Posts Tagged ‘ IDTECK’



How to Install Access Control Software Standard Server Version from IDTECK

Written By:
Wednesday, September 3rd, 2014

Access control is the ability to allow or restrict access to a place or to have the ability to deny or allow the use of a resource. The idea behind this is to control certain users and resources at a specific place so there is full control of how, when and where the resource is utilized.

Access control can be done manually or completely automatic, but how would you keep track of who, when, and how the resource was accessed? The short answer to that is Access Control Software.

Many access control devices are network capable, which means that they can be accessible over a web browser or through a software via TCP/IP. These devices can also have a Web Service Interface that can show you basic information such as logs, alarm events, etc. Most of these devices that have that capability are very limited on the things you can configure.

Every access control is different in the way they might require a specific set of settings to successfully connect with the main software. In this demonstration I will be showing you how to configure the Standard Version of IDTECK’s Access Control Software.

This software will require 2 sets of programs and setups. One is the server communication and the access control software itself. It is necessary to install SQL for the database of the software so it will be easy to export any database with settings later on. SQL Express comes with the Standard version for free so there is no need to acquire a greater version, unless there is a necessity to have advance settings on SQL. Other than that it should be straight forward.

NOTE: To make sure the installation runs smooth make sure that the following requirements are met:

1.- Windows 7 x32 or x64 bit
2.- At least 10GB of Space on your Hard Drive
3.- Make sure no other SQL Instance is running on your PC
4.- Minimum of 4GB of Ram and a Dual Core Processor with at least 2.00 Ghz.

Software installation

Download the Server version of the software from here: https://docs.google.com/uc?export=download&confirm=P8oW&id=0Bwe1rQdTv-n4YTNyQloteUtxZWM

Double click on the icon and proceed to install the software. Follow the prompt and install all of the necessary updates until you get to the section where you will need to named the Instance. See picture below

IDteck SQL Instance

After naming the instance of your SQL installation you have to make sure you remember the password because this will be required to configure the communication server. Click Next and the SQL process will begin by decompressing the files and preparing the installation process. When done, the following window will appear:

Customer Info

Type a name and a company name to continue the installation. Select all of the features on the list and click Next.

Database Selection

On this section make sure the database server is typed as shown in the picture above. Select SQL server authentication and use the following default username and password (sa) and (1234). Note: If you change the password then you will need to type that info under the password field. Click Next to begin the installation process:

SQL Finish Installation

Click Next to begin the installation. Check the following picture summary to make sure you have all of the SQL features that will be installed.

SQL Copying Files

When the installation is completed, the following 2 icons will appear on your desktop. These icons are essential to the software and a few more adjustments need to be made before we fire up the communication server.

Idteck Comunication and server

The next step is to make sure we have the software executed with administrative rights. To do this, right click on each icon and click on the compatibility tab, then select the “Run this program as an administrator”.

Run As

Double click on the IDTECK communication Server to begin configuring its settings:

Server Settings

After the software launches, click on server setup and the following settings will show as the picture above. Click on the Server IP and make sure that the IP is your computer name\IDTECK. The Database name will be STARWATCH_STD. Username is “sa” and password is “1234”. Authentication should be DB Authentication.

Note: if you change this (username and password) when installing the software then you will need to input the right information. Click OK when done and the result should be as show in the picture below:

Logview

Double click on IDTECK STANDARD Server Icon and input the username and password. The default username and password is admin.

Software login

After all this the software will open up and will display the following interface. From here we can prepare the software to communicate with the device you are trying to manage.

IDteck Software Interface

Note: This software is free with a limit of users and doors that can be run without a license. A pop-pop will show after the software is launched:

IDTECK Pop-up

 

Notice that because the software doesn’t have a device configured in it, the software will display certain errors. See picture below for reference.

No Comunication

To add a device go to “Device Setting Wizard” to configure the Default Site settings. Click the checkbox labeled “Whether to use” and click on the “Site Setting” button. A site settings box will display for you to type the communication server  IP address. The IP address will be the one your computer have. You can find out what IP address your PC have by going to command prompt and execute the ipconfig command.

SITE SETTING’S SCREEN

Site Settings

IPCONFIG SCREEN

ipconfig

At this point you will need to follow the steps to build your database for your access control and configure the connections between the software and your access control equipment.

For more information about this software play the video below to see a quick video demonstration of the operations and configurations of this software.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Access Granted – SecurityCameraKing.com Introduces Access Control

Written By:
Friday, August 8th, 2014

IDTECK-Access-Control-Reader

Recently, here at TechPro Security Products, we have introduced a new line of Access Control products. We have teamed up with IDTECK, one of the biggest names in the security industry. IDTECK is a big security company based out of Seoul Korea, specializing in their top of the line access control systems. Established in 1989 IDTECK has come a long way from introducing their first explosion proof RF reader in 1995, to starting their research in biometrics in 2005, into becoming the leader in the access control industry today. They have made some great accomplishments and now you can order their products here in the states on securitycameraking.com.

There are people who think their camera system is enough, although sometimes that may not be the case. Security Cameras may only prevent 75% of break-ins, while access control will prevent over 90%. Also, keep in mind that access control is much more than just swiping a card on a reader and gaining access to a door. It can mean gate access. Say you live in a gated association and when you press a button to make the gate go up and drive in. Or in some cases you may not even have to press a button, it may be automatic when you come within 50’ of the reader. Offered online are several long range readers so whenever you get close enough to said reader access is granted. This comes in handy for various reasons like long range access control, hands free identification, personal tracking, and parking control.

When it comes to general access control such as scan a card and gain access, or even using some kind of biometric readers to gain access to a door, we have you covered. 4 doors, 8 doors, or 32 doors its all here. Using the iFDC, which is a 4 door access control panel, you can control up to 4 doors using the iFDC boards and 4 standard card readers or proximity readers. 100,000 users are supported, and also the unit can be powered through PoE (Power over Ethernet). There are 8 relay outputs to handle things like your maglocks, strobes, or sirens. Also 8 inputs to handle your door sensors or exit buttons. This system is the most ideal system offered for a 4 door access control system. When it comes to 8 door access control we have the best system offered today, our iEDC 8 door access control package is the most reliable package on the market. There are a total of 16 relay inputs and outputs for your maglocks, door sensors, strobes, sirens, and exit buttons. Basically the same thing as the iFDC 4 door package but doubled. Still PoE capable, and also both the iFDC and iEDC have embedded web servers. Also the iEDC offers what is called a Duress mode, this is a function that can save someones life and possibly save you a lot of money in stolen or damaged property. An example of how it works is, a woman may be more vulnerable to a masked man trying to gain access to a building said woman has access to, well if she swipes her card and enters a PIN into the keypad she has just alerted either the security department in the building or the proper authorities outside of the building. This is an excellent feature to help ease the mind of an employee that may or may not be in harms way.

Also, Time and Attendance is a big deal of access control. This allows business owners to monitor the coming and going of employees. We offer a time and attendance management software that will allow you to manage simple payroll such as time in and time out, or advanced which allows you to monitor your employees time off for break and so on. This software works with most of our packages so this way small business or big business you are covered. If you have an employee that takes too many smoke breaks and is hard to prove he is smoking more than working this is a more than effective way to solve the issue. If you have an employee showing up late or too early and don’t want them to go over there hours this is a efficient way of managing your payroll issues.

All of these things could not work if was not for the most vital part of the system. Your readers and your cards. Forget your card and you are stuck in some cases, or something happens to your reader and all the software in the world can’t help you. This is why we have such a variety of readers and cards.

Starting with the readers, we offer a wide range of proximity readers that are weather proof. They can handle anywhere from 4 inches to 12 inches of read distance depending on the model. For example our ACR-RF10 can read a proximity card or smart card up to four inches away. Then on the other hand the ACR-RF30 can read the cards up to 12 inches away. We also offer a vandal proof series of readers. These are proximity card and smart card readers that are for lack of better term destruction proof. Although we DO NOT know what would happen if it was shot with a gun, we do know however that it is safe from people smashing it with a hammer or painting over the numbers if it is a keypad. These are a lot heavier to hold in your hand than normal readers so it is easy to see that they are indeed vandal proof.

Now, we have a few different cards all do relatively the same things. The most popular would be the clam shell cards. We offer a printable and a non-printable version of this card.  We also carry a keyfob that may be easier to carry around and be more accessible. The sticker card is something that would be ideal for someone who doesn’t want some extra thing they have to carry it around. You can stick it to the back of your phone or something along those lines. And then there is the long range card that is compatible with our long range readers mentioned earlier.

There are several things that go into making an access control system work the way you need it too. Here at SecurityCameraKing.com we have everything you need to make it happen. Just remember while your security camera system may be a deterrent to intruders, there may be just one person that decides he/she can still get away with it. While this may be true, if you had an access control system you wouldn’t have to worry about that because he/she would not be granted access. There are several reasons why one of these systems should be in place, what ever yours may be give us a call at 866.573.8878 or check us out online at www.securitycameraking.com.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

What is an Access Control Smart Card?

Written By:
Thursday, June 19th, 2014
Smart card

Smart cards are generally a plastic card that has an embedded microchip and possibly a micro-processor. These chips can store data or process data. The data is usually associated with information and a value and transact with the card’s processor if it has one. Systems that can greatly benefit from smart card technology are inventory management, people management, time card and attendance, access control, and health care. Really anywhere you want to monitor and or limit access to an area you can see the value in smart cards.

Smart cards have been around for decades in many types of applications. Two applications that seem to have been around forever would be ATM/credit cards and calling cards. In the phone cards the magnetic strip made the card a “smart” card. It stored information such as showing how many minutes you had on the card per a calling zone or country code. If you called outside of the country you activated the card in, you typically got fewer minutes as it costs more to call different countries.   ATM/credit cards carry considerably more information in their magnetic stripe. Going down the road to 1999, people found you could get devices to read peoples card at range. For example if I had the right device I could read your card while in your pocket. Then clone your card and start spending your money. I know because it actually happened to me.  Basically using the reader the criminals could make dummy cards of my original.

Newer smart card technology works off of layers of materials. These cards are made of pressed or laminated polyester or PVC. Inside of the basic smart card is a small chip with a copper wire coming off of it wrapped into many windings.  This card is set to a certain frequency. Your card reader picks it up as a specific number value. This value corresponds to a column in a database. This typically lets an individual gain access to a restricted area or areas. The database has to have the card added to allow access to these restricted areas.  This type of card, sometimes referred to as RFID passive smart card, has no information of value stored on it. They have a number printed on the back of them and that is the value you must enter into your database that controls the access. The range on this card is 10 centimeters. Most people end up tapping the card to the reader.

Memory smart cards have the ability to store and delete and that is it. Institutions that have implemented this force wide are the military.  These cards shine for soldier record keeping. Before a soldier had to carry paper records between duties stations as they were moved about the world. This was open to many issues from loss to tampering with. Most soldiers have two files. The first is your 201 file that tracks where you have been and what you have done in your career with the military. The other file is their medical record.  The 201 file is important to limit access to as external threats may use them to try to impersonate personnel to gain access to restricted areas, or set themselves up for early promotions. The medical file is extremely important as it has your medical history contained. Past surgery’s and health issues that doctors need to know now. Instead of waiting for the paper file to show up, now with a swipe of a card all information can be realized.  Memory cards can be fitted with different storage sizes depending on your needs. As cards of this type are straight memory cards your reader would need to be configured to read it. Readers are not smart in that they have an auto detect feature to determine card type and protocols needed to read the card.

Micro-processor cards in the family of smart cards are engineered for high security encryption protocols and counter measures. Smart cards of this type are designed to allocate memory into separate sectors for storage for files assigned to a specific function or application. Built inside of the card are the microprocessor and a battery.  The CPU operates similar to a standard PC processor in the sense it does have an operating system with capabilities that permits different and multiple functions. The ability to run different applications and types of data gives the card versatility the early cards just did not physically allow for. With the ability of these cards to have applications on them other types of security encryption can be used further prevent tampering and cloning of cards.  The technology allows secure identification of the individuals and allows updates of information with card replacement. This can lower programming costs and enable re-usability as updates and changes come out. Similar to a PC when updating the operating system. You download new information install it and configure it, you would not just run out and buy another computer. The card does have to have power in many cases. A small battery will be installed inside of the card.  Some card manufactures designed the card for the battery to be replaced others do not. Buyers beware on which card you get as this can turn out to be a hidden cost on an already expensive system.

There are many configuration options for the chips for cards in this category. Cards with smart chips can support cryptography public key infrastructure to Java, so they are very versatile.

The form factor on these cards varies. The card most people have seen is about the size of a standard credit card but considerably thicker. That style accommodates both RFID and smart cards.  Another style with several variants is the key fobs. They can be the size of a key fob for a car, some smaller than others. All can be smart but few if any allow for battery replacement.  Another newer style is a sticker the size of a nickel and about 2 mm thick. That is great for sticking to a cell phone or other device you have all the time.

Access control cards come in many shapes and size with many different features. Always make sure to read and ask questions before purchasing yours.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

We have gone High “Teck” ! Introducing the Rollout of IDTECK’s Access Control

Written By:
Wednesday, May 28th, 2014

TechPro Security Products is now the main distributor of high end Access Control Systems and Accessories in the United States through IDTECK, a global powerhouse in Access Control.

IDTECK has made some significant strides in Access Control and their systems are implemented in some of the highest security driven markets such as the Pentagon and The Department of the Army here in the United States. Worldwide, IDTECK has made a name for themselves in every continent.

What sets IDTECK apart from other Access Control Companies is the fact that in 2009, IDTECK was awarded the US and Korean Patent for Facial Recognition in an Access Control System, which they are working on to implement.

IDTECK also has major ODM contracts with Motorola and Samsung.

Stand-Alone Access Control Readers

The ACRS-MAC1000-SR shown below is the ultimate in a stand-alone Access Controller. There is up to 4 steps in security with this unit. Keypad, Fingerprint, Access Card and Video. There is no other product like this in the market. This unit can also act as a videophone.

ACRS-MAC1000-SR

Fingerprint Recognition

IDTECK has also been the leader in Fingerprint Recognition. Gone are the days when you can make a simple copy of a fingerprint or cut someone’s finger off (like they show in the movies). IDTECK’s Fingerprint Algorithm is heat sensitive and knows when it is detecting a “living” finger. A severed finger is cold to the touch. Also, because of the special fingerprint algortim, IDTECK’s Fingerprint Readers can read fingers that are scarred, wrinkled, burned, and oily. The level of sophistication in just IDTECK’s Fingerprint Recognition and Facial Recognition alone is the reason why we at Techpro Security Products have chosen to distribute IDTECK’s Access Control products through our Retail site (www.securitycameraking.com) as well as our Dealer Site (TechVisonCCTV.com).

IDTECK-Fingerprint-Reader

Access Control Systems

There are multitudes of configurations when it comes to Access Control. From one to many hundreds of doors, you can achieve a secure environment making sure only the people you want to have entrance will have the correct credentials. Case study after case study has shown that IDTECK’s Access Control Systems delivers that high-end security every time. From hotels and hospitals to government agencies, IDECK continues to beat down their competition through constant performance and upgrades to their products.

Below is a sample wiring diagram for an 8 Door Access Control System via a TCP/IP Network.

POE Diagram

In this configuration I am using the iEDC 8 Door Access Control Board (which also does come in a package). I am only showing the configuartion for 1 of those 8 doors in this diagram. This Access Control board is networked using Cat5e Ethernet cable and can be powered via PoE (Power over Ethernet) or 12v DC Power. The Board is connected to the hub and so is your computer. The iEDC has an Embedded Web Server so that you can connect directly into it via your computer without the need of additional software. For a more enhanced approach to your access control, we suggest purchasing the Enterprise Software, giving you control over features such as Time Management, ID Badging, Visitor Management and Video Surveillance.

The iEDC Eight Door Access Controller will also need to connect to your readers, locks and buttons at each door. On the entrance to each door there will be a reader. Readers come in various forms such as Proximity Card Access, Fingerprint Access, and Keypad Access (or a combination of each) and they can also be Smart Card Accessible or traditional RF (radio frequency) Card Accessible. Smart Cards are RF cards that can also hold data. Those Readers will unlock either a Door Strike or a Magnetic Lock and the individual will now have access. On the other side of the door for exiting purposes, there will be a “request to exit” button which will signal the Access Controller to unlock either the electronic door strike or Magnetic Lock.

All 8 of these door configurations can all be controlled by your computer so you can maintain a constant guard to your facilities. Keep in mind that this is a simple example of an 8 door system. As stated above, the possibilities are endless for configurations of one to many doors.

Vandal Resistant Controllers

As I have stated, IDTECK is always improving their line of Access Control Products. They have developed a completely weatherproof and waterproof, Vandal resistant Proximity Standalone Controller. I have been told directly from the manufacturer that they have tested the strength of the LED Touchpad of the ACRS-100RV shown below.

vandal-resistant-proximity-standalone-proximity-reader-26-bit-access-59755big

They tested everything with this unit from hammers and screwdrivers to even a drill. IDTECK’s representative said that he personally put all his might using a drill bit and actually broke 3 bits before he started to go through this keypad controller. I would venture a guess that the would-be criminal would already be apprehended before he could even get into the second drill bit, being that most doors with access control would also have surveillance cameras with motion alerts.

Smart Cards

Last on my list of how great IDTECK’s Access Control Products are their powerful smart cards. Smart cards have the benefit of a standard Proximity Access Card along with the ability to save information on it such as food credits or cash allowance. Students at a college could use this type of card to not only gain access to their classes that they are registered for, but they can also use it as a type of “refillable credit card” so that the student can buy books, clothes or food at the recreational center. In a hospital or office environment the same type of card could be used to gain access into certain areas and to also buy food at the office complex. These Smart cards come in credit card slim size and also Key Fobs and stickers that can easily be attached to your personal belongings such as a smart phone or wallet.

Smart card

In Conclusion

You have come to know securitycameraking.com and our manufacturer TechPro Security Products as being the leader in CCTV and IP Security Systems. With the addition of IDTECK’s Access Control Systems, we are proud to have a one-stop shop for all of your security and surveillance needs. To find out more about our new line of IDTECK’s Access Control Products visit our Access Control page at on our website.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail

Access Control – Understanding the Basics

Written By:
Tuesday, May 27th, 2014

Access control is a combination of hardware and software that controls access to entry points of a structure or property. It can be used for commercial or residential applications. The purpose of these products is to manage and grant access for individuals to specific areas on a predetermined schedule.

Access_Control

An example of access control is the automated gate in front of a residential community. Usually they will have one side for “Residents” and one side for “Guests”. The resident side may open automatically when the system detects a special sticker or access card in the vehicle. That’s a “proximity Reader”. On the guest side you may have a keypad that you need to enter a code into then it will open the gate or dial the home owner and have them send a code to the gate.

Another example may be when you enter a high security facility where employees have a special access card to enter a certain area. Thats a “Card Reader”.

Access control can be broken down into 5 main components.

1. Access Control Panels (The Brains)
2. The Readers
3. The Device Being Detected
4. The Entry and Exit Hardware
5. The Software

Access Control Panels

Access Control Panels are basically the brains of the of the system. Usually the panel is made up of  a circuit board inside of an enclosed box along with a power supply. Sometimes there is a battery backup as well.  How many access points or Doors you can control depends on the capabilities of the specific access control board you choose.

Many come as a standard configuration but can be upgraded as your needs change. For example you might buy a 4 door access control board that can be upgraded to control up to 8 doors at a later time.


Access Control Readers

RF Proximity, Card and Smart Card Readers.

  • These readers detect a person who has a compatible device on them, such as an access card or key FOB (keychain).  Depending on the equipment, it can detect the devices at varying distances. In some cases the user may have to physically swipe the card and in other cases it may be able to detect them at a distance.
  • Keypads
    Unlike Proximity readers Keypads require the user to type an access code directly into the unit.
  • Fingerprint and Facial Recognition Readers
    Also know as Bio-Metric readers these readers can recognize a users fingerprint or face and determine the appropriate access for that person. Many simply store and compare a photo of the persons face or fingerprint to the user. IDteck’s patented technology actually maps specific points on the users finger or face for much greater accuracy and security.
  • Long Range Readers
    These types of readers are typically used for outdoor applications such as vehicle access. They are capable of detecting a “Long Range Access Card” at much further distances than proximity readers.
  • Access Control Standalone Readers
    Many readers are required to be connected to an access control board and utilize software in order to function.  Stand Alone readers are just that, hardware, software and controller all in one unit.

Vandal Proof- Combo

It is important to mention that many of the readers mentioned above are also available in combinations. You could have a keypad reader that also has RF access card reading capabilities. You may need an even greater level of security and want Facial Recognition, Finger Print Scanner, Access Card and a Keypad all in one.

Many readers also come in a vandal proof version. Vandal proof models are resistant to vandalism and are usually weatherproof.

Time Management

Many companies also use there Access Control System as an employee time clock and payroll management system. It can record when an employee clocks in and out. Advanced features are available with additional time management software.


Access Control Cards, Fobs and other Detection Methods

  • Access Control Cards, Smart Cards and Long Distance Cards.
    Most commonly used as a detection device is the “Access Control Card”. Access Control cards come in many forms. All of the cards hold information about the user and there access rights. They communicate with the reader via an RF frequency.  The range that the cards can communicate and the amount of information that it can hold depend on the cars specifications.Smart cards are similar but can also hold extra information about the user, such as medical info or even be used as an employee debit card.
  • Fobs
    Fobs are basically the same as the access card but can be used as a keychain. Some even have LED lights and sounds that alert the user if they’ve  have been granted or denied access.
  • Stickers
    If you don’t want to carry an access card or you keys around all the time you could get an Access Stickers and just put it on the back of your phone or any other object you carry on you most of the time.

Entry and Exit Hardware

Once the reader has granted you access it must send a signal to the door and unlock it. In this case the door must be equipped with special equipment that works with the access control system. The two most common mechanisms are Electric Door Strikes and Mag Locks.

 

  • Electric Door Strikes
    These will replace your existing door strikes. They are electric powered and will automatically unlock when the user is granted access.
  • Magnetic Locks
    Mag locks are electric powered magnets that will hold the door closed until the system sends a signal to unlock the door, at which point the door will be unlocked.

Exit Buttons and Bars usually go on the other side of the door and allow a user to request exit from the secured area.

  • Request to Exit Buttons – Bars
    There is a variety of different style of exit buttons and exit bars. Some are a simple electric powered buttons, some are pneumatic.  Pneumatic buttons do not rely on power, so an exit is possible even when power isn’t available. There are also exit buttons with a delay for more secure areas where the user must wait a few seconds before a exit is possible.

Access Control Software

Although many Access Control Systems come with integrated software some may require additional software to run or use advanced features. The software is where you will manage the users, the user rights, schedules and more. Many systems have add-on software such as Time and AttendanceVisitor Management and Video management.

facebooktwittergoogle_plusredditpinterestlinkedintumblrmail