Chapter I Overview of EAC

Defining a Personal Access Control

Parts of a Personal Access Control
• Networks
• panels
• Output Elements
• RTE (buttons, sensors, panic bars)
• Edging Power
• Edging Magnéticas
• Talanqueras
• Turnstiles / Turnstiles
• Software
• Communication Protocols

Chapter II Readers and Cards

Bar code (Visible and IR)
magnetic stripe
Barium Ferrite
RFID (Proximity)
Smartcard (Chip)

Chapter III Biometrics

Definition of biometrics
Biometrics classes
• Iris - Retina
• Footprint
• Hand Geometry
• Geometry Face
• Speech recognition
• New Technologies (vascular)

Chapter IV Software

Defining a CAD Software
Software features EAC
• Schedules
• Areas
• Employees
• Cards
• released
• Reports
• Maps
• carnetizacion
• Interfaces with other systems (CCTV, alarms)
Visitor Software

Chapter V Applications

• Time control
• Asset Control (integration with CCTV and alarms)
• Control Rounds
• Personnel Location
• Locks

Chapter VI Integration with other systems

• Alarms
• Fire Systems

Chapter VII Access Control Element (support requisitions)

• X-rays
• Gamma rays
• Terahertz
• Metal detectors
• detectors of explosives and narcotics.
• Chair BOSS (Body Orifice Security Scanner)

Chapter VIII Systems VEA

• Asset detectors (associated with EAC)

Author: Latin Press


article thumbnailSony The HAW-S series is the first NVR compatible Sony 4K device that can record and play in 4K resolution, for monitoring systems of ...
article thumbnailSeco-Larm The new multifunctional timer and counter SA-025MQ includes operation with low current consumption, seven modes easily ...
article thumbnailJohnson Controls The new 8.0 version of Kantech's EntraPass now adds support for the American Dynamics NVR network recorders through the app ...
article thumbnailST Electronics The AgilFence perimeter intrusion detection system developed for perimeter fences offers reliable detection and ...
article thumbnailAxis Communications The new AXIS Companion Dome Mini LE camera is designed to meet the needs of video surveillance in small businesses ....
article thumbnailU.S. For the first time in its history, the WINGS Summit will have online registration open to the public to visit the commercial exhibition and ...
article thumbnailInternational. Information technology (IT) managers are more likely to catch cybercriminals on servers and networks ...
article thumbnailU.S. Recent reports from Business Insider, CNN Business and many other publications have highlighted the undisclosed on-board microphone ...
article thumbnailInternational. ASIS International launched the Selection and Training Guide for Private Security Officers (PSO) of ASIS (ASIS PSO-2019) that ...
article thumbnailInternational. The World Wide Web Consortium (W3C) has just approved the web authentication API, also known as the WebAuthn standard, which is ...