How to choose a biometric ACS. Selection and operation parameters.

kak vibrat biometricheskuyu skud parametri vibora i ekspl

How to choose a biometric ACS. Selection and operation parameters.

How to choose a biometric ACS. Selection and operation parameters.

How to choose a biometric ACS. Selection and operation parameters

In order for the ACS to meet all customer requirements and meet the set goal, first of all, it is necessary to formulate the task. Answers to a number of questions that the customer must ask will help to choose the optimal solution. We will try to list the main ones.

1. Why did you choose a biometric ACS?
If the client says that the uniqueness of the identifier is important, which cannot be transferred, lost, forgotten or stolen, then most likely he made the right choice.

2. What kind of biometrics does the customer prefer?
Among the many biometric systems, there are several that are available for installation and use not at military and industrial facilities, but in everyday life. Among them are systems based on fingerprinting, iris and retina reading, and facial geometry. What to choose depends on the purpose of the ACS and the project budget.

3. What does the customer expect from the system? What are the requirements for functionality?
Most often, an ACS is needed that can keep an event log, record working hours, control actuators (lock, turnstile, elevator, etc.), have different time windows for different types of personnel, be easy to maintain and have a low cost of ownership.

 

4. How many access points need to be equipped with biometrics, and what access mode should be set?
Let's say a client wants to install an ACS on the front door. Just to restrict access. In this case, everything is simple — a local version of the product will be enough. But often it is necessary to make a two-way passage mode (for example — an entrance door, a line of turnstiles or booths), as well as several points inside the building (warehouse, meeting room, management offices, etc.). In this case, the equipment configuration can vary greatly. Consultation from the manufacturer will help to orient you.

5.  What number of identifiers should be used to pass personnel at each entry point?
If the system uses one identifier, the question is rather rhetorical. For example, when ear geometry is used, there will be a maximum of two identifiers. But if these are fingerprints, it is possible to use up to 10 identifiers. This can be useful when it is necessary to assign different types of access at different points of passage. For example, to pass through point one, it is necessary to “present” fingerprint No. 1, and at the second point – fingerprint No. 2. It is also possible that a person’s fingerprints are difficult to read. In this case, he needs to register several fingers. If the object is an enterprise that is dangerous to life and health (processing industry, production, in a word, a place where there is a risk of damaging the identifier), it is recommended to register fingers from different hands.

6. What actuator will restrict access?
In principle, any electronic equipment will do. Turnstiles, gates at checkpoints, magnetic locks, latches, electric motor and electromechanical locks on entrance and interior doors. If possible (not all readers have this), then you can embed the scanner in the door frame, turnstile or wall. Radio cylinders can be used in ready-made doors with mechanical locks, which simplifies installation.

7. Availability of a backup power source.
If it is not installed, an alternative route for passage or unlocking the locking mechanism must be thought out.

8. Possibility of using previously laid networks.
Laying communications even in a small office can significantly affect the cost of the project and the execution time. If it is possible to use existing communications, for example, for low-current networks, this will significantly simplify the project. The ability to use an internal Ethernet network to connect network devices is also highly desirable. In addition, there are readers that are installed directly in the junction box.

9. The ability to combine branches into a network.
Communication between branches is important for large companies. This is very convenient for centralized management and collection of information (for example, bank branches, a network of communication stores, etc.)!

10. Security workplace. Doorman, anti-panic functions.
The person sitting at the checkpoint, if there is one, should be able to see not only general information about the employee (full name or employee ID), but also additional information — a photo, phone number, floor plan, etc. In addition, it will be useful for the system to have such functions as the «doorman» function (remote opening, for example, of a turnstile), the «panic» function (when an authorized employee can open all doors in the premises), etc.

11. Software capabilities.
Biometric ACS is ideal for implementing the timekeeping function. After all, the staff cannot hand over cards. Such an option must be present. Setting up time windows, displaying data on the number of employees inside the premises, the ability to customize the system «for yourself», with the assignment of actions and events within the system — are highly desirable.

12. The ability to expand the system.
If you are installing a local system that operates autonomously, everything is simple. But let's say your client expands their staff — what to do in this case? There should be a spare capacity in biometric readers (the number of templates in the device memory or on the database server). Even if it is not enough, it is useful to have the ability to expand the hardware with a minimum amount of equipment replacement or installation of additional readers.

13. System administration. Cost of ownership. Payback time.
After installing the ACS, it is necessary to make sure that its operation is very simple, while the functionality meets the initially set task. In the case of biometric identifiers, the client will not need to monitor stolen cards, issue new ones after they are lost or expire. If the software is flexible enough, then it will be enough to set up the system once, so that later you can interfere with its normal operation mode only to ensure guest access and to enter new data, delete old data. When introducing time tracking, the system can pay for itself in less than a year!

14. Alternative options for providing access.
What should employees do if their identifier (palm, fingers, face image, iris) is not recognized by the system? In this case, the efficiency of the ACS can be increased if the readers will recognize an additional identifier — an RFID card, a code dialer, etc. This will make it possible, firstly, to ensure the security of passage for such employees, secondly, to have the ability to set different passage modes (for example: finger + card at night), and thirdly, to ensure the possibility of guest passage.

15. Equipment installation
Installation of biometric systems is not fundamentally different from other ACS. The same interfaces are used: RS-485, RS-232, Ethernet, there are readers, controllers. Here it is also important to correctly configure the system, making all connections reliably and efficiently. Integration into third-party systems is possible.
Most biometric manufacturers are suppliers of complete ACS, so they most often work according to their own data transfer protocol. But what if there is a need, for example, to partially equip an existing ACS with biometric readers? In this case, it will be useful to have hardware or software for their communication with each other.

What else should you pay attention to?
If the readers are to be installed outdoors, care must be taken to ensure compatibility of operating temperatures and moisture protection parameters.
If the protected premises are not under video control, there is a risk of unauthorized manipulation of the equipment. Let's assume that the ID reader and the control unit are on different sides of the protected object. In this case, there is no risk. But if all the devices are in one housing, then the intruder will be able to gain access by closing the contacts of the control relay.

At the place where personnel pass through the checkpoints, it is necessary to calculate the throughput capacity. If a large number of personnel must pass through the enterprise at the beginning of the shift, then one entry point will clearly not be enough.

The throughput capacity is affected by the ratio of the indicators of any biometric system — FAR/FRR (which are dependent values)
FAR — the probability of admitting «another»
FRR — the probability of not admitting «ours» (with the correct presentation of the identifier)
It is the FRR that affects the speed of personnel passage, and when choosing a biometric system, you need to pay attention to this indicator.

Stable and correct operation of the system largely depends on whether the personnel can correctly present the identifier! If this does not happen, then any system will cause complaints in operation, and, accordingly, customer dissatisfaction. Therefore, it is very important that all employees of the organization, after installing a biometric system, undergo mandatory training, training on its use!

Biometric ACS is designed to simplify the access control procedure and increase security. It must be convenient! In order not to have to reinstall one system on another, and the end client is satisfied, when communicating with manufacturers of biometric systems, clarify and pay attention to all the above parameters. In this case, you will get the expected result, and the client will not be disappointed.

    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять