BiometricAccessControl Training
BiometricAccessControl Training
Training
Course # : 14-4156
Content
A. Objectives 5 mins
B. History of EAC- 10 mins
C. Electronic Access Control in Todays World 20 mins
D. Essential Components of Electronic Access Control 20 mins
E. What are biometrics and how do they enhance security- 20 mins
F. What benefits do they offer that conventional EAC does not-10 mins
G. Break- 20 mins
H. Review biometric devices and relationship to control panels 20 mins
I. Stand Alone Biometric Readers 20 mins
J. Address concerns about privacy/encryption in biometric systems 5 mins
K. Benefits / comparison of IP vs. 485 10 mins
L. Comparison client/server application vs. browser based 10 mins
M. Advanced Biometrics or enhancement to traditional systems.- 10 mins
Objectives
Give an overview of essential electronic access control
(EAC) equipment, concepts and techniques.
Introduction of Biometric Technologies- Fingerprint ,
Facial, Voice, Speech, Iris and Retina recognition.
Use of Biometric technologies in Access Control
Solutions
Integration of IP Cameras with Access Control
Future of Access Control
History
Visitors into
Employees Contractors Suppliers their facilities
Credentials for authorized access included:
Keys
PIN (personal identification number)
Plastic access card
{123555}
Electronic Access Control in Todays World
In our current economy, no matter what your budget is, companies still
have a need to secure and protect their assets. In today's economic
climate, businesses are looking for cost effective and reliable methods
of securing their facilities and keeping their employees safe by using
various locking hardware and accessories.
Essential Components of Electronic Access Control
Readers
Locks
Access Control Panel
Credentials
Advanced Electronic Access Control of Today
Finger Vein
Palm Vein
Palm/Finger Vein Authentication
Biometric devices, such as vein scanners, consist of:
Typical Installation
Wiegand Data Format
Ground Loops
Faulty or incorrect Cabling
Poor terminations of the cables
Placement of devices/readers
Improper enrollment of biometric credentials
Improper configuration of the software
Network parameter configuration
Stand Alone Readers with Biometric Authentication
Stand Alone Wiring
Typical Installation
Stand Alone Wiring
Expanded Installation
IP Based vs RS485