This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Access control system
Access Control System improves security, comfort, and efficiency by using a network of devices with card readers and electronic locks. Employees access multiple rooms with a single card. The system is managed via a GUI and cloud, allowing for easy configuration and user management
The key problem
The development of IDO Cloud is associated with an increasing amount of equipment, rooms and the number of people. However, only designated employees should have access to many resources.
This includes, among others:
- testing equipment,
- computers and documents with confidential data,
- warehouse of products and parts.
Initially, the number of possible combinations of access to rooms was not large. On the first day, a new employee received a set of 2-3 keys that allowed entry to the appropriate rooms.
Currently, we have several rooms in different buildings, and the team has also expanded to include specialists who are not engineers. The number of keys and combinations made access issues very complicated. Having to duplicate a large number of secure keys each time has become expensive, and carrying them around is inconvenient. Additionally, there was a concern that people changing jobs might have kept copies of room keys. For safety reasons, we couldn’t allow this to happen
IDO ACS – Access Control System
IDO ACS – Access Control System is a solution based on the IDO Demoboard project, which we will describe in detail another time.
The most important function of ACS is access control to rooms.
An integral part of the device is a proximity card reader, and the actuating element is an electric door lock.
We connected several such devices into a network, creating an access control network in the building.
Using the web GUI to connect locally to a given device allows you to:
- configuration of network and server parameters of a given device,
- management of assigned users (adding/removing users with different levels of permissions),
- checking user activity logs
Hardware Innovation
- Proximity Card Readers: Integrated RFID technology for secure, contactless access.
- Electronic Door Locks: Electromechanical locks controlled by microcontrollers.
- Networking: Devices connected via Ethernet/Wi-Fi using TCP/IP protocol for reliable communication.
- Seamless Integration: Unified with existing company systems, enabling centralized management of access control and time tracking on a single platform.
Advanced Networking
- IoT Protocols: Utilized MQTT for scalable management of numerous devices.
- Security Measures: Integrated VPN and secure tunneling to protect data transmission.
Security and Encryption
- SSL/TLS Encryption: Ensured secure data transmission across the network.
- Role-Based Access Control (RBAC): Managed user permissions with precision.
Multi-Factor Authentication (MFA): Enhanced security for administrators.
Security
We are absolutely sure that only authorized people have access to the office and devices.
Comfort of Work
Instead of many heavy keys, employees carry one card that fits in their wallet
Efficiency
Just a few clicks in the system are enough to give an employee access to selected rooms or permanently block him in the event of a job change.
Effect
The introduction of an electronic access control system was a bull’s-eye! Thanks to one system, we solved several problems at once. From the cloud, the system administrator can manage all devices connected to the server. With more devices, they can be connected and managed in groups.
Kontakt