Skip to content

Overview

Introduiction

SecurOS Access Control System (ACS) is designed to ensure the security of tenants, monitor and control employee access to premices or resources. It regulates the entry of visitors and vehicles to the protected areas.

It may use various forms of verification, such as cards, , biometric scanners, face recognition modules to grant or deny access.

ACS includes the following functional groups:

  • Hardware
  • Database
  • System Configuration
  • Alarms Configuration
  • System Settings
  • Cardholders Profiles
  • Maps
  • Notifications
  • Reports

Let’s take a brief look.

Hardware

This is a group of physical components including:

  • Tenants
  • Device Gateways
  • Controllers
  • Card formats (associated with controllers)
  • Inputs and Outputs
  • Card Readers
  • Doors, Elevators, Floors,

Database

There are three database schemas engaged in the operations:

  • ACS system DB, storing all physical and logical units configuration and current status
  • Notification DB, receiving all events data
  • Master DB, maintaining customer-specific information

Database operations:

  • backup
  • restore
  • cardholders export
  • cardholders import

System Configuration

Defines settings, parameters, permissions and access rules

Access rules determine who can access what, when, and how.

Configuration section include:

  • Holidays
  • Time Periods
  • Access Levels
  • Device Groups
  • Agents
  • Agent levels
  • Current Threat levels
  • Threat Levels Settings
  • Alarm Cards
  • Event triggers

Alarms Configuration

The ACS provides alarms monitoring and acknowledgement:

  • Alarm definitions
  • Routing templates
  • Acknowledgements Templates
  • Acknowlegment comments
  • Alarm messages

Settings

Settings are necessary to configure the operations:

  • System settings (customer name, session timeout, time zone)
  • SMTP settings
  • Operator settings (GUI language)
  • Notification archiving (parameters and schedule)
  • Badging (upload and update templates)
  • Product License

Cardholders

Each cardholder profile is stored in the database and includes the folowing entries:

  • Name
  • Personal information
  • Photo
  • Access cards attributes (up to 3 cards total)
  • Attachment documents list
  • Associated visitors list

Maps

Maps help to monitor the status of controllers, doors, floors, cameras and other equipment in real time. It allows operators to visually monitor and manage security by providing a top-down view of components disposition and their current status.

This section includes:

  • Device map
  • Active agents
  • Floor maps
  • Visitor map

Notifications

  • Notification view is designed to filter events by certain criteria
  • Notification archiving assists in events backup according to a certain schedule.

Reports

Reports Infrastructure supports running and maintaining reports. New report templates may be added if necessary.