Call us today for a free consultation Tel: +60 19 337 8283

CONTACTLESS CARDS

There are more than few card technologies in use today. All cards may look the same but in reality they are not.

  • Bar code cards
  • Mag stripe cards
  • Wiegand cards
  • 125 kHz RFID or Proximity
  • 13.56 MHz RFID cards or Mifare

First two card should be abandoned if already not out of use. They provide no or marginal protection over copying. Wiegand cards have tiny wires embedded inside the card body. This technology is still used but really going out and may not be available soon.

Real solution are last 2 technologies that are essentially contactless. Those cards do not require physical contact with reader in order to be recognized. Result is quick operation; readers last almost forever and could be used in harsh environment. Those cards are also quite hard to clone.

 

ABOUT CARD NUMBERS

Every card access credential (card, tag, keychain tag) has chip embedded inside. Chip is programmed with unique serial numbers and FC (Facility Code). When issuing card, operator of the system assigns specific card number to the person. There may be also extra 3 digit code called FC (Facility Code) or SC (Site Code) programmed in the cards.

26 bit cards range is 00001 to 65535 maximum. 37 bit cards have maximum number of cards in millions. FC range for 26 bit cards is 001 to 255. So back to every day practice, it is possible, for larger users to get duplicate card numbers. As such 37 bit cards or Mifare are more secure even though the equipment is slightly more expensive.

 

WHY YOU NEED ELECTRONIC ACCESS CONTROL?

Main purpose of access control is to keep doors locked so let’s start from keys and locks.

KEYS AND LOCKS

  • Keys are easily duplicated.
  • Keys can not control when (time and days) personnel are valid.
  • Keys do not provide you with any knowledge or information of when and where someone has gained access.
  • Changing locks is expensive. They should be replaced when: keys are lost, personnel turnover, mechanical problems.
  • Changing locks and keys takes time, leaves your facility and assets vunerable.
  • Locks can be compromised.
  • Difficult to manage key distribution and control.
  • No integration capabilities: integration to CCTV, Badging/Video data base, to alarm monitoring.
  • Common number known by all or almost all employees
  • No identification or knowledge of when or where someone has gained access.
  • No control of when (time and day) personnel have access.
  • Difficult to immediately delete and inform personnel of code changes.
  • No integration capabilities.
  • Guard can only be at one place at one time.
  • Guard can be absent or late.
  • Always subject to human mistakes and compromises.
  • Posted to protect entrances not necessarily internal theft.
  • Records can be inaccurate or difficult to read (who, when, where), if records are kept at all.
  • A guard service is very expensive.

 

KEYPAD  / COMBINATION LOCKS

SECURITY OFFICERS / GUARDS

ADVANTAGES OF ELECTRONIC ACCESS CONTROL

Electronic access control is computerized control over entry to any area that can be secured with lock and key. Entry is only allowed to authorized people at authorized times. All activity is electronically recorded for accurate and quick reporting purposes.

An access control system electronically safeguards your facility without utilizing keys or guards. What will card access do for you?

  • Increases security.
  • Increases accountability.
  • Increases facility information.
  • Reduces operating cost.
  • Reduces liability.
  • Reduces risk.
  • Additional identification.
  • Access multiple buildings, locations, computers or other places using same card.
  • See and react to events happening in real time.
  • See and use activity log.

 

OUR APPROACH & BENEFITS

LANSource’s  security management integrates access control, video surveillance and alarm monitoring with information technology to provide you with peace of mind. We offer systems to meet requirements of businesses of all sizes, from simple systems for just a few doors to systems with enterprise requirements. All of our systems are designed to meet your needs to:

  • Protect your assets with high-level building and property security
  • Protect your employees from unwelcome intruders
  • Restrict unauthorized access to the places and during the times you specify
  • Provide an audit trail of who is accessing your facility and when
  • Eliminate problems with mechanical key and lock systems through electronic access

 

WHY RESTRICT TO ONLY DOORS ACCESS

Time Attendance

With an integrated Time Attendance module in the access control software it  makes easy work of the tedious tasks involved with monitoring employee time and attendance. The Time Attendance software helps you control labour costs, minimize compliance risk, and improve workforce productivity.

The automated time and attendance module reduce labour costs by enforcing pay and work rules – consistently and accurately – across the organization. Labour-intensive timecard tracking, data entry, and approval processing are simplified. And that reduces the administrative time associated with attendance exceptions and employee inquiries — all while minimizing overpayments and compliance risk.

Visitor Management

Through Visitor Management services, the system is able to accurately, effectively, and surreptitiously track the usage of a public building or site. In many organizations, visitors entering a ‘secure’ building, facility or campus are able to gain access by simply writing their name in a visitor log book. With today’s security concerns, this outdated practice lacks security and yields data that is incomplete, often difficult to read, and always impossible to analyze.  Moreover, confidential information about recent visitors is readily available to all who flip through the pages.

In contrast, a visitor management system can gather increasing amounts of information and record facility usage by specific visitor and provide documentation of the visitor’s whereabouts. Because a visitor management system provides a record of building use, these systems are frequently used to complement building security and access control systems.

 

Our Expertise

- Structured Cabling Installation
- Data Cabling Installation
- Voice Cabling Installation
- Fibre Optic Cabling Installation
- Coaxial Cabling Installation
- Surveillance System Installation
- Access Control Installation
- Data Center
- System Design & Consulting
- Site Surveys
- Project Management
- System Relocation
- Maintenance
- System Disposal
- Nationwide Roll-Out