Acsys Technologies Company Ltd

25
Acsys Technologies Company Ltd EN1303 G5 Access Control Solution for Transportation and Logistics

description

Access Control Solution for Transportation and Logistics. Acsys Technologies Company Ltd. EN1303 ( G5 ). The Acsys Solution. ACCESS CONTROL SYSTEM. HIGH SECURITY LOCKS AND KEYS. Button Lock . Double Entry Lock. Acsysware M anagement S oftware. WIRE-FREE Programmable Locks. - PowerPoint PPT Presentation

Transcript of Acsys Technologies Company Ltd

Page 1: Acsys Technologies Company Ltd

Acsys Technologies Company Ltd

EN1303( G5)

Access Control Solution for Transportation and Logistics

Page 2: Acsys Technologies Company Ltd

The Acsys Solution

HIGH SECURITY LOCKS AND KEYS

TIME & ATTENDANCE SYSTEM KEY MANAGEMENT SYSTEM

ACCESS CONTROL SYSTEM

Acsysware Management

Software

Electronic Programmable

Battery Powered Key

WIRE-FREEProgrammable

Locks

2

Management Software

Button Lock

Double Entry Lock

Single EntryLock

Padlock

PL5Padlock

PL3

Page 3: Acsys Technologies Company Ltd

The Acsys Solution

• The Acsyslock and Acsyskey are both electronically programmable using the Acsysware Management Software. The Communication between locks/keys and software is Secured using AES 128bit Encryption.

• The Acsyskey is IMPOSSIBLE to copy/duplicate/read or corrupt, and can be supplied with an RFID tag

• The Acsyslocks are IMPOSSIBLE to pick, bump or demagnetize and is protected with anti-drilling safeguards making the unauthorized removal lengthy and uncertain

• 1 Key can be programmed to open up to 100,000 doors/padlocks

• The access times and dates of every key can be different for every lock

• Usual Lost/stolen keys problems are solved by making keys “Time-restricted”, by issuing KEYPAD keys and because Acsys allows blacklisting of keys in locks.

• Embedded memory in both lock and key logs the last 1000 accesses by Time/Date/User ID which can be downloaded/viewed/exported on the Acsysware Management Software.

• No wiring/maintenance required as the sole power source of the system is the key, also making the locks easy to place and replace in case of architectural/design changes.

• As there are no batteries in the lock, all lock formats are available including Padlocks giving the user total control over outside (gates, storage, car parks) and inside (front door, inside doors)

• Keys can be programmed through USB, through VPN/Intranet on the IP Programmer, and through 3G on a laptop computer making Access Rights Distribution controlled, secured as well as convenient.

• Every user is identified on the software by picture ID, name, and all relevant contacts making the ownership of the key easy to verify

• The Acsys solution is all of the following :• Access Control system = decide who goes where

and when• Key Management system=

add/remove/edit/delete any keys/locks/users from the system at any time

• Time & Attendance system = verify who went where and when

• Total Access solution for inside/outside/multi-site

3

Page 4: Acsys Technologies Company Ltd

4 44

Page 5: Acsys Technologies Company Ltd

5

SERVERMS-SQL

Encrypted Database

DesktopOffice management

(Indoor)

IP ProgrammerBuilding entrance

(Outdoor )

LaptopRemote Sites

(Outdoor)

ControlWho goes Where and When

VerifyWho went Where and When

CONTROL CENTER

Export Reports

Check and Analyze Access logs to know

WHO went WHERE and WHEN

USB

LAN / VPN

3G

HandheldProgrammer

SD Card

VarioKey

The Acsys Solution

Page 6: Acsys Technologies Company Ltd

1. Install the Acsys encrypted database on a server, set up the Acsys control center on a desktop or laptop 2. Assign the access rights for the key(s) to the related lock(s) on the software. Rights can be added, edited, or deleted according to different situations. The access rights duration could be set for 30 minutes, 1 hour, 1 day, 1 week or 1 month, for 1, 2,5, 10 or as many locks as you want, the rights can also be set to permanent. - For Emergency usage, the Access right can be set on the key to be used once only. 3. When the workers get a key, they insert it into the USB/IP Programmer, and AUTOMATICALLY download their pre-programmed Access rights. The workers can now use their key according to the Access rights set by the manager. After completing the work, the worker(s) can (if required) re-insert the key into the USB programmer to upload the Access logs (when did the key open what lock). Every time a key is connected, ALL access logs (where/when) are uploaded. 4. After the Access logs have been downloaded, the Manager can print/email the detailed Access logs reports that show - who (name of user), when (time of access), goes where (lock accessed).

Business logic – USB/IP Key ProgrammingDistribute Access Rights- Retrieve Access Logs

ACTIVITYREPORT

ACTIVITYREPORT

USB/IP programmer Acsys key

GIVE RIGHTS GIVE RIGHTS

GET ACCESS LOGS GET ACCESS LOGS

Control Center

Encrypted Database

ServerUSER

ACTIVITYREPORT

WHO goes WHERE and WHEN

CONTROL

VERIFY

6

Page 7: Acsys Technologies Company Ltd

How to Program Keys

Open Acsysware Management software and decide WHERE the key can have access

Acsys Software

The Access rights aredownloaded to the key

The Key can now ONLY open the locks for which it has received access for the period access was granted

Insert Acsys Key In Programmer

USB Programmer

Ex : 08:30-18:30

Ex : Mon-Fri, from July-September

Program the key rights to be limited in time and duration

?

?

?

?

When the time (08:30-18:30) has passed or when the length of the access right (July-September) is passed the key has no more access

1 2 3

4 5 6

7

Page 8: Acsys Technologies Company Ltd

Acsys Technologies

Solutions for the Logistic and Transportation Industry

8

Page 9: Acsys Technologies Company Ltd

PROBLEMS• With Mechanical locks or Padlocks, you can’t

control or record before Departure:• IF the Truck or Container was locked and by

who• When the truck or the container was re-

opened• During Transportation Mechanical locks or

padlocks are at a disadvantage because :• It is easy to open locks when the shipment

is under way• Because keys can be copied, even if there

is a theft, the driver can argue that its someone else, and there is no way to know if someone opened it or not during transport.

• Mechanical lock and padlocks are easy to drill, easy to bump, easy to pick…and if there is no proof of ‘Break and entry’ the insurance claim is an issue

• Mechanical/Series Keys do not give the Operator Key Control, which is of concern with Thefts, as lost keys can invalidate an Insurance Policy

Known Problems in the Logistics Industry

SOLUTIONS• Acsys keys can not be copied• One key can open 100,000 locks• The Certifying Authority can Decide in advance

who can open which lock at what time or how many times they can open it

• Control and verify which locks were opened by downloading the information from the locks and keys (Last 1000 events-which door/which day/what time)

• High security locks and that cannot be picked, drilled or bumped

• Wire free! Easy installation!• Time & Attendance function and you can control

who goes where and when• Program different keys to have access on

various padlocks on different locations• RFID capable keys that can be programmed to

operate a Card System (RFID,POS ,Mifare1) and;

• Acsys is the only company who can provide the most secure padlock in the World

9

Page 10: Acsys Technologies Company Ltd

ACSYS Logistic Solutions – OPTION A

Acsys IP/USB

Programmer

Unloading AreaxDriver has NO key

LOCK THE TRUCK UNLOCK THE TRUCK

REAL-TIME LOADING/UNLOADING

CONTROL

Activity ReportActivity Report

WORKER 1 WORKER 2

LOAD AND LOCK UNLOCK AND UNLOAD

NO KEY = MAXIMUM SECURITY

10

Acsys IP/USB

Programmer

Page 11: Acsys Technologies Company Ltd

Control and secure transportation Option A

3- Insert key and LOCK the truck

2- Insert Key in Programmer and get access right to LOCK

4- Truck goes to location, driver has NO

key

1- Load the truck

7- Unload the truck 5- When truck arrives on location, Insert another Key

in Programmer and get access right to UNLOCK

6- Insert key and UNLOCK the truck

11

Page 12: Acsys Technologies Company Ltd

UNLOCK THE TRUCK

DRIVER

CAN LOADTRUCK from 07:00-09:00

LOAD AND LOCK THE TRUCK

WORKER 1

ACSYS Logistic Solutions – OPTION B

REAL-TIME LOADING CONTROL

Activity Report

PLANNING LOAD 07:00-09:00 TRANSPORT 09:00-11:00 UNLOAD 11:00-12:00

Acsys IP/USB

Programmer

Unloading Area

Driver has PRESET , TIME

RESTRICTED key

CAN OPEN 12/05/2012 from 11:00-12:00

CANNOT OPEN from 09:00-11:00

At end of day upload all info

12

Page 13: Acsys Technologies Company Ltd

Control CenterAcsysware

Software

Control and secure transportation – Option B

3- Insert key and LOCK the truck

2- Insert Key in Programmer and get access right to LOCK

And UNLOCK later

4- Truck goes to location, driver has

TIME RESTRICTED key

1- Load the truck

6- Unload the truck 5- Insert key and UNLOCK the truck

REAL-TIME CONTROL

7- When returning insert key in Programmer to get

ACTIVITY REPORT

13

Activity Report

Page 14: Acsys Technologies Company Ltd

ACSYS Logistic Solutions – OPTION C

REAL-TIME LOADING CONTROL

Activity Report

Acsys IP/USB

Programmer Unloading Area

Driver has PRESETTIME RESTRICTED

KEY

CAN LOADTRUCK from 07:00-09:00

LOAD AND LOCK THE TRUCK

WORKER 1

UNLOCK THE TRUCKMonday

10:00- 19:00

Unloading Area

Unloading Area

UNLOCK THE TRUCKTuesday

09:00-19:00

UNLOCK THE TRUCK

Wednesday09:00-18:00

CANNOT OPEN18:00-09:00

CANNOT OPEN19:00-09:00

CANNOT OPEN19:00-09:00

IF anything is missing only the driver has the key. Since the key cant be used at night, prevents fraudulent use

of truck

14

Page 15: Acsys Technologies Company Ltd

Control CenterAcsysware

Software

Control and secure transportation – Option C

3- Insert key and LOCK the truck

2- Insert Key in Programmer and get access right to

LOCKand UNLOCK for several

destination in several days

1- Load the truck

6- Unload the truck

5- Insert key and UNLOCK the truck

REAL-TIME CONTROL

4- Truck goes to location, driver has

TIME RESTRICTED key

7- When returning insert key in Programmer to get

ACTIVITY REPORT

7 Insert key and LOCK the truck again

8- Unload the truckand continue in

same way

Activity Report will show how many times the driver opened the lock, on which day and at what time

15

Activity Report

Page 16: Acsys Technologies Company Ltd

16

ACSYS Logistic Solutions – OPTION D

REAL-TIME LOADING/UNLOADING CONTROL

NO PASSWORD = MAXIMUM SECURITY

Unloading AreaLoading AreaThe manager locks the truck and sets the key password, will be the key to the driver

Manager Driver

Driver calls the manager to get the password

Driver has key but NO password

LOAD AND LOCK UNLOCK AND UNLOAD

Driver inputs the password and opens the lock

Manager

Key returned,upload activity report

Acsys IP/USB Programmer

Activity reports

Page 17: Acsys Technologies Company Ltd

17

Control and secure transportation – Option D

1- Load the truck

7- Unload the truck

2- The manager locks the truck and sets the key password and gives key to driver

3- Truck goes to location, driver has key but NO

password

4- When truck arrives on location, the driver needs to call the manager to get the password for the key.

5-The driver inputs the password in the key and opens the lock

8- When the key is returned, the manager inserts the key in

Programmer to get ACTIVITY REPORT

Activity Report will show, on which day and at what time the driver opened the lock

Page 18: Acsys Technologies Company Ltd

Products Specifications

18

Page 19: Acsys Technologies Company Ltd

Products Specifications – Keys

SPECIFICATIONSMaterials: Key housing – reinforced ABSKey blade in stainless steelSplash Water resistantOperating Temperature: -10oC to +50oCLED Information: Green: Access GrantedOrange: Access refused because no access during that time periodRed: Access Refused4 blinks(Color depends on the above): Low Battery StateDimensions:Dimensions: 65 x 35 x 18mmWeight: 30g Power source: Power source: Two 1.5v batteriesBattery type : LR1/MN9100Autonomy : 2 yearsMemory : Tracking history of the last 1000 logs

Rohs and CE compliant, manufactured to ISO standards.

Powered by 2 x LR1 batteries

19

Page 20: Acsys Technologies Company Ltd

Products Specifications – LOCKS

SPECIFICATIONSMaterials: Made of Brass with stainless steel platingOpening codes are purely electronicOperating Temperature: -20oC to + 65oCDimensions:10/30mm to 10/70mm for single entry locks30/30mm to 70/70mm for double-entry & button locksEuropean standards Power source: None; powered by inserting key.Memory :Tracking history of the last 1000 logsMemory of blacklisted keys: 500 banned keys

Rohs and CE compliant, manufactured to ISO standards.

Single EntryMECHATRONICLock

Double EntryMECHATRONICLock

ButtonMECHATRONICLock

EASY TO INSTALLStep 1 : remove screwStep 2 : remove old lockStep 3 : insert Acsys lockStep 4 : insert screw

INSTANT ACCESS CONTROL

20

Page 21: Acsys Technologies Company Ltd

SPECIFICATIONSMaterials: Shell in case hardened steel Shackle in case hardened boron steel Fitted with a 30/10 stainless steel cylinderPower source: None; powered by inserting key.Memory : Tracking history of the last 1000 logsMemory of blacklisted keys: 500 banned keys

Rohs and CE compliant, manufactured to ISO standards.

Products Specifications – PADLOCKS

ACSYS PADLOCK PL3 ACSYS PADLOCK PL5

The MOST secure padlock in the world

21

Page 22: Acsys Technologies Company Ltd

How to use the HASP

The most secure padlock in the world

Step 1 Step 2 Step 3 Step 4

22

Page 23: Acsys Technologies Company Ltd

Acsys Dual-Technology solution

Acsys Key + Proximity/RFID = Acsys ProxKey

23

Use your key as a badge And use your key on a lock

Page 24: Acsys Technologies Company Ltd

ACSYS Advantages

24

Control WHEN THE USERS ARE USING THEIR KEYS AND WHERE

Control WHEN users can enter

Mon-- Fri08:00-17:0007/2012

24hrs/7/7-365

Tuesday4:00-18:00

Mon- Fri 24hrs No Access Mon-- Fri

08:00-20:00

Control WHERE users can enter

锁和钥匙管理软件

Page 25: Acsys Technologies Company Ltd

Better security, better life!

Contact us: UTIS Jeddah – Saudi ArabiaMobile: 0504667387Email: [email protected]