Access Control Solution for Transportation and Logistics

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

1 Re-Introduction to the Nexgen eration of eCylinders Products ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user.
Knells Door and Hardware SINCE 1906 Electronic Access Control Presentation.
GCSE ICT Networks & Security..
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Mobile technologies Bunch of disparate technologies Many cases of successful use in firms (000s) Costly to implement because mostly once off bespoke development.
Easy to use Ability to attach policies/procedures to call types Ability to schedule calls in advance Officer safety alerts Robust search capabilities.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Welcome to the CardSaver VoIP Billing & Call Management Demonstration © 2004, Parwan Electronics Corporation.
Students in Temporary Housing (STH) ATS Training Manual Office of Youth Development and School-Community Services March 2004.
LogTag Training January 2015
G Dealer Security Have you ever experienced? Running around town to collect keys from owners to open the properties listed with you? Worried about leaving.
Powerpoint Templates Page 1 Powerpoint Templates Page 2 Something you own that has value There can be assets that gain value over time…. What is an Asset?
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
SiteMate For industrial (e.g. power stations) confined space automated entry management One product range – infinite applications!
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Fingerprint Time Attendance & Access Control System
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Access Control Line Up Samsung Techwin Europe Ltd.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Elliteknics AXXESS-E Access Control Solution. Introduction Elliteknics is a company that strives for cutting edge technology solutions, a well- established.
June 2006 SD Electroniks Products Catalog
Total Solution Acsys Technologies Company Ltd EN1303(G5)
Gateplus Time Attendance and Access Control System.
University of Massachusetts Amherst InteLock TM Advisor: Professor Ganz Team: Emmanuel Seguin Christos Tsiokos Josh Coffin Anh-Kiet Huynh Remote Access.
University of Michigan Administrative Information Services 2006 Merit Information HRMS Unit Liaison Meeting May 19, 2006.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Use of RFID in Shipments between Shore Base Terminals and Oil Platforms in the Gulf of Mexico Yasemin Aksoy Tulane Consortium for Supply Chain Management.
© 2015 Vermason Ltd. SmartLog V5 ™ with Turnstile.
Agriculture.co.ke - outsourcing.co.ke - architecture.co.ke SWISSKENKO LTD Elgon View Estate Tilil Crescent Plateau Road P.O.Box Eldoret, Kenya.
F IRST W EEK Administration Guide
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
Introduction to our On-Line Self Service Center at
what is contacts? In-contacts is an online contacts database designed from the ground up to be compatible with modern business needs.
PIN-on-Card New contact-less smart card with integrated PIN pad for secure user verification at unparalleled cost effectiveness.
Computing at HSSOE Lisa Preble Instructional Lab Manager & Faculty computer support contact
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Possible Queries Queries For All User Access: –Query 1: The purpose of this query is to allow users to view all the package details for a given tracking.
DIWICON AURA Services Szilárd SZAKÁCS Product Manager, DIWICON AURA CASON Engineering Plc. Hungary 2030 Érd, Velencei út. 37.
©Copyright 2015 SmartLog V5 ™ with Turnstile. SmartLog V5™ with Turnstile Charleswater.co.uk The patented* EMIT SmartLog V5™ is designed for fast, frequent,
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Internet Advancement Ore-Ida Council Boy Scouts of America.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Computer Security By Duncan Hall.
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
Acsys System Introduction Since there is no power in the locks. We can offer Euro – Din cylinders and padlocks in various sizes AcsysLocks CANNOT be BUMPED.
( ) 1 Chapter # 8 How Data is stored DATABASE.
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
Visitor Management System
Configure the intercom IP
November 2016.
Welcome to the CardSaver VoIP Billing & Call Management Demonstration
Solomon Training for Teachers
2N® Helios IP Uni.
PARKING AUTOMATION SYSTEM
KeyGuard Key Management System
WELCOME!.
Configuring Internet-related services
CLOUD SERVICE WITH WEbTrac
Intelligent Electronic Lock Cylinder System
Attendance Management software
User id: admin Password: admin All Software Related Entries will be Here.
Presentation transcript:

Access Control Solution for Transportation and Logistics Acsys Technologies Company Ltd EN1303(G5)

Acsysware Management Software Electronic Programmable The Acsys Solution HIGH SECURITY LOCKS AND KEYS TIME & ATTENDANCE SYSTEM KEY MANAGEMENT SYSTEM ACCESS CONTROL SYSTEM Acsysware Management Software Electronic Programmable Battery Powered Key WIRE-FREE Programmable Locks Management Software Button Lock Double Entry Lock Single Entry Lock Padlock PL5 PL3

The Acsys Solution No wiring/maintenance required as the sole power source of the system is the key, also making the locks easy to place and replace in case of architectural/design changes. As there are no batteries in the lock, all lock formats are available including Padlocks giving the user total control over outside (gates, storage, car parks) and inside (front door, inside doors) Keys can be programmed through USB, through VPN/Intranet on the IP Programmer, and through 3G on a laptop computer making Access Rights Distribution controlled, secured as well as convenient. Every user is identified on the software by picture ID, name, and all relevant contacts making the ownership of the key easy to verify The Acsys solution is all of the following : Access Control system = decide who goes where and when Key Management system= add/remove/edit/delete any keys/locks/users from the system at any time Time & Attendance system = verify who went where and when Total Access solution for inside/outside/multi-site The Acsyslock and Acsyskey are both electronically programmable using the Acsysware Management Software. The Communication between locks/keys and software is Secured using AES 128bit Encryption. The Acsyskey is IMPOSSIBLE to copy/duplicate/read or corrupt, and can be supplied with an RFID tag The Acsyslocks are IMPOSSIBLE to pick, bump or demagnetize and is protected with anti-drilling safeguards making the unauthorized removal lengthy and uncertain 1 Key can be programmed to open up to 100,000 doors/padlocks The access times and dates of every key can be different for every lock Usual Lost/stolen keys problems are solved by making keys “Time-restricted”, by issuing KEYPAD keys and because Acsys allows blacklisting of keys in locks. Embedded memory in both lock and key logs the last 1000 accesses by Time/Date/User ID which can be downloaded/viewed/exported on the Acsysware Management Software.

4 4

The Acsys Solution CONTROL CENTER Control SERVER Verify Desktop Office management (Indoor) USB CONTROL CENTER Control Who goes Where and When IP Programmer Building entrance (Outdoor ) SERVER MS-SQL Encrypted Database LAN / VPN Laptop Remote Sites (Outdoor) Export Reports 3G Verify Who went Where and When Handheld Programmer VarioKey Check and Analyze Access logs to know WHO went WHERE and WHEN SD Card

Business logic – USB/IP Key Programming Distribute Access Rights- Retrieve Access Logs ACTIVITY REPORT USB/IP programmer Acsys key GIVE RIGHTS GET ACCESS LOGS Control Center Encrypted Database Server CONTROL WHO goes WHERE and WHEN USER ACTIVITY REPORT VERIFY 1. Install the Acsys encrypted database on a server, set up the Acsys control center on a desktop or laptop 2. Assign the access rights for the key(s) to the related lock(s) on the software. Rights can be added, edited, or deleted according to different situations. The access rights duration could be set for 30 minutes, 1 hour, 1 day, 1 week or 1 month, for 1, 2,5, 10 or as many locks as you want, the rights can also be set to permanent. - For Emergency usage, the Access right can be set on the key to be used once only. 3. When the workers get a key, they insert it into the USB/IP Programmer, and AUTOMATICALLY download their pre-programmed Access rights. The workers can now use their key according to the Access rights set by the manager. After completing the work, the worker(s) can (if required) re-insert the key into the USB programmer to upload the Access logs (when did the key open what lock). Every time a key is connected, ALL access logs (where/when) are uploaded. 4. After the Access logs have been downloaded, the Manager can print/email the detailed Access logs reports that show - who (name of user), when (time of access), goes where (lock accessed).

How to Program Keys Open Acsysware Management software and decide WHERE the key can have access Acsys Software The Access rights are downloaded to the key The Key can now ONLY open the locks for which it has received access for the period access was granted Insert Acsys Key In Programmer USB Programmer Ex : 08:30-18:30 Ex : Mon-Fri, from July-September Program the key rights to be limited in time and duration ? When the time (08:30-18:30) has passed or when the length of the access right (July-September) is passed the key has no more access 1 2 3 4 5 6

Solutions for the Logistic and Transportation Industry Acsys Technologies Solutions for the Logistic and Transportation Industry

Known Problems in the Logistics Industry With Mechanical locks or Padlocks, you can’t control or record before Departure: IF the Truck or Container was locked and by who When the truck or the container was re-opened During Transportation Mechanical locks or padlocks are at a disadvantage because : It is easy to open locks when the shipment is under way Because keys can be copied, even if there is a theft, the driver can argue that its someone else, and there is no way to know if someone opened it or not during transport. Mechanical lock and padlocks are easy to drill, easy to bump, easy to pick…and if there is no proof of ‘Break and entry’ the insurance claim is an issue Mechanical/Series Keys do not give the Operator Key Control, which is of concern with Thefts, as lost keys can invalidate an Insurance Policy SOLUTIONS Acsys keys can not be copied One key can open 100,000 locks The Certifying Authority can Decide in advance who can open which lock at what time or how many times they can open it Control and verify which locks were opened by downloading the information from the locks and keys (Last 1000 events-which door/which day/what time) High security locks and that cannot be picked, drilled or bumped Wire free! Easy installation! Time & Attendance function and you can control who goes where and when Program different keys to have access on various padlocks on different locations RFID capable keys that can be programmed to operate a Card System (RFID,POS ,Mifare1) and; Acsys is the only company who can provide the most secure padlock in the World

x ACSYS Logistic Solutions – OPTION A NO KEY = MAXIMUM SECURITY Activity Report Activity Report REAL-TIME LOADING/UNLOADING CONTROL Acsys IP/USB Programmer Acsys IP/USB Programmer NO KEY = MAXIMUM SECURITY x WORKER 1 WORKER 2 Unloading Area Driver has NO key LOCK THE TRUCK UNLOCK THE TRUCK UNLOCK AND UNLOAD LOAD AND LOCK

Control and secure transportation Option A 3- Insert key and LOCK the truck 2- Insert Key in Programmer and get access right to LOCK 4- Truck goes to location, driver has NO key 1- Load the truck 7- Unload the truck 5- When truck arrives on location, Insert another Key in Programmer and get access right to UNLOCK 6- Insert key and UNLOCK the truck

ACSYS Logistic Solutions – OPTION B Activity Report REAL-TIME LOADING CONTROL Acsys IP/USB Programmer CANNOT OPEN from 09:00-11:00 CAN LOAD TRUCK from 07:00-09:00 Driver has PRESET , TIME RESTRICTED key CAN OPEN 12/05/2012 from 11:00-12:00 Unloading Area LOAD AND LOCK THE TRUCK WORKER 1 DRIVER UNLOCK THE TRUCK At end of day upload all info PLANNING LOAD 07:00-09:00 TRANSPORT 09:00-11:00 UNLOAD 11:00-12:00

Control and secure transportation – Option B Control Center Acsysware Software Control and secure transportation – Option B 3- Insert key and LOCK the truck 2- Insert Key in Programmer and get access right to LOCK And UNLOCK later 4- Truck goes to location, driver has TIME RESTRICTED key 1- Load the truck 6- Unload the truck 5- Insert key and UNLOCK the truck REAL-TIME CONTROL 7- When returning insert key in Programmer to get ACTIVITY REPORT Activity Report

ACSYS Logistic Solutions – OPTION C REAL-TIME LOADING CONTROL Activity Report Unloading Area UNLOCK THE TRUCK Monday 10:00- 19:00 Acsys IP/USB Programmer CANNOT OPEN 19:00-09:00 Unloading Area CAN LOAD TRUCK from 07:00-09:00 UNLOCK THE TRUCK Tuesday 09:00-19:00 Driver has PRESET TIME RESTRICTED KEY LOAD AND LOCK THE TRUCK WORKER 1 CANNOT OPEN 19:00-09:00 Unloading Area UNLOCK THE TRUCK Wednesday 09:00-18:00 IF anything is missing only the driver has the key. Since the key cant be used at night, prevents fraudulent use of truck CANNOT OPEN 18:00-09:00

Control and secure transportation – Option C Control Center Acsysware Software Control and secure transportation – Option C 3- Insert key and LOCK the truck 2- Insert Key in Programmer and get access right to LOCK and UNLOCK for several destination in several days 1- Load the truck 6- Unload the truck 5- Insert key and UNLOCK the truck REAL-TIME CONTROL 4- Truck goes to location, driver has TIME RESTRICTED key 7- When returning insert key in Programmer to get ACTIVITY REPORT 7 Insert key and LOCK the truck again 8- Unload the truck and continue in same way Activity Report will show how many times the driver opened the lock, on which day and at what time Activity Report

ACSYS Logistic Solutions – OPTION D REAL-TIME LOADING/UNLOADING CONTROL Key returned, upload activity report Acsys IP/USB Programmer Activity reports NO PASSWORD = MAXIMUM SECURITY Manager Driver has key but NO password Driver Driver calls the manager to get the password Manager The manager locks the truck and sets the key password, will be the key to the driver Loading Area Unloading Area Driver inputs the password and opens the lock LOAD AND LOCK UNLOCK AND UNLOAD

3- Truck goes to location, Control and secure transportation – Option D 1- Load the truck 2- The manager locks the truck and sets the key password and gives key to driver 3- Truck goes to location, driver has key but NO password 4- When truck arrives on location, the driver needs to call the manager to get the password for the key. Activity Report will show, on which day and at what time the driver opened the lock 8- When the key is returned, the manager inserts the key in Programmer to get ACTIVITY REPORT 7- Unload the truck 5-The driver inputs the password in the key and opens the lock

Products Specifications

Products Specifications – Keys Materials: Key housing – reinforced ABS Key blade in stainless steel Splash Water resistant Operating Temperature: -10oC to +50oC LED Information: Green: Access Granted Orange: Access refused because no access during that time period Red: Access Refused 4 blinks(Color depends on the above): Low Battery State Dimensions: Dimensions: 65 x 35 x 18mm Weight: 30g  Power source: Power source: Two 1.5v batteries Battery type : LR1/MN9100 Autonomy : 2 years Memory : Tracking history of the last 1000 logs Rohs and CE compliant, manufactured to ISO standards. Powered by 2 x LR1 batteries

Products Specifications – LOCKS Materials: Made of Brass with stainless steel plating Opening codes are purely electronic Operating Temperature: -20oC to + 65oC Dimensions: 10/30mm to 10/70mm for single entry locks 30/30mm to 70/70mm for double-entry & button locks European standards  Power source: None; powered by inserting key. Memory : Tracking history of the last 1000 logs Memory of blacklisted keys: 500 banned keys Rohs and CE compliant, manufactured to ISO standards. Single Entry MECHATRONIC Lock Double Entry MECHATRONIC Lock Button MECHATRONIC Lock EASY TO INSTALL Step 1 : remove screw Step 2 : remove old lock Step 3 : insert Acsys lock Step 4 : insert screw INSTANT ACCESS CONTROL

Products Specifications – PADLOCKS Materials: Shell in case hardened steel Shackle in case hardened boron steel Fitted with a 30/10 stainless steel cylinder Power source: None; powered by inserting key. Memory : Tracking history of the last 1000 logs Memory of blacklisted keys: 500 banned keys Rohs and CE compliant, manufactured to ISO standards. Products Specifications – PADLOCKS ACSYS PADLOCK PL3 ACSYS PADLOCK PL5 The MOST secure padlock in the world

The most secure padlock in the world How to use the HASP Step 1 Step 2 Step 3 Step 4

Acsys Dual-Technology solution Acsys Key + Proximity/RFID = Acsys ProxKey Use your key as a badge And use your key on a lock

ACSYS Advantages Control WHERE users can enter Control WHEN THE USERS ARE USING THEIR KEYS AND WHERE Control WHEN users can enter Mon-- Fri 08:00-17:00 07/2012 24hrs/ 7/7-365 Tuesday 4:00-18:00 Mon- Fri 24hrs No Access 08:00-20:00 Control WHERE users can enter 锁和钥匙管理软件

Better security, better life! Contact us: UTIS Jeddah – Saudi Arabia Mobile: 0504667387 Email: info@utis.sa