0% found this document useful (0 votes)
4 views25 pages

Access Control System

An access control system is designed to enhance security by preventing unauthorized access while allowing authorized individuals easy entry. It includes various models such as Discretionary, Mandatory, and Role-Based Access Control, and can be implemented through systems like key cards, biometrics, and mobile credentials. The document also discusses the integration of access control with smart building technologies, exemplified by The Edge in Amsterdam, which utilizes IoT for efficient management and user experience.

Uploaded by

Sakshi Bagul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views25 pages

Access Control System

An access control system is designed to enhance security by preventing unauthorized access while allowing authorized individuals easy entry. It includes various models such as Discretionary, Mandatory, and Role-Based Access Control, and can be implemented through systems like key cards, biometrics, and mobile credentials. The document also discusses the integration of access control with smart building technologies, exemplified by The Edge in Amsterdam, which utilizes IoT for efficient management and user experience.

Uploaded by

Sakshi Bagul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

ACCESS CONTROL SYSTEM

1
What is an access control system?

The main purpose of access control is to


enhance building security and convenience by
preventing unauthorized people from
accessing a property while also ensuring
authorized people can easily gain access.

2
3 building access control models
DISCRETIONARY (DAC) MANDATORY (MAC)

ROLE-BASED (RBAC)

3
Examples of Access Control Systems

Server-based Access Control Biometric Door Readers


It is a type of Access Control Software that
They
It are
is a atype
typeofofAccess
AccessControl
ControlSoftware
Door Readers,
that
typically necessitates the purchase and
whichtypically
are often necessitates
the most expensive
the purchase
sort and
of door
renewal of software licenses and the
security
renewal
reader,of and
software
use licenses
scannersandto the
identify
maintenance of servers by a dedicated IT
persons
maintenance
based on of a unique
serversphysical
by a dedicated
trait such
IT as
team. If the company needs access control at
fingerprint,
team. If theiris,
company
or facialneeds
recognition.
access control at
numerous locations, you must establish
numerous locations, you must establish
servers at each site.
servers at each site.

Mobile Credentials
Essentially, a user’s smartphone is the key to this access control. Mobile
credentials, which are usually app-based, allow users to unlock the door
by touching a button within the app.

4
The difference between physical &
logical access control
Access control is often divided into two categories:
physical and logical.
Physical access control refers to controlling access to a
physical location.
Logical access control refers to controlling access to data
or a digital space, generally for cybersecurity purposes.
Examples of physical access control include:
● Using a key card to open a gate.
● Entering a PIN code on a keypad.
Examples of logical access control include:
● Passwords to access files on a shared server.
● Biometric credentials to access certain features on
corporate networks.

5
6
TYPES OF ACCESS CONTROL
SYSTEMS
6 types of access control systems

1. Key card and key fob system


2. Keypad
3. Wireless access control system
4. Mobile access control system
5. Video access system
6. Biometric and face recognition
system

8
KEY CARD, KEYPAD AND KEY FOB SYSTEM

A keypad in access control is a security device that allows users to input a


code or PIN (Personal Identification Number) to gain access to a secured
area. Here's how it works:

INPUT

AUTHENTICATION

ACCESS GRANTING

ACCESS DENIAL
WIRELESS ACCESS CONTROL SYSTEM

A wireless access control system is a security solution that regulates entry


to a building or area without the need for physical wires connecting the
various components. Here's a brief overview of how it works:

COMPONENTS

COMMUNICATION

AUTHENTICATION

VERIFICATION

ACCESS GRANTING
MOBILE ACCESS CONTROL SYSTEM

A mobile access control system refers to a security solution that enables


users to gain entry to buildings or areas using their mobile devices, such as
smartphones or tablets. Here are the key points about mobile access control
systems:

MOBILE CREDENTIALS

Users can store their access credentials, such as digital keys or virtual access cards, on
their smartphones instead of physical key cards or fobs.

AUTHENTICATION METHODS

Authentication can be done through various methods including Bluetooth, Near Field
Communication (NFC), or QR codes, allowing users to unlock doors by simply presenting their
mobile devices.

REMOTE MANAGEMENT
Administrators can remotely issue, revoke, or update access permissions for users through a
centralized management platform or mobile app, providing flexibility and security.

ENHANCED SECURITY

Mobile access control systems often employ advanced encryption techniques and
biometric authentication (such as fingerprint or facial recognition) to ensure secure access.
VIDEO ACCESS SYSTEM

A video access system is a security solution that combines access control


with video surveillance capabilities. Here's a concise breakdown of its key
points:

INTEGRATION

It integrates access control systems with video surveillance cameras to provide


comprehensive security coverage for buildings or areas.

VISUAL VERIFICATION

Video access systems allow administrators to visually verify the identity of individuals
attempting to gain entry by capturing footage of access points and users.

REAL-TIME MONITORING

Administrators can monitor live video feeds of access points in real-time to ensure security and
respond promptly to any suspicious activities or breaches.
BIOMETRIC AND FACE RECOGNITION SYSTEM

Biometric and face recognition systems are advanced security solutions that
authenticate individuals based on unique physiological or behavioral characteristics.
Here's a brief overview in short points:

BIOMETRIC AUTHENTICATION

Biometric systems identify individuals based on unique biological traits, such as


fingerprints, iris patterns, palm prints, or voiceprints.

FACE RECOGNITION

Face recognition systems identify individuals by analyzing and comparing their facial features,
such as the distance between eyes, nose, and mouth, using image processing algorithms.

CONTACTLESS AUTHENTICATION
Both biometric and face recognition systems offer contactless authentication methods, enhancing
convenience and hygiene in access control scenarios.
INTEGRATIONS

Access control systems that integrate with other smart building platforms create a
unified, cohesive living or working experience that tenants and staff alike appreciate.

Access control systems can integrate with:

TEMPERATURE SENSORS

VIDEO INTERCOMS

SMART LOCKS

PROPERTY MANAGEMENT
SOFTWARE

HVAC SYSTEMS

ELEVATOR CONTROLS
SMART PARKING
SMART PARKING
How Can Access Control Be Implemented?
There are six key steps to implement access control are:

1. Work out what system best suits your


needs.
2. Consider whether you want to
integrate your access control with
your other smart systems like CCTV
and fire safety.
3. Choose a trusted installer.
4. Install the system.
5. Set up your credentials.
6. Find a maintenance provider.

17
THE EDGE
AMSTERDAM,NETHERLAND 18
INTRODUCTION-
● The Edge, an office building in Amsterdam, demonstrates
the advantages of BIM implementation.
● Completed in 2014, it emphasizes IoT principles rather than
traditional BIM techniques.
● Smart technologies enable benefits such as
1. Automated energy
2. Performance visualization
3. Building usage monitoring.
● Internationally acclaimed as the world's smartest building,
it's dubbed "a computer with a roof."
● Employees start their day by connecting to the building
through Mapiq, a smartphone app for various tasks.
● The Edge operates on a flexible desk reservation system,
accommodating 2,850 employees across 1,080 desks.
● Features include smart panels, data dashboards, security
robots, and automated coffee makers.
● Notably, it effectively utilizes BIM for energy efficiency
visualization and maintenance issue monitoring,
showcasing the potential of 6D BIM for sustainability.

19
ACCESS MANAGEMENT CONTROL USED-

● Each floor of The Edge features


building management computers linked
to zone controllers.

● CBRE allocates significant resources to


facilities management, occupying a
substantial space.

● The Edge focuses on a virtual 3D model


to demonstrate smart technology
applications and effectively utilizes
BIM.

● Intelligent digital cartography is


deployed through localized mapping of
users, occupancies, and facility usage.

● Deloitte consistently gathers data on


staff activities within The Edge.

20
ACCESS MANAGEMENT CONTROL USED-

● Upon entering The Edge, visitors are greeted with


Deloitte's promotional video illustrating the
potential of an IoT building.

● The video showcases two user scenarios: an


employee using Mapiq to check in and find a desk,
and facilities management personnel monitoring
real-time office occupancy on a specific floor.

● Many aspects of this vision have been implemented


at The Edge, reflecting its advanced utilization of
IoT technologies.

● Real-life examples at The Edge demonstrate the


seamless integration of smart tools like Mapiq for
employee navigation and real-time occupancy
tracking for efficient facilities management.

21
ACCESS MANAGEMENT
CONTROL USED-

● This data generated over longer


durations is beneficial for CBRE who
can observe and predict areas within
the office that require more upkeep
than others.

● Knowing which days of the week or


month will staff not be using certain
parts of the building, these can be
closed off with employees
concentrated on a smaller footprint
thereby leading to energy savings.

● Similarly cleaning staff are informed


of which areas need more attention
making them more efficient in
delivering services.

22
CONTROLLING ACTIVITIES THROUGH PCS

● The Personal Control App (PCA) is a mobile application


accessible on iOS and Android devices.
● It utilizes visible light communications to grant personalized
control over lighting scenes and room temperature at
individual workspaces.
● Even in open-plan offices, the PCA empowers employees to
personalize their working environment.
● The app serves as a comprehensive interface for employee
interaction with the building, facilitating tasks such as
finding parking, locating free desks, reporting facility
issues, and navigating within the building.
● The app also stores preferences such as coffee preferences
and tracks energy usage for employee awareness.
● The Edge's digital infrastructure is intricately connected to
every aspect of the building, including ceiling panels,
lightbulbs, and HVAC systems.
● This connectivity enhances facility management by
automatically alerting managers to issues such as
malfunctioning lights.

23
24
THANK - YOU

PRESENTATION BY -
1. SAKSHI BAGUL - 03
2. PRASHANT PARVE - 05
3. GAURIKA PANIKAR - 13
4. SIDDHALI TAKLEPATIL - 42

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy