Access Control

Central Jersey Security Cameras/Jersey Security Solutions has all of the state-of-the-art technology, especially in our access control department. Having installed access control systems in government buildings, local municipalities such as police stations and firehouses, small and large businesses and residential. We offer a friendly staff and a smooth installation process at rates well below our competitors. Systems are fully networkable with a user-friendly interface.

CDVI Atrium:

We are proud to offer CDVI Atrium as our trademark access control system. Over the years we have tested a multitude of access control systems and have found that CDVI was our best choice. The excel in reliability and customer ease of use. Access control can be installed in your home or business handling up to 500 doors. Card readers or keyfob readers are placed at every entry door that needs to be controlled. Access is granted to users based on their individual credentials. Doors can be programmed based on the following:

Time of day Ex. (access only granted to employees between the hours of 9 am – 5 pm)

Particular days Ex. (weekdays, weekends, holidays)

Levels of access Ex. (only certain doors would be available to users while other doors would be locked)

A22 – Atrium hybrid 2-door controller

The A22 is Atrium’s powerful Web-Based IP hybrid module. The flexibility of the A22 module allows it to be set either as a 2-door controller or expander (2 in 1).

The system includes an embedded web server that combines performance and simplicity enabling you to manage users/cards, lock or unlock doors, view system events and display controller information from anywhere in the world!

Industry-unique and effortless card enrollment mode minimizes system startup and simplifies your life. A pre-assembled universal power supply is included with every A22, making this unit an industry leader in efficiency and simplicity.

Access Control System Operation

When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential’s number to an access control list, grants or denies the presented request, and sends a transaction log to a database.

In an instance where access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.

The description above illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room.

To prevent this, two-factor authentication can be used. In a two-factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a bio-metric input.

Verification Factors

There are three types (factors) of authenticating information:

  • Code of choice, e.g. a password, pass-phrase or PIN.
  • Items like smart cards or key fobs.
  • An individuals fingerprint, verified by biometric measurement.

Passwords are a common means of verifying a user’s identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password, in combination with the extant factor of the user in question, and thus provide two factors for the user with the missing credential, giving three factors overall to allow access.

Specifications of the A22:

  • Pre-assembled universal plug-in power supply (120V/240V) included
  • Convert any A22 door controller to an A22EC elevator controller by simply updating the firmware for free (up to 256 floors).
  •  Ethernet Port with AES 256-bit encryption
  • Onboard RS485 communication bus, 1220 m (4000 feet)
  •  Embedded web server
  • Auto-detect hardware modules
  • Quick and easy card enrollment procedure
  • Lock outputs: 2 (750mA @ 12VDC/each)
  • Relay outputs: 2 Form C relays (Dry Contact) 5A @ 250VAC, 7A @ 125VAC, 7A @ 30VDC
  • 6 multi-purpose inputs (12 using zone doubling)
  • Completely fuseless system
  •  10,000 users
  •  10,000 cards
  •  25,000 event buffer
  • Ultrafast firmware updating
  • FREE management software
  • Maintenance-friendly snap on terminal connectors
  • Comprehensive LED status indicators

Additional Features

CDVI Atrium also comes equipped with a mass lockdown feature so that with the touch of a button all entries can be locked thus fortifying the desired area. This allows no access during an emergency situation. This feature is being implemented in most schools throughout the US.

All of our technicians are certified directly through CDVI twice a year, supplying us with the latest installation tips and software releases to keep our customers up to date and properly installed and supported. Not every installation company is certified directly by the manufacturer, we do this to ensure the most professional experience with our company for the customer.

Software Availability

Once the system is installed there are no fees or recurring charges. We provide a full tutorial to the customer and place the web-based application on any computer for remote and onsite management of the system. (adding, removing users, changing schedules or permissions)

We also provide an app for all smart devices so doors can be controlled from your smartphone or tablet. Ex. Someone is at one of your doors and you are not on site, you can go to that doors controls through your smart device and unlock the door allowing access to that person.

Atrium provides a history for accountability purposes. You can tell who came and went at specific times through specific doors with the history logging feature. Atrium is the most simple to use access control system on the market today with an extremely user-friendly interface.

 

Take The Next Step!