Access Control System
Access Control System
1
What is an access control system?
2
3 building access control models
DISCRETIONARY (DAC) MANDATORY (MAC)
ROLE-BASED (RBAC)
3
Examples of Access Control Systems
Mobile Credentials
Essentially, a user’s smartphone is the key to this access control. Mobile
credentials, which are usually app-based, allow users to unlock the door
by touching a button within the app.
4
The difference between physical &
logical access control
Access control is often divided into two categories:
physical and logical.
Physical access control refers to controlling access to a
physical location.
Logical access control refers to controlling access to data
or a digital space, generally for cybersecurity purposes.
Examples of physical access control include:
● Using a key card to open a gate.
● Entering a PIN code on a keypad.
Examples of logical access control include:
● Passwords to access files on a shared server.
● Biometric credentials to access certain features on
corporate networks.
5
6
TYPES OF ACCESS CONTROL
SYSTEMS
6 types of access control systems
8
KEY CARD, KEYPAD AND KEY FOB SYSTEM
INPUT
AUTHENTICATION
ACCESS GRANTING
ACCESS DENIAL
WIRELESS ACCESS CONTROL SYSTEM
COMPONENTS
COMMUNICATION
AUTHENTICATION
VERIFICATION
ACCESS GRANTING
MOBILE ACCESS CONTROL SYSTEM
MOBILE CREDENTIALS
Users can store their access credentials, such as digital keys or virtual access cards, on
their smartphones instead of physical key cards or fobs.
AUTHENTICATION METHODS
Authentication can be done through various methods including Bluetooth, Near Field
Communication (NFC), or QR codes, allowing users to unlock doors by simply presenting their
mobile devices.
REMOTE MANAGEMENT
Administrators can remotely issue, revoke, or update access permissions for users through a
centralized management platform or mobile app, providing flexibility and security.
ENHANCED SECURITY
Mobile access control systems often employ advanced encryption techniques and
biometric authentication (such as fingerprint or facial recognition) to ensure secure access.
VIDEO ACCESS SYSTEM
INTEGRATION
VISUAL VERIFICATION
Video access systems allow administrators to visually verify the identity of individuals
attempting to gain entry by capturing footage of access points and users.
REAL-TIME MONITORING
Administrators can monitor live video feeds of access points in real-time to ensure security and
respond promptly to any suspicious activities or breaches.
BIOMETRIC AND FACE RECOGNITION SYSTEM
Biometric and face recognition systems are advanced security solutions that
authenticate individuals based on unique physiological or behavioral characteristics.
Here's a brief overview in short points:
BIOMETRIC AUTHENTICATION
FACE RECOGNITION
Face recognition systems identify individuals by analyzing and comparing their facial features,
such as the distance between eyes, nose, and mouth, using image processing algorithms.
CONTACTLESS AUTHENTICATION
Both biometric and face recognition systems offer contactless authentication methods, enhancing
convenience and hygiene in access control scenarios.
INTEGRATIONS
Access control systems that integrate with other smart building platforms create a
unified, cohesive living or working experience that tenants and staff alike appreciate.
TEMPERATURE SENSORS
VIDEO INTERCOMS
SMART LOCKS
PROPERTY MANAGEMENT
SOFTWARE
HVAC SYSTEMS
ELEVATOR CONTROLS
SMART PARKING
SMART PARKING
How Can Access Control Be Implemented?
There are six key steps to implement access control are:
17
THE EDGE
AMSTERDAM,NETHERLAND 18
INTRODUCTION-
● The Edge, an office building in Amsterdam, demonstrates
the advantages of BIM implementation.
● Completed in 2014, it emphasizes IoT principles rather than
traditional BIM techniques.
● Smart technologies enable benefits such as
1. Automated energy
2. Performance visualization
3. Building usage monitoring.
● Internationally acclaimed as the world's smartest building,
it's dubbed "a computer with a roof."
● Employees start their day by connecting to the building
through Mapiq, a smartphone app for various tasks.
● The Edge operates on a flexible desk reservation system,
accommodating 2,850 employees across 1,080 desks.
● Features include smart panels, data dashboards, security
robots, and automated coffee makers.
● Notably, it effectively utilizes BIM for energy efficiency
visualization and maintenance issue monitoring,
showcasing the potential of 6D BIM for sustainability.
19
ACCESS MANAGEMENT CONTROL USED-
20
ACCESS MANAGEMENT CONTROL USED-
21
ACCESS MANAGEMENT
CONTROL USED-
22
CONTROLLING ACTIVITIES THROUGH PCS
23
24
THANK - YOU
PRESENTATION BY -
1. SAKSHI BAGUL - 03
2. PRASHANT PARVE - 05
3. GAURIKA PANIKAR - 13
4. SIDDHALI TAKLEPATIL - 42