Upload
truongkiet
View
232
Download
6
Embed Size (px)
Citation preview
January 2015
Fit Design System Co., Ltd.All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltdhttp://www.fit-design.com
Introduction toIntroduction to
<<<<<<<<Access Control SystemAccess Control System>>>>>>>>
FDS Entry Management SystemFDS Entry Management System
・・・・Feature and Function of Entry Management System
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
Feature :::: Wiring work is very simple.
Function :::: Almost all the functions conceivable in Entry/Exit Management are provided, and cooperation with another system is available.
System configuration:::: A flexible and scalable system configuration from a small system to a large scale system is realized.
1
ACS2 Mid-size Entry Management System ・ ・ ・ ・Registered users : Up to 50,000 users ・ ・ ・ ・Controlled doors : Up to 1,800 doors ・ ・ ・ ・History Preservation : For 2 years and up to 50,000 events ・ ・ ・ ・Schedule : 2,000 kinds
Entry/Exit restriction functionVarious functions are available including
route restriction, occupants limit control,
tailgating prevention, antipassback (entered
person is allowed for exit only), and
interlocking (only one door is opened).
Cooperation with security system
A security signal can be sent to a security system
connected by starting of security operation.
Entry management information and Image
recording function are uniformly managed by
cooperation with Monitoring camera system.
Cooperation with Monitoring Camera
History viewing and search function
History is displayed with a PC in real time
basis and past history is easily listed up by a
search function.
Door locking/unlocking with
With connection to an external device such as
a fire alarm, doors are unlocked/locked when
an emergency signal is input.
Administrator operation authority
Operation authority is set for
each administrator individually.
Standard Function
Payroll accounting and attendance
Data are sent to an external system for accurate
management of even a complicated shift-
working arrangement.
CSV format files are sent to external systems.
Since existing data can be imported, a large
volume of information is collectively registered.
Company staff directory/shift-work schedule/
Import of externally created CSV format files Cooperation with another system
External Signal
restricting function
management Calendar
A scalable system is
desired that can be
expanded from a single
site.
Who has entered/exited
through which door, and
when it is?
Accurate attendance
management of the
company staff is
desired.
Preventing theft of
important documents
and lead out of
information
Introduction of
important documents
and leak out of
information
Enhancement of the
security by preventing
unauthorized intrusion of an
outsider
History of when and who has
entered/exited is checked with a PC in
real time.
・・・・Example of Security Measures
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
Since the wiring work is quite simple
and inexpensive, the introduction is
ready at any time. Expansion is
available flexibly.
Users and utility time are
meticulously assigned, consequently
outsiders cannot enter the room, and
theft and information leakage are
prevented.
Targeted Challenges Yes, FDS Entry Management System can
solve the Challenges
2
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Example of Configuration-1
Example of Small System Configuration((((ACS1)
3
Hub
Ethernet
ACU
Hub
Ethernet
RS-485
RS-485
RS-232C/485
CardCard
DC #1
DC #2
DC #60
In a small business institution, a system can be configured with a management PC, one ACU 1, and a required number of DCs.
Isolated Network
Electric
Lock
Electric
Lock
Electric
LockManagement
PC
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
Example of Mid-size System Configuration ((((ACS2222)
4
In a mid-size business institution, an ACS1 system is installed in each floor and the ACS1 systems are connected to each other with an SC.
SC
1111st Floor
DC #1741
30303030th Floor
Ethernet
HubHub
ACU #30
Ethernet
DC #1800
HubRS-485 RS-232C/485
CardCard
Ethernet
DC #60
HubRS-232C/485
CardCard
RS-485
DC #1
ACU #1
Isolated network
Management PC#1
Management
PC#20
Electric
Lock
Electric
Lock
Electric
Lock
Electric
Lock
・・・・Example of Configuration-2
WAN
SC#1
SC#2
SC#512
SC#3
SC#4
ACS2 system
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
Example of Large System Configuration((((ACS3333)
5
For multiple locations, each location has an ACS2 system connected by SC and WAN connection
・・・・Example of Configuration-3
ACS2 system
ACS2 system
ACS2 system
ACS2 system
Items ACS1system ACS2/3 system
Number of controllable doors 60 1800
Number of registered users 50000 50000
User classes 4 kinds of 999 classes 4 kinds of 999 classes
User codes 10 digits of alphanumeric
characters
10 digits of alphanumeric
characters
Number of scheduled items 2000 2000
Date types of schedule 14 14
Time zone in schedule 8 time zones per day 8 time zones per day
Number of registered administrator 10 100
Administrator code 10 digits of alphanumeric
characters
10 digits of alphanumeric
characters
Number of connectable 2 100
Number of preserved event logs
(ACU)
50000 50000
Preservation period of event logs
(SC/PC)
2 years 2years
Number of connectable ACUs 1 30
・・・・Specifications
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd 6
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
FDV-1000 FDE-1010
・・・・Products for Entry management system
System Controller((((SC) ) ) )
When the number of doors is 60 or more, individual control for every floor is necessary,
or control through a WAN s necessary, a system controller is required.
FDE - 900
Access Control Unit((((ACU) ) ) )
FDE - 800
An Access control unit is required for controlling a plurality of doors with group
control method and can control up to 60 doors.
Door Controller((((DC) ) ) )
For managing entry/exit of
a door without using a vein
authentication reader, this
control unit is required.
This door controller(DC)is used in
combination with an RF reader.
FDE - 100
RF Reader RF Reader of Mifare RF Reader for Felica
FDE-FRF FDE-MURF10
A door controller (DC) is not necessary for this reader.
An RF reader supporting Mifare is prepared.
An RF reader supporting Felica cards (EI-Wise) is
available as an option (sold separately).
Vein Authentication + RF Reader + Key Board
RF Reader with Door Controller
RF Reader + Key Board
Key board for operation and password input including an LCD
7
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Function of Each Device
Management PC
Retention of setting and
registration information
Retention of History in case
of not connected with SC
Control
Display of
authentication result
Authentication data
History
Retention of setting and
registration information
Retention of History
Vein Data
Setting, registration,
and Viewing
Authentication data input
・Security device ・Fire alarm Electric lock
ACU
SC
Management Software facilitates
setting of new user registration,
modification of a registered
content, history management,
antipassback and escort function,
etc.
・Alarming device ・Unlocking switch
Administrator
User
Vein Database Application
8
Setting and registration
Information
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Procedure of Authentication
User code
Vein Authentication
Personal
Identification
Retention of vein and
card data
Authentication
Control
Display of authentication
result
Authentication data Authentication result
Authentication data input
Card Authentication
Retention of card data
user
Electric
lock
DCU
ACUACU
Reader
9
Authentication
data
user
Authentication data input
Control
Electric
lock
Authentication
Authentication result
Display of authentication
result
※1 One unlock switch is necessary for every door that is unlocked by an unlocking switch.※2 Dedicated wiring is necessary for each of DCUs installed to doors that are unlocked by
unlocking switches.※3 This function is available for only electric switches without thumb turn covers. ※4 If “Permission” is not set, “Unauthorized door open warning” is issued. ※5 This function is available for only readers including numerical key pads. ※6 This function is available for only antipanic type electric locks.
�By connecting an external switch, a door can be unlocked by pressing the switch without authentication.
(※※※※1) (※※※※2)There are other functions to unlock the door without authentication.
Remote
Locking/UnlockingThe door is
locked/unlocked by an
operation from the
management PC.
Thumb Turn
By turning the key of the
door, it is
unlocked.(※3)(※4)
By means of a function of
an electric lock, one side of
the door is unlocked by
turning a knob.(※6)
Antipanic
The door is unlocked
with input of a password
for unlocking the
door.(※5)
Pass Word
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Unlocking by other than Authentication
DCU Unlocking switch
Special wiring for
unlocking switch
例.ドアの退室側は認証する必要がないとき Eg., in case that authentication is not necessary
for exit side of the door
10
Door unlocking time, etc. after unlock by pressing the switch is
the case as the case of ordinary authentication.
※1 Dedicated wiring between DCUs respectively installed to the two doors is necessary. ※2 “Unlocking by unlocking switch”, “cooperation with security device”, and “connection with alarm device” are not implemented for doors that use interlocking function.※3 Available only in a reader including an LCD
� With interlocking, when one of two doors in a room is operated, the other door is not allowed to open. (※※※※1)(※※※※2)
・When one door is under “authentication process”, “just being unlocked”, or “opened”, the other door indicates “Interlocked”
(※3) and does not accept authentication request.
・During interlocking, unlocking is not conducted by not only authentication but also operation other than authentication
including remote operation and switch operation.
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Interlocking
Room2
Vein authentication
device
Room3Room1
Interlocking Dedicated Wiring
Rejection of
authentication request,
door locked
Under authentication
process, just being
unlocked, or opened
11
Vein authentication
device
※1 Dedicated wiring is necessary for each of authentication devices installed to doors to be cooperated.※2 In the doors that implement security start and release operations, “interlocking function” and “connection to security devices” are not available. ※3 In a door that shifts to a secured state in connection with start of security operation, ‘interlocking function” and “unlocking by unlocking switch” are not available.※4 When security operation is started by an authentication device, “checking of saying user” and “lock out checking” are not conducted. ※5 Only when the authentication device is energized, cooperation with a fire alarm is implemented. In case of power failure, the state of the lock is dependent on the
function of the electric lock.※6 In an authentication device without dedicated wiring, ordinary operation (authentication to unlock) is implemented in case of fire break out.
� By cooperation with a security device, the authentication device can be secured (Door is locked,
authentication request is rejected.)(※※※※1)(※※※※2) (※※※※3) (※※※※4)
� By cooperation with a fire alarm, the door lock can be unlocked when a fire breads out. (※※※※1)(※※※※5) (※※※※6)
� For both the cases, negotiation with managing companies of the other party devices.
� Be sure to consult us beforehand.
� There are cases requiring additional expenses.
・・・・Cooperation with Security Device
LANLAN
Electric lock
ACU
Managing PC
Entry/exit managing software
Entry side finger vein authentication device
12
Exit side finger vein authentication device
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
※1 At threatened authentication alarm, the alarm sound is not emitted from the authentication device. ※2 Be sure to consult us beforehand. ※3 There are cases requiring additional expenses. ※4 Dedicated wiring is necessary for each of doors that issue alarms. ※5 “Cooperation with a security device” and “Interlocking” are not implemented for doors that output alarms.
※6 One unit of separately sold “Tamper switch”is required for one authentication device.
� Unauthorized Door Open Warning
When the door is opened illicitly, this warning is issued.
� Door Open WarningWhen the door is kept opened for a prescribed period or more, this warning is issued.
� Threatened Authentication AlarmWhen a person who is forced to make an unwanted authentication performs the threatened authentication, this alarm is issued.
� Tamper AlarmWhen an authentication device is illicitly disassembled, this alarm is issued.(※6)
When an alarm is generate, an alarm sound is issued from an authentication device and alarm
issue log is recorded.(※※※※1)
・ When an alarm is generated, an alarm signal may be outputted to the outside.(※2) (※3) (※4) (※5)
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Alarm
An example of event log screen
13
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・User Registration, Schedule
① Registration of user
information↓② Registration of veins
and cards
Example of monitor
Hourly operation of each door
can be set from six kinds of
operations.
Up to 2,000 patterns of a user
schedule in a user available
time periods are registered.①Open ②Close ③Entry④Exit ⑤Entry/Exit ⑥Toggle
Calendar settings of holidays,
an anniversary of foundation,
summer holiday, etc. are
implemented.
Schedule
User Registration
14
Example of monitor
A user required to be escorted by someone
to enter can be registered.
Escort Function
Eg. A user such as a visitor or trainee is made not allowed
to enter inside the building by this function.
Eg. This function is used for a room in which the number of containable
people is fixed.
This function controls the number of staying
users in a room.
Number of Staying User
Control Function
A door that restricts its usage
according to the gender can be set.
Gender Restriction Function
Eg. Doors of a Locker room, Bathing facility, etc.
can be set.
By setting usage term of a user beforehand, the
user is not authenticated except in the usage period.
User Usage Term Restriction Function
Eg. When usage term is predetermined such as for a temporary staff
or a student, this function is used.
A user who has not followed a predetermined
sequence is not allowed to enter a further
inner room.
Route Restriction Function
Eg. A user who has not entered the room through a
predetermined door is not allowed to enter a further
inner area.
A user without an entry log is not
allowed to exit, and a user without an exit
log is not allowed to enter, thus a user is
urged to surely conduct authentication at
entry/exit.
Antipassback Function
Eg. For preventing tailgating and borrowing/lending authentication data,
and checking of staying users, this function is used.
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Usage Restriction Function
15
A person and a room where
the person is present are
displayed in real time.
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Monitoring, History
The retrieval and back up are conducted by referring
to system logs preserved in a PC. Logs preserved in
the PC is automatically deleted after two years has
elapsed.
A CSV file opened by
Excel is shown.
History
Monitoring
An event (history) is retrieved by designating a
condition, and the retrieval result and monthly
events can be backed up as CSV files.
Operation state of
each door is
displayed in real time.
An event occurred in the
system is displayed in real
time.
16
Setting information and registration information are
collectively stored in a back up file of jip file format.
A piece of information to be restored is selected from the
backed up information, thus restoration can be made.
All Rights Reserved, Copyright(C)2013-2015,FIT Design System Co.,Ltd
・・・・Backup & Restore, Administrator Authority
Up to ten codes and pass words to log in to an application can be registered.
Operation rights and usage terms can be set for each of registered codes.
System administrator → All the operations are allowed.
Reception →Only viewing of stay state information and
user information is allowed.
Security staff → Viewing of event status and remote
locking/unlocking are allowed.
User registration dedicated terminals →Registration of user
information and card, and registration/edition of vein can be
implemented.
Administrator Authority
Backup & Restore
17