recommend the installation of a Tecom Challenger access
control system which is designed to provide you with the latest
in building control functionality.
The Challenger system provides complete integration of alarm
and access control management facilities such as multiple
area programming, definable user functions, remote monitoring
capabilities, input and output functionality, as well as supporting
various reporting formats.
Operator stations (PC's) connected to a computer interface
on the Challenger panel, running Titan software, take alarm
and access control monitoring to new levels of flexibility
and sophistication. Challenger programming can be fully uploaded
and downloaded when using the Titan Management software.
As a system's requirements can change over time, this system's
modular design makes upgrading an easy process. The system
comprises two main modules, Data Gathering Panels (DGP's),
and Remote Arming Stations (RAS's).
These modules are connected to a LAN that enables communications
to the Master Panel. The Main Panel , DGP's and RAS's can
have ancillary products connected to them, such as input and
output devices including relay cards, card reader devices
etc., to meet security needs.
This system is proposed as it will admirably suit the requirements
for businesses and institutions both small and large and is
The Tecom four-door controllers perform all access control
facilities in 'real time' using 'distributed intelligence
architecture' The intelligent four-door controllers make all
access decisions themselves and report events back to the
main panel via the LAN.
If the LAN to the Controller fails, all access operations
continue normally including storing up to 500 events in its
buffer, uploading them to the Challenger panel and any management
software when LAN communications are restored.
Each four-door controller will control the inwards and outwards
access and egress to 4 doors and also have the emergency exit
integrated to the fire system so that in the event of a fire
alarm activation the exit fire doors will automatically release
for emergency egress and Fire Service access.
Car park access can be restricted to cardholders at all times
and egress into the tenancies from the car park can also be
restricted to card holders. Public pedestrian access into
the building may be either restricted or unrestricted, depending
on the tenant's requirements. An example is proposed in the
e.g. The Public may freely enter the building via the main
lobby during business hours on workdays, but the doors will
lock off out of hours and on all public holidays so that only
authorised access can be made utilising the access control
For personnel parking directly underneath the building, remote
transmitters may be proposed so that by simply pressing one
button the first vehicle access gate will open, and upon pressing
the second button, a second vehicle access gate will open.
Both of these actuations will report to the system as user
Should a remote be unavailable for some reason or left in
another vehicle, a reader is recommended at these doors to
enable access using the standard proxcard. Access to this
door may be restricted to the cards of only those personnel
who are issued with remotes, thereby preventing non-authorised
personnel from accessing this door.
Some features of this system are:
- Standard 11,466 users.
- Region counting to track the number of users in any area,
- Macro-logic facilities perform automatic operations if
a specific event occurs e.g. a valid card badge may automatically
turn the relevant alarm area off, lights and air conditioning
on, but only within a specific timeframe.
- Restriction and management of user access including time
zone, privileged, lost, void, expired, and automatic locking
and unlocking of doors at specific times with another very
useful feature, stopping doors unlocking automatically,
and keeping lights and air conditioning inactive until a
valid user is already in the area. This means that premises
can remain protected even if an unforeseen event means that
the building cannot be opened for the day.
Other options for higher levels of access control activation
instead of proximity cards or keypads
IRIS RECOGNITION TECHNOLOGY:
Iris Recognition is widely acknowledged as the most accurate
biometric identification system available in the world today.
Iris Recognition Technology identifies humans by the unique
physiological patterns in the iris of the eye to a degree
of accuracy surpassing even DNA matching.
Non-invasive, non-contact and extremely fast, a high-resolution
black and white digital camera captures the image of an iris,
translating it into an encrypted digital code. It is completely
harmless. This technology is NOT retina scan technology and
no laser is projected into the eye.
KEY OPERATIONAL BENEFITS:
- Iris Recognition Technology (IRT) offers significant operational
efficiencies as well as unmatched accuracy.
- The deployment of IRT will both save time and improve
the effectiveness of security personnel. The speed and security
provided by IRT reduces the burden on security staff and
allows them to redirect their attention to other activities.
- The deployment of IRT eliminates traditional methods of
"cheating" that use of cards and PINs can be subject
- A one-off enrolment procedure followed by quick subsequent
identity checks makes life easier for employees, saving
time and money.
- The precise time tracking afforded by the solution provides
complete accountability. Ports can be generated providing
a complete audit trail, detailing timings of all interactions.
- The deployment of IRT will enhance the public and political
perception of your facilities by visibly demonstrating your
commitment to innovative, highly accurate security technology.
- Security wise, IRT enables the attainment of unparalleled
protection of high risk and commercially sensitive areas.
A simple report will show who is on site at anytime.
- Can be easily integrated into existing management systems.
- Data base can be maintained locally or through a WAN or
LAN, catering for remote areas.
Iris recognition has been accredited in Australia by ASIO
T4 for use in Government and Defence security applications.
Return to top