Access Control & Swipe Card Systems
We recommend the installation of a Tecom Challenger access control system which is designed to provide you with the latest in building control functionality.

The Challenger system provides complete integration of alarm and access control management facilities such as multiple area programming, definable user functions, remote monitoring capabilities, input and output functionality, as well as supporting various reporting formats.

Operator stations (PC's) connected to a computer interface on the Challenger panel, running Titan software, take alarm and access control monitoring to new levels of flexibility and sophistication. Challenger programming can be fully uploaded and downloaded when using the Titan Management software.

As a system's requirements can change over time, this system's modular design makes upgrading an easy process. The system comprises two main modules, Data Gathering Panels (DGP's), and Remote Arming Stations (RAS's).

These modules are connected to a LAN that enables communications to the Master Panel. The Main Panel , DGP's and RAS's can have ancillary products connected to them, such as input and output devices including relay cards, card reader devices etc., to meet security needs.

This system is proposed as it will admirably suit the requirements for businesses and institutions both small and large and is infinitely expandable.

The Tecom four-door controllers perform all access control facilities in 'real time' using 'distributed intelligence architecture' The intelligent four-door controllers make all access decisions themselves and report events back to the main panel via the LAN.

If the LAN to the Controller fails, all access operations continue normally including storing up to 500 events in its buffer, uploading them to the Challenger panel and any management software when LAN communications are restored.

Each four-door controller will control the inwards and outwards access and egress to 4 doors and also have the emergency exit integrated to the fire system so that in the event of a fire alarm activation the exit fire doors will automatically release for emergency egress and Fire Service access.

Car park access can be restricted to cardholders at all times and egress into the tenancies from the car park can also be restricted to card holders. Public pedestrian access into the building may be either restricted or unrestricted, depending on the tenant's requirements. An example is proposed in the next paragraph

e.g. The Public may freely enter the building via the main lobby during business hours on workdays, but the doors will lock off out of hours and on all public holidays so that only authorised access can be made utilising the access control reader.

For personnel parking directly underneath the building, remote transmitters may be proposed so that by simply pressing one button the first vehicle access gate will open, and upon pressing the second button, a second vehicle access gate will open. Both of these actuations will report to the system as user identifiable events.

Should a remote be unavailable for some reason or left in another vehicle, a reader is recommended at these doors to enable access using the standard proxcard. Access to this door may be restricted to the cards of only those personnel who are issued with remotes, thereby preventing non-authorised personnel from accessing this door.

Some features of this system are:

  • Standard 11,466 users.
  • Region counting to track the number of users in any area, including carparks.
  • Macro-logic facilities perform automatic operations if a specific event occurs e.g. a valid card badge may automatically turn the relevant alarm area off, lights and air conditioning on, but only within a specific timeframe.
  • Restriction and management of user access including time zone, privileged, lost, void, expired, and automatic locking and unlocking of doors at specific times with another very useful feature, stopping doors unlocking automatically, and keeping lights and air conditioning inactive until a valid user is already in the area. This means that premises can remain protected even if an unforeseen event means that the building cannot be opened for the day.

Other options for higher levels of access control activation instead of proximity cards or keypads

IRIS RECOGNITION TECHNOLOGY:
Iris Recognition is widely acknowledged as the most accurate biometric identification system available in the world today.
Iris Recognition Technology identifies humans by the unique physiological patterns in the iris of the eye to a degree of accuracy surpassing even DNA matching.

Non-invasive, non-contact and extremely fast, a high-resolution black and white digital camera captures the image of an iris, translating it into an encrypted digital code. It is completely harmless. This technology is NOT retina scan technology and no laser is projected into the eye.

KEY OPERATIONAL BENEFITS:

  • Iris Recognition Technology (IRT) offers significant operational efficiencies as well as unmatched accuracy.
  • The deployment of IRT will both save time and improve the effectiveness of security personnel. The speed and security provided by IRT reduces the burden on security staff and allows them to redirect their attention to other activities.
  • The deployment of IRT eliminates traditional methods of "cheating" that use of cards and PINs can be subject to.
  • A one-off enrolment procedure followed by quick subsequent identity checks makes life easier for employees, saving time and money.
  • The precise time tracking afforded by the solution provides complete accountability. Ports can be generated providing a complete audit trail, detailing timings of all interactions.
  • The deployment of IRT will enhance the public and political perception of your facilities by visibly demonstrating your commitment to innovative, highly accurate security technology.
  • Security wise, IRT enables the attainment of unparalleled protection of high risk and commercially sensitive areas. A simple report will show who is on site at anytime.
  • Can be easily integrated into existing management systems.
  • Data base can be maintained locally or through a WAN or LAN, catering for remote areas.

ACCREDITATION INFORMATION
Iris recognition has been accredited in Australia by ASIO T4 for use in Government and Defence security applications.

Return to top of page

Unit D, Cain Commercial Centre, 20 Cain Rd, Penrose. PO Box 12-775, Penrose, Auckland 1006, NZ
Tel: 09 579 9636 Fax: 09 579 9846 Email: info@securityconcepts.co.nz