Access Control for Office Applications

highpitchedteamΑσφάλεια

30 Νοε 2013 (πριν από 3 χρόνια και 4 μήνες)

104 εμφανίσεις





















































































Access Control for
Office Applications

Benefits of The Fingerprint K
ey

and NEXTOR
Series




1










Access Control for Office Applications

Benefits of The Fingerprint Key

and NEXTOR Series


The proper access control equipment can be the
most cost effect
ive measure to deter crime at any
office. A fraction of the cost of other security
components, access control is often the first line
of defense in securing a property. Access control
ensures that those who are supposed to gain
entrance do, and that those
that are not
supposed to enter do not, making access control
the backbone of preventive
security measure.

With e
-
datacollect, access control now blends
perfectly into any IT infrastructure. No longer
requiring external servers or software downloads,
users
can manage their properties


access system
from anywhere in the world over the internet. And
with the introduction of The Fingerprint Key,
companies are discovering the ease and affordability
of biometrics. Unlike any other product available, The
Fingerpri
nt Key is as simple to install as a traditional
proximity reader and sells at a price that makes it a
cost saving application over traditional card readers.

The Fingerprint Key combined with e
-
datacollect’s
access control system, the NEXTOR Series, creates

an

unparalleled offering that should

usher in
widespread use of biometrics and internet
-
based
access control sy
stems. Property owners and office
tenants

are realizing the benefit of implementing this
system and it is simply a matter of time until these
fe
atures become the industry standards.

Traditional Office Access Control

Legacy

access control platforms fo
rce users to use a
dedicated server or computer to run a

locally
manage
d

access control system
.
Users

must

install

access control software to
a comput
er or server and

access

the software locally to make access right
modifications.
For example, i
f a user wanted to give
someone weekend access, they would have to go
to
the host
computer and make changes to the

software application locally.




This requires

the
host
server

or computer

to be
cons
tantly running in order to support any and all
action
s
, from cha
nging access rights to verifying a
proximity card for entry.

Exhibit 1

Traditional Centralized Access Control



In other syst
ems
,

access control is run on a semi
-
distributed platform. These systems are sometimes
referred to as distributed systems, but e
-
datacollect’s
NEXTOR Series offers a new level of distribution that
eclipses the semi
-
distributed architecture.


Access contro
l systems that run on the semi
-
distributed architecture still rely on
a
local host for
any access control change

to the system. For
example, if an administrator wants

to change access
rights for a particular office door, you must access the
computer that h
ouses the
application to change the
criteria for access
. The controller then houses the
changes in access rights to be used the next time the
person tries to gain entry.

Access control information
is distributed between the host

computer
and
controller

and

the controller carries out these access
rights to open a door when appropriate (see Exhibit
2)
. These systems are seen as an advance in access
control because they rely less on a dedicated server
than centralized systems that can not function without
the
host.
These systems dis
tribute some of that
Access
Control
Software

Local Host




2


responsibility by allowing door openings without
requiring communication

with the server.

Exhibit
2

Traditional
Semi
-
Distributed Access Control




Limitation #1: Dedicated

Server Requ
ired

With traditional access control
modeled in
Exhibit 1,
users
must allocate

a dedicated computer or server
to run the software. This creates complications
installing and maintaining
software

or configuring a
server to act as an access control host. With

this
system, access control becomes another program
that the IT department or
tenant owner has

to
manage along with
other programs vying for time and
hard drive space.

Limitation #2: Local Software=Local
Administration

Because software is hosted on a loca
l server and
controllers and readers are connected directly to the
host, administration of software must be managed
locally. In order to make changes to the access
control system, you must access the host and make
changes to the installed so
ftware.

Limitat
ion #3: No Enterprise Solution

With dedicated hardware hosting software that’s
administered locally, traditional access control makes
it

difficult

to
manage multiple tenants at the same site

or multiple tenants at multiple sites.
In order to make
these sys
tems work, each tenant must download
software to local computers or have a centrally
located server managed by the building owner that
manages various tenants. There is no way to handle
the complexity of a tenant / owner relationship with
multiple tenants
managing different workforces

over
different hardware components.


This issue is compounded further w
hen you are
considering tenants
over multiple sites. Because the
systems are limited to local software hosts there is no
way to manage multiple sites using

the same access
cont
rol database and configurations without
compromising the security of the tenant

s IT system.
The necessity of local hosting forces access control
users into silos without the ability to manage multiple
tenants over multiple locations

(
see Exhibit 3)
.

Exhibit
3

Traditional Access Control with Multiple Tenants



Traditional Biometrics

When you combine traditional biometrics

with

the
current
access control systems, the complexity

is
compounded, creating a comp
lex web of hardware
and software that is difficult to install and almost
impossible to manage.


With traditional biometrics you encounter the same
problems as the access control
systems;

the
limitations are similar (and just as endemic.)

Limitation #1: De
dicated
Server Required

Just like access control, traditional biometrics readers
require dedicated hardware to host biometrics
software that stores templates.

Limitation #2: Local Software=Local
Administration

With software hosted locally, users administer

biometric templates
through
a
local host.

Limitation #3: No Enterprise Solution

Because all software requires local hosting and
administration, systems are constrained by the
limitations of local hardware. If you want to register a
fingerprint, you must r
egister locally and store the
template on local hardware.

NEXTOR Series Access Control

The NEXTOR Series eliminates many of the
limitations that have plagued systems designed on
Access
Control
Software

Local Host

Access Control

Soft
ware

Access Control
Software

Access Control
Software

Tenant #2

Tenant #3

Tenant #1

Controller

Access Control
Software

Property
Management




3


legacy platforms.
Its flexible design
makes

it ideal for
various applications,

particularly those involving a
mobile workforce interacting over multiple sites.



The NEXTOR Series sets itself apart in
being entirely
internet based.
A
ll hardware is IP configurable, so
e
ach piece belongs to a network.
This connectivity
makes the entir
e system infinitely expandable. So if
you want to manage a single office with multiple
tenants or multiple offices around the world, you can
with an integrated network managed over the
internet.


NEXTOR Series offers many advantages over the
traditional a
ccess control system. The advantages
combine to create an unparallel product for office
installations.

Advantage #1: Embedded
Software

E
-
datacollect’s access control products

come with
software embedded directly on the hardware. With
embedded software, you

will never have to install or
maintain access control software again. Access
control software sits outside of your IT systems and is
entirely open source and Linux based.

Advantage #2: Internet Based=Global
Administration

With embedded softwa
re and intern
et connectivity,

all
NEXTOR Series products are able to manage
applications over the internet from any location in the
world. Instead of managing software from a single
location, users can modify the access control
software from anywhere in the world.


Th
e internet based application is not an option that
requires
extra hardware peripherals but is standard
on the NEXTOR Series. With no modifications, our
products can be accessed over the internet from
anywhere. And with wireless options, you can ensure
conn
ectivity without a LAN line.

So over any network
you can access any reader at any office you manage.

Advantage #3: Infinite Enterprise Solution

E
-
datacollect access control is infinitely expandable
to meet the needs of any size solution. In order to
increa
se the size of an access control system, users
simply add additional master units
. These master
units then support door controllers and readers

at the
same site or at any site in the world. This flexible
framework allows for unlimited expansion. If you
nee
d to manage more tenants or more buildings just
add another branch to the tree with a master unit

or
door unit

(see Exhibit 4). This eliminates the silos of
traditional access control system and allows property
management to manage an infinitely expandable

number of sites without comprising tenant’s IT
security and without installing any local hardware.


Exhibit
3

e
-
datacollect Access Control with Multiple Tenants





The Fingerprint Key Biometrics

Unlike traditional biometrics
,

The Fingerprint Key is
as easy to install and manage as any card reader.
The Fingerprint Key requires no additional hardware
or software to manage templates and can be added
to any door unit (DU, door controller) in the NEXTOR
network.


The Fin
gerprint K
ey achieves simplicity of installation
and use
by being built on the same software
embedded platform as the access control system.
Like the master unit and door unit of the NEXTOR
Series, The Fingerprint Key comes with software
embedded on the hardware. Th
is design brings
NEXTOR Series’ ease to biometrics.

Advantage #1: Embedded Software

This may sound familiar but The Fingerprint Key’s
embedded software eliminates the need for extra
hardware or external servers or host computers.
Templates are managed in T
he Fingerprint Key
allowing the entire access control process with
biometrics to occur without the need for any
additional hardware or software.


Advantage #2: Manage and Transfer Fingerprints
Globally

Another key feature that distinguishes The
Fingerprint

Key from other biometric readers is the
ability to transfer fingerprint templates anywhere in a
network. This allows administrators to register
Master

Unit 400

Master

Unit 400

Property
Management

DU

Router

Internet

Public
Area

DU

DU

Master

Unit 400

Tenant

#2

DU

DU

Tenant

#1




4


employees only once and then transfer templates to
any other Fingerprint Key on the network.


For example, a p
roperty manager originally
registered at corporate headquarters in Dallas but
wants to visit a building in Fort Worth to check on the
progress of maintenance repairs. Instead of having to
register at the location in Fort Worth, the
administrator can send t
he individual’s fingerprint
template to The Fingerprint Key in Fort Worth by
loggin
g on to the NEXTOR Series application over
the internet

(see Exhibit 4)
. The administrator
changes the manager’s access rights for the Fort
Worth facility for that day and w
hen the manager
arrives on the property in Fort Worth, he simply
presents his thumb and the door opens.


The propagation of the manager’s template to the
Fort Worth location occurred with the click of a button
over the interne
t when the administrator gran
ted

the
property ma
nager access rights for the day.

This
same scenario can be duplicated an unlimited
number of times at an infinite number of locations all
over the internet in a matter of seconds. The
Fingerprint Key eliminates the need to register at
mu
ltiple facilities, simply register once and propagate
when needed.


Exhibit
4

Fingerprint Propagation: Register Once, Send
Anywhere


Advantage #3: Infinite Fingerprint Keys on
Access Control Network

With the NEXTOR Series, each
Fingerprint Key can
be addressed within a network of components. This
allows administrators to manage individual readers
from anywhere in the world over the internet. Each
Fingerprint K
ey acts as a part within a larger access
control network. This system a
llows for the
management of specific re
aders regardless of the
network’s

size. So whether you are managing one
reader or a thousand readers you can make changes
to any individual reader on the network. This allows
for intelligent expansion to
potentially i
nfinite scale.


Exhibit
5

The
Fingerprint Key Network





Example of Benefits in an Office Application

A building owner in California wants to add access
control to two existing buildings and to a new building
nearing completio
n. The owner has a total of

five
tenants spread over the current two buildings and is
still not sure how many tenants will occupy the
building under construction. After viewing many
different access control products that require a
dedicated server and crea
te silos between building
management and tenants, the owner learns about e
-
datacollect’s products. After seeing a demonstration
of The Fingerprint Key and learning about the ease of
ins
tallation

and web
-
based software
, the owner
chooses e
-
datacollect for h
er access control system.


In the current buildings, the owner wants to install
The Fingerprint Key in common areas and in the
entry way for each tenant unit. She wants the
common areas to be managed by the building
owners and she wants the individual ten
ants to
manage access control for the space they occupy.
She also wants to be able to manage access to all
three buildings (two current and one scheduled) over
the same network.


1

2

3

4

5

6

7

8

9

*

0

#

Initial
Registration

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

Template
Propagation

Master

Unit 400

Master

Unit 400

Property
Management

DU

Ro
uter

Internet

Public
Area

DU

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

DU

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

Master

Uni
t 400

Tenant #2

DU

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

DU

Tenant #1




5


The

building owner chose e
-
datacollect, the only
system in the world that c
an

serve all these needs
because of its completely distributed architecture.
This a
rchitecture allows the building

owner to install
master
units for each of her five

tenants, these
master units act as virtual masters for all the
individual tenant

s access
points. The individual
tenants are able to manage their
property’s

access
points over the internet through a master unit
assigned to their area.
Each master unit serves the
tenants access control needs and allows them to
monitor employee access rights for
their organization
without worrying about the security of their network.


In the common areas, the building owner places a
master unit that will manage all access control for
common entries like stairwells and lobbies. The
owner places a master unit in th
e communications
room of her two buildings; these master units
manage common areas and manage access on
nights and weekends. When an employee registers

at a tenant’s master unit, the templates are sent to
The Fingerprint Keys in the common areas. The
empl
oyees only register once with their administrator

and they automatically gain access rights to the
common areas for nights and weekends. If the
building owner wants to make changes to these
rights then she can simply log on to her common
area master unit
s

over the internet and modify

access rights.


Also, with these master units the building owner can

grant access to individual units if she needs to visit
the space at any time. For example, if she wanted to
check on a
new kitchen
, she simply logs on to th
e
web and sends her fingerprint to the Fingerprint Key
managing the door she wants to enter. This allows
her temporary or permanent access to any tenant
space in her two buildings. If she wanted to show a
perspective tenant the space she could simply enrol
l
that individual at any Fingerprint Key and show any
space on her property (see Exhibit 4 and Exhibit 5).


With the new building under construction, the building
owner decides to place a

master unit in the common
area

for future expansion.

The owner will
expand the
access control system in accordance with the number
of tenants that take the space. Depending on the
number of tenants, the owner can add one or many
master units to the network and manage the systems
like she managing her occupied buildings.


W
ith the network of hardware in place and with the
use of The Fingerprint Key, the building owner will
also be able to keep track all contracted and
permanent labor, when they enter a property or
tenant space. If an incident arises, the building owner
has

t
he comfort of accessing the NEXTOR Series
software over the internet to check the

time stamp
s

of
who entered what space and at what time.


After using e
-
datacollect NEXTOR Series products
and
The Fingerprint Key, the owner relishes in the
ease of

managing
multiple properties and tenants
with the latest biomet
ric technology and with the
simplicity

of a fully distributed, web
-
based system.
The owner never has to worry about software
compatibility or comprising the security of her clients
IT infrastructure

but

can manage her entire property
through one system
.
Exhibit
6

Example Access Control Layout



Master

Unit 400

Master

Unit 400

Router

Internet

D
U

DU

Public
Area

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

DU

1

2

3

4

5

6

7

8

9

*

0

#

Master

Unit 400

Tenant #4

DU

1

2

3

4

5

6

7

8

9

*

0

#

DU

Tenant #3

Building #1

Master

Unit 400

1

2

3

4

5

6

7

8

9

*

0

#

DU

Tenant #5

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

Building #2

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

DU

DU

Master

Unit 400

Tenant #2

1

2

3

4

5

6

7

8

9

*

0

#

DU

Public
Area

Router

Internet

Master

Unit 400

Router

Internet

DU

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

Tenant #1

1

2

3

4

5

6

7

8

9

*

0

#

1

2

3

4

5

6

7

8

9

*

0

#

DU

Master

Unit 400

Building #3 (Under
Construction
)

Master

Unit 400




6


About e
-
datacollect

e
-
datacollect is a leading
manufacturer of network
ready internet appliances used for access control and
time & attendance. Our offices are located in Coppell,
Texas (Dallas), and Leonberg, Germany (Stuttgart).

In 1999, e
-
datacollect developed the first network
-
ready, web
-
enabled d
ata collection terminal using
Java on a Linux OS. For more than 15 years, the
company also developed and deployed enterprise
level access control systems that are used by major
banks, insurers, and other large companies. Building
on that foundation, e
-
data
collect has developed a full
line of feature rich access control and time &
attendance products

with the

software application
embedded in the hardware.

The company was founded over 20 years ago near
Stuttgart, Germany under the name Titze
Datentechnik Gmb
H founded by Dietrich Titze. Today
his son is a chief design engineer with the company.




Contact Information:






































Downloadable digital versions of this article and other publications are available from www.e
-
datac
ollect.com

Richard Bill

Business Developme
nt

972
-
906
-
7044

rbill@e
-
datacollect.com

David Lebel

Vice President


Marketing

866
-
807
-
3542

dlebel@e
-
datacollect.com

DALLAS

Christopher Zenaty

Vice President & National Sales Manager

917
-
301
-
9020

czenaty@e
-
datacollect.com

NEW YORK