( by Mr. Henry Pang, Product Development Manager )
 
What’s access controller and why it’s important in access control business?
An access controller is a device that connects access control terminals such as fingerprint reading terminals, card reader terminals, pin code reader terminals to door locks. The main function of a controller is controlling the locking and unlocking of an installed door lock such as electromagnetic locks, drop bolts, and etc based on a signal received from an access control terminal. It provides extra security to the area which had been installed with an access control terminal for it will keep a door lock in a locked state even though the access control terminal is tempered with, making it crucial in an event of a break in. An access controller provides an external control to door locks, away from the reachable terminals. This article covers some basic information about access controllers which include:
1. Common door access controllers
2. Features of door access controllers
3. FingerTec terminals and door access controllers
 
How does it work?
A basic door access controller would have several inputs to allow reading terminals for verification and monitoring devices for notification such as door sensor and smoke sensor, as well as several outputs to receive signals for the locking and unlocking of the door and to receive alert in an emergency for example an alarm system. Inputs are loaded in a door access controller via Wiegand signals from the verification stations and from a relay signal from the monitoring devices. An embedded CPU of the controller would then processed these inputs and decides the next action to provide the output devices. In short, an access controller controls the output based on what it receives from an input.
 
Common types of door access controller
There are generally 3 types of door access controllers being offered in the market, one is for 1-door, second is for 2-door and third is for 4-door. 1-door supports 1 door locking system and 2 verification terminals.
2-door supports 2 doors with 2 locking systems and up to 4 verification terminals.
4-door supports 4 doors with 4 locking systems and up to 8 verification terminals.
A door access controller that could handle more than 4 doors are also available but it is usually classified as high-end access controllers, suitable for enterprise level business.
 
Let’s talk about inputs and outputs
There are primary and secondary inputs and outputs for door access controller. A simple rule of thumb applies. A primary output responds to a primary input and a secondary output responds to a secondary input. What are primary inputs? They include verification terminals such as card readers, fingerprint terminals, keypad devices, etc. Regardless of whether a verification station has any memory or not, the signal from the station will be processed by the controller to release output instructions. The terminal that doesn’t contain any memory is known as “slave”, which only reads the medium and send the information for further action.
 
Primary inputs and outputs
 
Secondary inputs and outputs
 
Relationships between secondary inputs and outputs
Input Output Function & Action
Push Release Button Door Lock System To release the door lock once the button is pushed
Door Sensor Alarm System To trigger off an alarm when a door is ajar for a certain time period or being pushed open by unauthorized personnel
Motion Detector Alarm System; To trigger off an alarm when it senses any movement in a space
Smoke Detector Fire Alarm System To trigger off a fire alarm when it senses smoke in an area
The types of input vary based on the model of door controllers. Nonetheless, the inputs and outputs are all controlled by an electronic component known as a relay. The relay works as an ON-OFF switch that links up to other systems. There is also an IN-OUT expansion part, where when added on top of a relay on a PCB board, the door controller could support more inputs and outputs.
 
What to look for in a door access controller?
Memory Capacity
First of is its memory capacity, which can vary from 1000 users up to 50,000 users. The information of the users are derived from the user IDs or their card IDs. Therefore, choose an access controller that suits the requirements of your clients.
 
Communication Method
The conventional yet commonly available communication method of a door access controller is RS485 connection. To be able to communicate using RS485, special RS485 wires, a data converter to convert RS485 to RS232 signal and a PC with an RS232 port are required. TCP/IP communication method is also made available by some manufacturers for a faster system.
 
Anti-Passback
This feature is to prevent access from a user if the system doesn’t have his/her previous records to match against the current action. For example, in order to exit (OUT), a user must have an entry record (IN). Without the entry record, the user will be denied exit.
 
Multi-Card Access
Instead of one verification, this feature requests two users to verify at the same time before they are allowed entry.
 
First Card Unlock
For this feature, a specific user must verify and open the door before the system could accept other users.
 
Inter-locking
Only one door can be unlocked at a time to prevent unauthorized entry.
 
Permanent Lock Release
This feature allows the system to release door lock during a specific time period, allowing access to the public.
 
Time Zones
The system limits user’s accessibilities based on time zone settings.
 
FingerTec Terminals and Door Access Controller
Availability of Wiegand 26-bit output in all door access terminals of FingerTec products make FingerTec terminals suitable to be used with any door access controllers. Check the connection port at the rear of FingerTec terminal and look for WD0 (data 0), WD1 (data 1) and GND. These ports are for Wiegand 26-bit output.
FingerTec terminals will send an output containing “User ID” to door access controller via Wiegand 26-bit during verification process. The “User ID” sent to the memory of the controller will be matched against the memory of the controller to produce output, either to release the door lock or not. Double enrollment, one at the FingerTec terminal and two at the controller must be carried out for this purpose.

i-Kadex can be used to read cards and send the card ID output via Wiegand 26-bit. The card ID signal then would go through the door access controller to verify and allow user access. Under this installation, you only need to enroll the user and the ID card into the door access controller.

FingerTec terminals work with TCMS V2 for data management. All verifications that occur in the FingerTec terminals are kept in the memory of the controller. All data could be downloaded into TCMS V2 via TCP/IP connection for generation of time attendance sheets and reports. The door access controller will not disrupt the operation of TCMS V2.

 
Any comments or feedbacks please email to editorial@fingertec.com
Copyright © 2010 FingerTec Worldwide Sdn. Bhd. All rights reserved.