controllers, and software options.

More advanced software can provide additional functionality such as time and attendance reporting and integration with CCTV or alarm systems. Consult your manufacturer for an accurate list of features and functionality.

The End:

While there are additional aspects and details that can be involved in access control, We have covered the basics of an access control system and the interactions of the various components.


Biometrics and Security – It’s all about Access Control

Written By:
Thursday, May 29th, 2014

Biometrics is the measurable features or characteristics of a human. These traits can be used to identify people for access control to a building or devices and anything in between. In today’s tech-savvy world we use biometrics every day and may not even realize it. There are many ways to measure and record a human’s biometric information for access control.

A lot of us now have smart phones. Both android and IOS came out with facial recognition to unlock the cell phone for use. That feature uses biometrics. Since most of us have different facial features this works fairly well in preventing others from using your cell phone. The software has been going through some refinements as people have found ways to spoof it. For example get a picture of the person then use that to unlock their phone. In this application the failing part is that the image used to set up facial recognition is 2 dimensional.  3 dimensional would be needed to add extra difficulty so spoofing would not nearly as easy with just a taking Polaroid picture.  Still it is amazing that you can now have access control set up on your own cell phone.

To secure a business the technology is now available to integrate access control with CCTV security cameras. Up until the 1990’s access control for most companies consisted of a security guard watching a TV monitor to verify an individual’s identification. Then that person got “buzzed” in. There are many places that still use that setup or something very similar to it. Sure it works and is easy to operate. However, it is archaic by today’s standard and if you are going for full automation that setup is not even close.

A standalone biometric controller can be utilized with a security camera Digital Video Recorder. Biometrics used in this application are typically for full automation while still logging everything in the access control authorization, so security audits can be done to verify the biometric scanner is functioning properly and only allowing individuals in and out that have been approved by the administrator.

An image of a Thumb print reader is the device used in verification of a person’s identity. The Key pad is used to program and initiate the log in procedure. At the top is the camera and at the bottom middle is the finger print scanner. The PIR sensor is on the lower right corner as you can see the or not see the sensor is hidden under the dark plastic.  This particular device can store up to 5 different prints from one person. When adding your user I would use both thumbs and pointer fingers. Just in case the user forgets what digit to use on which hand. The MAC1000SR has a built in camera and a PIR sensor or motion sensor.  Also there is a microphone built directly into the device. Our original intent is to use the microphone through phone systems using video phones so you can have two way communications with gate keeper and key master.


The MAC1000SR has a few different ways to activate recording as does your security DVR.  The main focus will be with the DVR as that device will be doing the recording. The DVR could be setup to record motion so when the camera picks up motion the DVR will start recording. There by allowing a recording of the person accessing the door. Another option is to use the alarm outputs on the MAC and connect them to the alarm inputs on DVR. That can tell the DVR to record when someone triggers the PIR sensor or when the user initiates the Biometric Check. The MAC does come with cables so you do not have to worry about acquiring a cable and figuring out how to make RJ59 connect to a circuit board.

Another option is to use the access card only or in conjunction with a finger print. When you use both finger print and access card that adds an additional layer of security. That way should a person lose or have their card stolen the card on its own is useless. The reader still needs a finger print to finish the authentication process to allow access. Two part authentication is as secure as it gets. The idea behind it is just like your own email account. You have a user name and a password without either you have no access. Every extra step you can implement adds another layer of protection. The great aspect of the technology is that even though extra layers of encryption and authentication are added the time it takes the reader to process the information is between one and two seconds.  That is amazing considering the amount of data processed, and it is faster than most people can pull their keys out of their pocket and turn the latch.

There are many real world applications for this technology in any business. In the military keeping the weapons accounted for one hundred percent of the time is mandatory, and easy with access control. In the police stations around the world from the holding cells to offices and more, this can make accountability a breeze. In businesses, allowing certain employees access to specific areas only such as keeping the sales people out of the warehouse or vice versa, access control is the way to go. Even something as simple as stopping customers from going into employee areas can be efficiently handled with these security system access controls.