• Call Us: +971 42954764
  • Mail us: sales@time24tech.com

Service

Time, Access Management Systems

Selectively restrict access or authorization to a enter a place or consume resources. Using an access control system at business place can increase security while managing the staff flow. Access control systems facilitate the secure management of your building.

Why access control systems?

Staff protection

Provides a secure working environment

Reduces unauthorized access restrictions and theft

Provides Electronic Visitor Logging History & Reports – every access is logged & recorded. Provides Muster Reports which allow you to see who is where in your building in case of an emergency

Access to authorized persons made easy. They can use cards, tags, fingerprints and even mobile phones instead of keys to enter.

Customize individual schedules

Provides easy remote access

Energy cost reduction and environmental protection can be attained by integrating Access control systems with building management systems by which electric equipment in unused spaces can be turned off

Components of ACS

Control panel / Controller

An access-controlled entry - door/turnstile/parking gate/elevator/other physical barrier

Readers at entry / exit or both as per requirement

Locking hardware - electric door strikes/electromagnetic locks

A magnetic door switch

Request-to-exit (RTE) devices

Types of access control technologies

Various types of access control technologies used by TTFT

Access Technology Architectures

Internet of Things (IoT) access control: Enables IP-based communication between all components of the access control technology. These components which are smart devices that support IP use the Internet to establish communication with each other

Physical Access Control System (PACS): This technology used in government and security-related fields is based on Personal Information Card Verification (PIV) cards and card readers which involves a two-step verification process.

Communications Technologies

Radio Frequency Identification (RFID) access control: When approaching the reader device, electromagnetic waves are generated and captured to read information stored on a tag linked to the carrier and allow / deny access

Near Field Communication (NFC) access control: Near Field Communication(NFC) on mobile phones is expected to be a safe and effective access control solution. With NFC, users only need to wave their mobile phone at the reader to enter a lab, office, or other protected areas

Bluetooth Access Control (BAC) access control: This uses the function of a Bluetooth-enabled device by which the data transmitted between two devices through the frequency hopping spread spectrum radio interface, that operates in the ISM frequency band

Wireless access control technology: Bluetooth, NFC, RFID, mobile, and others comes under this category of access control technologies.

Authentication Technologies

Biometric access control technology: The biometric system uses fingerprints instead of a card system to access. It not only allows entry, but also provides data on staff entry. These systems can be integrated with the attendance and payroll software to automatically record the information generated by the attendance system.

Proximity card access control technology: Proximity card-based access control systems are widely used in computer rooms, businesses, financial institutions, offices, labs and factories where the employees are given access based on proximity cards. The readers which are installed at each entry and exit point can be connected to the electronic lock through the relay module. The card reader that accepts the card will disable the lock and the Configuration, Alarms, Door settings can be done using the system software. Larger buildings use integrated access control system using networking of Multiple card readers.

Mobile Access Control (MAC): By installing an application that uses wireless technology to communicate, the mobile device becomes an electronic key which can be used to control the entire access control system of a specific area/building

Two Factor Authentication in access control: This uses a combination of two distinct components to verify the authenticity of the claimed identity. 2FA is a type of multi-factor authentication which typically work with an additional layer of security, unlike single-factor authentication, which relies on passwords, improves security and makes it difficult for an attacker to break in/access sensitive data.

Palm reader: Scans the palm of a person’s hand to allow access.

Password Protection: Controls access through protected password consisting of a combination of set of letters, numbers, and symbols.

Voice Recognition: Recognizes the person’s unique voice pattern to give access

Retina Scan: Awards access by scanning and identifying a person’s eye/retina.

DNA Scan: Futuristic technology/system, requires sample of saliva or blood to check for and verify the person’s DNA

Key Card ACS: System uses a card with a magnetic/computer chip, swiped through a card reader.

Infrastructure Technologies

Internet switches for access technology

CAT6 Cable access control technology: Such ACS uses CAT6 cables to improve performance, speed and reliability.

Power over Ethernet (PoE) access control: It is a cost-effective system which uses cables to carry data/power signals across access control components such as IP cameras, telephones, access controllers, routers, access points, and other items.

IP based Access Control: It includes an electronic access controller, designed to control access to restricted areas and accurately identify users. Such a controller can support multiple access control readers that reads a person’s card number or PIN code and send it to the main server via Ethernet.