OPERATIONS
S.C.A.
OVERVIEW
S.C.A. it is a system that offers access control through badge readers. The gates, in fact, are made up of tripod turnstiles or automatic doors whose opening is enabled only by reading the magnetic card, so that you can always check the entry and / or exit of the qualified personnel. The system, therefore, offers the control of the passages by reading the badges, this happens in two ways:
- by inserting the badge into the reader, by performing a “swipe”;
- simply by touching the badge to the proximity reader, so that it can read the card number and recognize the associated access rights.
The functionality of the badge readers is also guaranteed in case of failure of the network and of the central system, because S.C.A. offers two operating scenarios: on-line and off-line. In On-line mode all transactions are validated and recorded by the central server, in this way there is total control of the areas and any blocks set by the user. The authorization to the badge is given only after the central system has verified the authorization to move the badge and recorded the pass data (badge, time, passage, …). The number of transactions that can be stored in this mode is limited only by the capacity of the disks and the database. The server machine provided for this system manages to historicize millions of steps, and is equipped to respond to the request for authorization to move in less time the second. For particular gates, it is possible to extend the historicized period simply by changing a configuration parameter, in this way, and only for special gates, we can also keep a history of several months in line.
In online mode the following modes are offered:
- Registration of access requests.
- Storing images related to access requests.
- Historicization of alarms and images.
- Control and registration of badge access requests.
- Verification of the state of the gates.
In Off-line mode, on the other hand, the control unit registers the passages locally and then, once the connection to the central unit is resumed, transfer all the recorded data. No reasonable limits are set on the maximum number of pass-enabled badges. Currently, therefore, only the local registration function of access requests is offered in this mode.
Finally, one of the many functions offered by the system is the management of “groups”, ie the possibility to assign access rights in certain areas not to a single individual but to groups of people. This functionality is of particular importance in the management of closed areas such as the parking lots where a certain number of seats are assigned to each group, the SCA, with the group management is able to monitor for each group the number of places already assigned and those still free.
BENEFITS
The use of S.C.A offers many advantages:
“Maximization of the security levels through anti-intrusion alert functions”
“Minimum staff employment, both for the management and the maintenance”
“Total respect of the privacy rules”
SOLUTION COMPONENTS
SURVEILLANCE
S.C.A. it is an access control system that uses for this purpose the use of badge readers in and out of each gate and the acquisition of images made through the installed cameras. This is why the “Surveillance” environment, which is the “core” of the system, is of particular importance. Thanks to this module, in fact, it is possible:
- Display in real time all the gates configured and controlled by a video camera.
- View historicized images.
- Know the list of all accesses in the area, also referring to previous periods.
- Know the list of verified alarms.
Currently, the historicization of images refers to a maximum of six days, information on access and alarms, however, are stored for a maximum period of two months. Beyond these periods, the system activates an automatic updating of the information, ie all information or images that do not fall within the interval configured for “default” are automatically deleted. The system administrator, however, can always establish storage times that differ from what is established by default.
MONITORING
The system also allows monitoring the status of the gates. Supervision and control functions are automatically performed by the system by displaying geographical maps containing the configured and associated gates. Moreover, this graphic view allows, through different colors and graphics, to:
- Clearly distinguish online gates, those off-line and those switched off.
- View inconsistencies in accesses (access to an unauthorized badge).
- View the opening of a remote gate.
- Highlight alarms (Manual door opening, Generic alarm status).
Moreover, this environment presents a “Monitor” through which the detailed data concerning the on-line situation of each gate are detected. The “Commands to peripherals” environment, on the other hand, is responsible for carrying out both remote control activities of the gates and monitoring activities on the functioning of the configured “devices”.
The S.C.A. provides among its many features, even the ability to be controlled by SMS messages from enabled operators. In fact, S.C.A. it is integrated with the SMS Manager system which provides the SMS interface to users.
COMMANDS TO PERIPHERALS
The “Commands to peripherals” environment is responsible for carrying out both remote control of the gates and monitoring of the functioning of the configured “devices”.
It has been repeatedly stated that the task of S.C.A. it is the control of the accesses that occur in particular “closed” areas and that for this purpose the system uses the use of badge readers that control the entry and exit from each gate. However, it may happen that an unauthorized person is required to enter a closed area, in this case the system administrator must remotely authorize the opening of the opening. The administrator, in fact, through a video camera or video door phone is able to verify from whom the access request is forwarded and decide whether or not to authorize the opening.
The other functionality offered is that related to the monitoring activity of all the readers configured in the system. The operator, in fact, comfortably seated at his desk can, by choosing the device to be monitored and activating the command, verify the proper functioning of the device. The good functioning of the device is graphically highlighted by a green bar, on the contrary any malfunction is represented by the colored bar of red.
CONFIGURATION ENVIRONMENT
The environment is responsible for configuring the operating parameters and all the elements necessary to manage the system. Here the system administrator must distinguish the environment for the simple configuration from the one related to the association of data.
The configuration module is the one related to the creation of a registry complete with all the data:
- Of the employees.
- Of the groups.
- Of the logos.
- Badge issued.
- Of the colors assigned to the different permits and to different access zones
- Access rights associated with visitor badges.
- Of controlled areas and gaps.
- Of the readers and cameras installed.
Each of the items listed here must be configured to be recognized by the system and displayed by the enabled user.
The other part, however, is related to the association between all the configured data and system resources. For the functioning of S.C.A., in fact, it is necessary that:
- Each badge issued is associated with an employee, group or permits (in the case of a visitor badge).
- A color and one or more gates are associated with each permit.
- To each area is associated one or more gates and that each of these is associated with a reader and / or a camera.
- Each area can be defined open or closed, in the latter case to access the area it is necessary to carry out checks. The S.C.A. in fact, it controls that an output corresponds to each input. In some cases, however, it is necessary to disconnect from this logic, and it is for this purpose that the concept of timeout of antipassback (Tmt_APB) is inserted. The antipassback timeout expresses in seconds how much time must elapse before it is possible to re-enter a closed area without having previously made an exit from it. This means giving the possibility to access a closed area in two ways:
if an output has previously been made through any of the gaps configured therein.
if the antipassback timeout has passed since the last entry made.
For the gates the control is carried out with the concept of motion timeout. This expresses in seconds the maximum time that must pass between two “badgate” of opposite sense, this logic is completely disconnected from the concept of Antipassback.
SMS MANAGER
S.C.A. provides among its many features, even the ability to be controlled by SMS messages from enabled operators. In fact, S.C.A. it is integrated with the SMS Manager system which provides the SMS interface to users.
To date, the command for disabling a badge is available by sending a text message from an authorized mobile phone. Therefore, the general user S.C.A. can be enabled by including his / her phone number in the list of authorized users of the SMS Manager and send messages to the S.C.A. system. to disable access to particular badges. The SMS message must be written in a specific format so that the SMS Manager can recognize it syntactically and also the request to the S.C.A system.
With this feature we are able to remedy, wherever we are, urgent situations where you must prohibit the use of a badge that for example may have been lost or stolen.
MONITORING AREAS
The “Monitoring Areas” environment is the environment responsible for the control of areas where there is a limited number of accesses, so as to verify at any time and in real time the number of accesses made in this area.
Since the S.C.A. also performs a check on the groups that have right of access using this environment to monitor the entry of groups in these areas.
The most frequent application of this feature refers to the parking areas, where it is necessary to know in real time which seats are already assigned and those still available.