You can our brochure here.

Add to my manuals
36 Pages

advertisement

You can our brochure here. | Manualzz

Designing a System

Doors Enterprise Software

The Progeny P4 Range

Integration Module (SIM)

Keypads

Proximity Readers

Biometric Reader NEW

Barcode & Magstripe Readers

Egress Devices

Long Range RFID

Hands Free

Interlock Systems

Compact

Integration

Training

Compliance

How to Find Us

25

26

28

30

20

22

24

32

33

34

12

14

16

18

4

6

8

Designing Your Access Control System

Electronic Physical Access Control provides 24/7 security. This can be to protect people, valuables or information. When you are designing your access control system, there are several important choices:

Identification method

Reader Technology & Credentials (Crystal, iCLASS, MIFARE etc.)

Online or Stand Alone/Compact

Communication Method

Which doors will be controlled?

Selecting a computer system

Integration with other systems (Fire, Membership Software etc.)

Identification

You’ll need to identify the people you wish to allow access to.

There are three main means of electronic identification:

Secret Knowledge (Access Code or PIN)

Token (Card, Key fob)

Biometric (Fingerprint)

Each method has its pros and cons. They can be used individually as ‘Single Factor Identification’ or together to get ‘Two or Three Factor Identification’ which is more secure. Using a Card and Code, for instance, would be two factor identification and improves security by eliminating some of the drawbacks of each factor.

Photo ID

With online access control software you can design and manage the printing of cards which can be personalised with company name, employee details/photo etc.

Stand Alone/Compact or Online System?

Stand Alone and Compact systems do not require computers of any kind, so are ideally suited for small numbers of doors and users. Compact access controllers have the reader (usually a keypad) and controller built into the same unit. All programming is done locally for each door via a keypad provided with the controller. These systems offer the lowest cost.

With an Online networked system, you can control an unlimited number of doors and sites from a single server. Our software allows simple programming and monitoring of the system. If the connection is lost or the PC switched off, the controllers carry on as normal.

Communication Method

There are several choices for communicating with your controller. IP addressable Ethernet can make use of an existing

LAN, or one can be created for very little cost. The main advantages are hardwired infrastructure and freedom of choice for locating server and workstation PC’s. This is also the best choice if you wish to use any server based features such as Roll Call or Anti-Pass back.

USB and Serial methods are more suited to smaller systems with a single PC.

GPRS is ideal for those locations were you have power but it is difficult to get a data cable to the controllers.

Emergency Egress

Care needs to be taken if an access control door forms part of an emergency egress route. Commonly used methods with fail open locking devices include:

Fire Relay (Part of the fire alarm system)

Green Call Point

Fire Space Zone (Server based feature - only to be used in conjunction with one of the first two)

Cables

It is important to use the correct cables, All wiring should be installed in accordance to relevant wiring regulations.

RS 485 Network: Screened twisted pair (Belden 8132 or equivalent)

Reader: Screened 8 Core

Keypads: Screened 8 Core

Lock: Rated > Lock Current

RQE: Screened 8 Core

Reporting

Event reporting is one of the main benefits of having an ‘Online’ system. All events (Card Transactions, Egress, Opening,

Closing, failed access, etc.) are time stamped and recorded. This information can then be filtered and presented to show the management/monitoring information you need. Reports can be exported to TSV, XLS or CSV format. Reports include:

History

Attendance

Roll Call

Time Sheet

New events recorded by Crystal systems include: Power Up & Power Down times and Two Factor Identification events.

Last known location (Door and APB zone) is recorded in the card holder record.

Read In/Read Out

You need to decide whether to have a card reader on one or both sides of the door. If mounted on the outside only, then a request to exit button/mechanical egress will be required on the inside. This usually depends on whether you need to track the movements of users in and out of that area, eg. for roll call.

Integration

Integration can happen at three levels:

Credential (Shared use with other systems e.g. Cashless Vending, T&A, ‘Follow Me’ Printing)

Controller Hardware (Wired connections between systems e.g. Fire Alarm, CCTV)

Software (Data sharing/exchange between systems eg. Membership Management, E-Booking systems)

Selecting a PC

Selecting the correct PC for an Access Control system is very important and can be a challenge. Some of the considerations include:

Single PC or Client/Server PC configuration

Dedicated or shared use of the Server PC and/ or Workstation PC

Availability of the server & client PC ie. 24/7 or only during working hours etc.

System features being used

Dedicated: refers to a PC that is used entirely for the Access Control system. The only other applications loaded are those needed to maintain the PC (antivirus, backup software etc). You will need a dedicated server if using any of the server based features such as ‘Roll Call’ or ‘Zoned APB’.

Shared: refers to a PC that is used for Access Control, but also for one or more applications such as Accounts,

Contact management, Building Management, DVR, etc. This is generally OK for workstations that are not required for critical tasks such as ‘Alarm Handling’ and ‘Roll Call Printing’.

Operating System for the PC/Server

Workstation: Doors Enterprise is compatible with Windows 7, 8.1 and 10. The install set for Doors Enterprise now includes SQL Server Express 2012 (64 bit).

Server: Recommended: Server 2008, Server 2012.

Doors Enterprise Software

Features

:

Live Event Reports

History Reports

Attendance/Absence Reports

Simple Timesheet Report

Roll Call Report

Photo ID Badge Design & Printing

Text Alarms with Audit Trail

Zoned Door Release on Fire Alarm

Automatic Scheduled Backup/Archive

Zoned Anti-Pass-Back

Floor Plan Alarms

Multi-Site & Multi-User

Unlimited number of Doors

128,000 Users

About Doors Enterprise

Doors Enterprise is our innovative software for use with Progeny Access Control systems. The latest release: V8 continues a lineage that stretches back 20 years. With a user-friendly interface and new features based on customer feedback, it is simple to use. The software is multiuser and takes advantage of the power and scalability of Microsoft

SQL Server.

Operating System

Supported operating systems include:

 Windows 7, 8.0, 8.1 & 10. Windows Server 2008 & Server 2012

SQL Server Database

Microsoft SQL Server Database delivers increased security, scalability and availability to the access control data.

Doors Enterprise Server

Doors Enterprise Server provides a single point of communication between clients, the database and the access controllers.

Doors Enterprise Client

Doors Enterprise allows for an unlimited number of work stations and software users on single or multiple sites.

Custom Database Fields

Up to 25 Custom Fields can be created to contain additional information about cardholders.

Each custom field can be one of 5 types for example: you might need a drop down box for department or a ‘date pick’ calendar for an employee start date.

Multi-Lingual

Each client workstation can easily select its own language setting. The translation dictionary includes English and

French with other languages available on request.

Dormant Card Policy

Doors Enterprise allows you to decide on a maximum time that a card should legitimately not be used. Once this time has lapsed the card will be marked as dormant and disabled from all doors.

What’s new in Version 8.0

V8 of Doors Enterprise primarily introduces integrated support for Biometrics.

The server works with door controllers to distribute and store biometric templates. So once enrolled, a user can (subject to access levels) access any door using the new Bio Readers.

A new card holder database field allows users to be elevated to ‘Bio Administrator’ which if enabled, allows them to add or update users’ templates locally. Visitor control is a good use case for this.

Fully exposed P4 controller features including:

Sequential multi-factor identification separately controlled for both in and out

Integrated support for Biometric Identification and Verification

Template distribution and backup

 Nominate Bio Administrators to allow local Administration of Templates

Access code

Reader Brightness

Reader volume for Feedback & Alarms

Control over the keypad star key

 Advanced electronic lock drive modes

 Random search prompt

Wizards

Wizards make the setup and importing of data a very simple and intuitive process.

Importing data with the Card Data Import wizard provides feedback at every stage.

Space zones keep track of who is currently in that zone, based on log in and log out use of a card or token. A roll call report can be run off manually or automatically.

Time Sheet Report

The Time Sheet report collects all the in and out transactions, from nominated readers, for each user. These are tabulated with totals for each in and out and totals for each user at the bottom.

Any missed clocks are left blank so that when exported to a spreadsheet they can be filled in later. Because the formulae are exported with the report data, the totals are updated as the missed clocks are added in the spreadsheet.

Attendance/Absence Report

Attendance and Absence are combined into a single report. You also have free choice of fields to be included. This feature is common to all reports, as is the ability to export to CSV, TSV or Excel spreadsheet format.

Desktop Reader

This USB powered reader allows for speedy enrolment of new cards or fobs into a

P4/Doors Enterprise system. Supplied with a 1.8m USB cable (can be extended to a maximum of 5m). To use, simply click ‘add new card’ and present the card/ fob to the reader. The credential’s card ID is then accurately entered for you.

Controller Models

P4.net

The P4.net is an online door controller that makes use of standard Ethernet local area network connections to communicate with the central management software. Each P4.net controller has an RJ45 socket and uses the UDP/IP protocol with very little data bandwidth required.

Online System Overview

10.70.172.01

07755 566889

SMS

P4 GPRS

Network (RS485)

Ethernet

PoE

192.168.77.21

Up to 16 Controllers per network, scalable up to 65,000 doors

P4 Network (RS485)

Server PC

COM 3

USB Adaptor

Client

Workstations

P4 Systems

Features & Benefits:

Simple to Specify, Install and Use

Online or Standalone Operation

Scalable to any number of doors

Up to 128,000 users

Distributed Intelligence

200 Year Data Retention

Connectivity:

- Ethernet IP

- USB

- GPRS

- Power over Ethernet POE

Free Management Software

Integration:

- Software Data Exchange

- Hardware Interfaces

- Shared Credential

Wide range of Readers & Keypads

One, Two or Three Factor Identification

Supports any Locking Technology

Card In/Card Out

Interlocking Facility

Fail Open and Fail Locked

Lifetime Warranty

Designed & Manufactured in the UK

P4 Controller

The innovative P4 Controller has many useful features to ensure that your access control system runs smoothly and efficiently:

Scalable

The P4 system architecture allows for expansion without any major equipment costs - meaning a P4 controller can grow along with your business.

Enclosure

The lockable steel 1 or 2 door enclosure has a 5A charger PSU and still has space for a 7 Ahr backup battery to be added. This ensures the controller is secure, robust and will operate smoothly.

Charger Power Supply

The standard Controller enclosure includes a12V 5A Charger power supply. The power supply has 6 individually current limited outputs with overload indication. The charger also features un-interrupted changeover from mains to battery and deep discharge protection for the battery.

Distributed Intelligence

The on-board memory stores all the access control information for a given door. This means that, excluding some server based features, in the event of lost communication with the server, the controller will function normally.

Features & Benefits:

32,000 Credentials as standard

128,000 Credentials option

200 Year Data Retention

 Expiry Dates

 Two Factor Identification

 Fail Open and Fail Locked Outputs

Interlocking Built In

5A Charger Power Supply

‘Deep Discharge’ Protection

 Engineers service light

 Steel lockable enclosure

Space for 7Ahr Backup Battery

Lifetime Warranty

Designed & Manufactured in the UK

Choice of reader Technology

Choose from ‘Mag Stripe’, ‘Proximity’, and ‘Biometric’ to suit your requirements. P4 will interface with 35 standard reader technologies and you can define custom formats through the Advanced Engineers menu.

Random Search

If you require a system that enables you to search employees on a random basis for security reasons, this feature is ideal as it allows for randomised impartial searches to be carried out. The search rate is adjustable from ‘1 in 1’ to ‘1 in 99’ and randomly flags users to be security searched as they pass through the door or turnstile.

Stand Alone Discovery Mode

The stand alone discovery mode feature makes adding cards very straightforward. Simply put the controller into discovery mode and present one or as many cards as you wish to add to that door.

Lock Drive

The P4 Controllers have the traditional relay to switch the positive wire of the lock supply, as well as an electronic switch in the negative wire. This allows for some lock driving modes that will significantly reduce if not eliminate relay contact wear and extend the life of the controller. The modes are:

Standard (Relay only)

Protected (Relay and Electronic Switch)

Electronic (Electronic Switch only) Fail Secure

Electronic (Electronic Switch only) Fail Open

Access Levels

P4 raises the bar on access levels with 250 per site.

Event Logging

The P4 Controller will log 8000 events per controller. This memory also has a 200 year data retention

8000 Event Memory

Each controller has its own real time clock and event log memory to allow for the system to continue operation even when isolated from the PC or the remainder of the network.

Power over Ethernet (PoE)

This innovative technology allows power and data to be passed along the same cable (usually Cat 5e). Progeny offer a comprehensive range of PoE (Power over Ethernet)

Controllers and matching injector options, offering PoE as an alternative to ‘Mains Power’.

The P4 PoE controllers allow for a simple, fast and costeffective installation, saving time on the need to provide electrical power spurs to controllers; instead, existing

Ethernet structured cabling (Cat 5) can be used in conjunction with a PoE Ethernet switch. Note: P4 PoE controllers will continue to function even if Ethernet communications are lost.

Progeny also offer a choice of 15W and 30W output power

PoE injectors matched to our 4003 and 4003-17 controllers.

These injectors convert standard Ethernet switches to PoE.

P4 GPRS

The GPRS controller (also IP addressable) is ideal for mobile and difficult to reach applications. This controller makes use of the mobile telephone data infrastructure to allow communication with the Doors Enterprise software.

P4 Lift Controller

The P4 Lift Controllers are available as either 2 floor, 2 shaft controllers (3007-2F) or 4 floor, 2 shaft controllers

(3007-4F). The lift controllers can be added to an existing system allowing for lift access to be controlled with a single reader in the lift cab.

USB Interface

USB Interface - using the 3107 USB to 485 adapter, the server PC can be connected to the Progeny network with

1000m reach.

System Intergration Module (SIM)

Input & Output

SIM stands for Systems Integration Module - not to be confused with your mobile phone SIM. The SIM is available in two forms:

SIM with 16 inputs and 1 relay outputs has no power supply.

SIM with 16 inputs and 16 relay outputs has a built in power supply

These are primarily designed to be general purpose input and output. Server based features in the Doors Enterprise software can then make use of these inputs and outputs for:

Fire Door Monitoring

CCTV DVR Integration

Alarm Condition Notification

Car Park Full Indications

And many more…

Input Only

These SIM modules have 16 inputs and 1 relay output. These are primarily designed to be general purpose input. Most of the functionality comes from server based features such as triggers and alarms. The SIM provides a good means of monitoring fire doors that do not have access control connected. The inputs can be programmed to be inverted or not, allowing ‘normally closed’ or ‘normally open’ contacts to be connected.

P4 Controllers

4001-5A

4002-5A

4001D-5A

4002D-5A

4003

4003-17

4006

4006D

P4 1 Door Controller with 5 A charger PSU

P4.net 1 Door Controller with 5 A charger PSU with Ethernet

P4 2 Door Controller with 5 A charger PSU

P4.net 2 Door Controller with 5 A charger PSU with Ethernet

P4 PoE 1 Door Controller (1.0 A supply)

P4 PoE 1 Door Controller (1.7 A supply) - Matching injector available

1 Door P4 Controller with 5 A Charger PSU & GRPS Interface

2 Door P4 Controller with 5 A Charger PSU & GRPS Interface

Identification

Methods

Introduction

Identifying a prospective user of a door is one of the most important tasks of an access control system, there are 3 main ways to identify users:

Keypads will allow the entry of ‘secret knowledge’. This can be a unique code per user; ‘Personal Identification Number’ (PIN) or a common code used by groups or all users, referred to as an ‘Access Code’.

Credential Readers will extract an

Identification Number from a Card or Fob carried by the users.

Biometric Readers compare a physical feature of the person themselves with a template. If the comparison is successful an identification number associated with that person is sent to the access control system.

For higher security these can be used in combination to provide ‘Two Factor’ or even ‘Three Factor’ identification.

Keypads

Keypads can be used in isolation for access code or

PIN based identification or in conjunction with a reader to provide 2 factor identification.

Biometric Readers

Biometric Readers compare a physical feature of the person themselves with a template. If the comparison is successful, an ID number associated with that person is sent to the access control system.

RFID Readers

‘Radio Frequency Identification’ (RFID) comes in many shapes and sizes. All of these can be interfaced with the P4 controllers.

Magstripe Readers

Still a popular and low cost token-based means of identification. These readers extract the magnetically encoded numbers from the magnetic strip on the back of a card.

Keypads

Keypads cater for the ‘Secret Knowledge’ method of identification. They can be used by themselves or in conjunction with token based credentials for additional security. Keypads can be used to enter a common code used by more than one user or a true Personal

Identification Number (PIN). P4 systems also allow for the entry of a ‘virtual card’ via the keypad.

The main advantage of using code or PIN alone is that the user does not need to carry anything around. There is no credential to get lost or stolen. Keeping the ‘secret knowledge’ secret is very important however. The spy proof and scramble keypads have some interesting features to help with this.

Standard Keypad

This keypad is suitable for indoor or outdoor applications.

The back lit keys make access code entry in the dark easy.

An integral sounder gives key beep and ‘Prolonged Door

Open’ alarm function.

Vandal Resistant Keypad

This keypad is robust enough for any public facing, outdoor applications. The back lit keys make access code entry in the dark easy. An integral sounder gives key beep and

‘Prolonged Door Open’ alarm function.

Features:

Back Lit Keys

Vandal Resistant

 Vandal Proof Guarantee

Product Codes

4124

4121

4132

Standard Keypad

Vandal Resistant Keypad

Optional Surface Mount Back Box

Scramble Keypad

These keypads interface with the P4 controllers in a similar way to any standard keypad, but provide much greater security by ensuring that only the person using the keypad can see which numbers are being entered. Each time the keypad is used, the numbers for each key are randomly moved to new positions. Observing which keys are pressed will not reveal the code or PIN to an onlooker.

There are over 3.6 million permutations! This also ensures that the keys wear equally, even if the same code is always used.

Features & Benefits:

 High Security

Covert Data Entry

3.6 million permutations

 Even Key Top Wear

 Surface Mount or Panel Mount

Keypads

2011S

2011P

Scramble Keypad (Surface Mount)

Scramble Keypad (Panel Mount)

Dark Crystal

Proximity

Readers

The Dark Crystal Proximity reader is a RFID reader that takes advantage of a simple 4 wire interface to P4 Controllers.

The unique back light and multi-colour light indicators give excellent user feedback on the operation of the system including:

Interlock

 Programming Mode

 Lock Status

Alarms

Stand alone or Software sound volume and running light brightness controls mean the reader can be as discrete or as prominent as required.

The readers are available IP rated and in several styles. The Switch Plate reader fits neatly over standard UK light switch making second fix friendly. The Mullion reader comes with a pigtail lead, and is intrinsically weather proof should there be a need to mount the reader externally. The Panel mount reader can be fitted into industry standard cut-outs of intercom panels. Dark Crystal readers work with Progeny credentials which ensures compatibility, reliability and cost savings.

Dark Crystal Mullion

This style of reader is suitable for mounting onto door frames or posts or other locations that cannot make use of a single gang back box. It is also available with a pigtail lead to provide extra flexibility when mounting on to surfaces that cannot be easily chased out, or to provide an extra level of protection for outdoor environments. The reader is also supplied with a stainless steel cover for a more modern look.

H: 100 W: 50 D: 15 (mm)

Product Codes

4820

Dark Crystal Mullion Reader

Dark Crystal Switch Plate

This reader mounts directly on to a standard UK single gang back box. It also comes with screw terminal block connections making it an ideal solution for second fix.

H: 90 W: 90 D: 12 (mm)

Dark Crystal Panel Mount

This IP rated reader has standard mounting holes and is designed to fit into an intercom or entry panel.

Dark Crystal Vandal Resistant

Switch plate reader with protective Stainless Steel front plate

Combined Keypad & Proximity Reader

This product is ideal for 2 factor identification: Card & PIN or Card & Code. It is also useful for applications where an access code or Personal Identification

Number (PIN) can be used as an alternative or backup to the Card or Fob.

The tactile keypad gives a positive accurate means of entering codes. The programming Asterisk key can be disabled to prevent tampering with settings.

The unique back light and tri-colour status light pipe give excellent user feedback on the operation of the system including:

Interlock

Programming Mode

Lock Status

Alarms

Independent sound volume controls mean the keypad reader can be as discrete or as noisy as required.

IP 54 Rated, the keypad can be flush mounted or surface mounted using the optional back box.

Product Codes

4800

4830

4840

4124-RF

4132

Dark Crystal Switch Plate Reader

Dark Crystal Panel Mount Reader

Dark Crystal Vandal Resistant Switch Plate Reader

Combined Keypad & Reader

Optional Surface Mount Back Box

Biometric System

What are Biometrics?

Biometrics are the third of three widely accepted

“Authentication Factors”:

 Secrete Knowledge (Something you know)

Token (Something you have)

Biometrics (Something you are)

Biometric Readers compare a physical feature of the person themselves with a template. If the comparison is successful, an ID number associated with that person is then processed by the access control system. Biometric authentication can work in one of two main ways:

 Identification, one to many (1:N), fingerprint only for instance.

 Verification one to one (1:1) working with another factor (Code or Card).

Identification

Biometric identification has an advantage in that there is no need to carry any cards or fobs, or remember codes.

However, for large quantities of users the false acceptance rates (FAR) will rise when using only Biometrics to identify authorised users.

Verification

Biometric verification has the advantage of maintaining low FAR’s. The only drawback being that an identification Code or Card needs to be presented first to allow selection of the correct biometric template.

Progeny Biometric Readers have an RFID reader built in, allowing for verification or to act as a backup to Identification should the primary identification method fail.

Progeny's biometric system is a real innovation – with 4 stage sequential multi-factor authentication for enhanced security.

The P4 system allows for 1, 2 or 3 factor authentication. The

4850 Bio reader has RFID built-in - for up to two factors, add a keypad to include secret knowledge.

The fingerprint reader recognises 'templates' created from the image of a finger placed on the sensor. The templates are stored both on the controller and centrally in a SQL database

(Online only).

Up to 2000 templates can be stored, allowing up to the same number of users to use biometric authentication. However, we highly recommend storing at least two templates for each user to allow for minor injuries to the finger such as cuts, abrasions, etc.

 intuitive lighting

4 stage sequential multifactor authentication

1, 2 or 3 factor identification

RFID built-in

Product Codes

4850

Biometric Reader

4803-Bio

Biometric Reader - USB Desktop

Barcode & Magstripe Readers

Barcode Reader

The 2030-SC is a scanning optical barcode reader. The reader is weather protected and suitable for both indoor and outdoor use.

The switch plate style has 60 mm spaced mounting points to fit a standard single gang back box.

The switch plate reader comes with an attractive stainless steel cover to give protection and a modern aesthetic. This reader can be surface mounted. Cards are presented below the reader.

Position Target

This optional accessory assists the novice user to position the card at the correct distance and location. This is particularly useful in full sunlight when the scanning light bar is difficult to see.

Product Codes

2030-SC

Crystal Barcode Reader (Scanning)

2030-ST

Optional Position Target

Magstripe

The magnetic stripe, often called a ‘Magstripe’, is read by swiping past a reading head. Magnetic stripe cards are commonly used in credit cards, identity cards and transport tickets. Track 1 & Track 2 are available.

For indoor or outdoor use. The reader head provides an extremely reliable reading capability with over 1 million head passes. Made from an ultra-tough

UV resistant polycarbonate, this reader is very durable, even in the harshest conditions.

Magstripe Readers

2075

2075-TRK1

2150

Magstripe reader (TRK2)

Magstripe reader (TRK1)

Pack of 10 Cleaning Cards

Credentials

2014

2015

Mono Magstripe Card

Colour Magstripe Card

Credentials

Crystal Credentials

These credentials work with any of the Crystal Readers & Keypad Readers. They have two levels of cloning protection to prevent copying.

Crystal Fob

For applications where it is more convenient to keep the RFID credential with other keys on a keying.

Crystal ISO Card

These polyester cards conform to the ISO standard dimensions. This means that they will fit into standard card holders They are also suitable for Photo ID printing.

UID Credentials

3804-10

3804-100

3805-10

3805-100

Crystal ISO Cards - pack of 10

Crystal ISO Cards - pack of 100

Crystal Key Fobs - pack of 10

Crystal Key Fobs - pack of 100

Site Coded Credentials

3840

Crystal Site Coded ISO Card

3841

Crystal Site Coded Key Fob

Egress Devices

The Progeny Touch Switch is a general purpose switch capable of detecting near-proximity or touch. It detects tiny changes in the capacitance at the front surface. The switch uses a patented spread-spectrum charge-transfer technology.

Every 80 seconds the switches self-calibrate, this means that the switch can accommodate large changes in surface capacitance due to humidity, nearby objects etc.

Designed specifically for ‘Request to Exit’ or ‘Request to Enter Call’ applications. The fully sealed IP66 enclosure makes it suitable for both internal or external use.

FEATURES:

No Moving Parts

Auto Adjust to Environment

Lifetime Operation

Lifetime Warranty

SWITCH PLATE

The ‘Switch Plate’ option will mount on any standard European single gang light switch back box.

MULLION

The ‘Mullion’ option is ideal for those space restricted locations.

Product Codes

4810

4810-MULL

Dark Crystal Touch Switch (Switch Plate)

Dark Crystal Touch Switch (Mullion)

Progeny HID Prox Range

HID proximity cards and readers are recognised as the industry standard for physical access control. Featuring 125 kHz RFID technology,

HID proximity products are robust, affordable and integrate seamlessly with Progeny access control systems.

Progeny HID Prox Readers

2052-HID

2050-HID-KB

Prox Point Reader (Mullion Pig Tail)

Prox Pro Reader with Keypad

Site Coded Credentials

2042-HID

2043-HID

2044-HID

2045-HID

ISO Prox Card

Prox Key Fob

Prox Clam Shell Card

Prox Sticky Dot

Progeny iCLASS

Progeny iCLASS offers widely supported card level integration to third party systems such as:

 Cashless Vending

 Pull/Follow me Printing iCLASS SIO-Enabled (SE™) smart card readers support

Secure Identity Object™ (SIO), a new portable credential methodology from HID, and HID's Trusted Identity.

Technology-independent - Supports multiple technologies

(iCLASS Seos and iCLASS SE credential platforms, standard iCLASS, MIFARE, and MIFARE DESFire EV1)

Long Range RFID

The Progeny Telekey has a read range of up to 25 metres and is an ideal way to control access through automated gates, rising barriers etc. Fobs can be enabled or disabled from the access control system and all users will be identified and logged.

This also offers greater freedom over the location of the reader. Vehicle users do not need to get out of the cab in order to open a barrier.

The Telekey fob is also available with embedded Progeny prox, HID prox or iCLASS credentials.

How it works

Each key fob has a unique ID number (site code & card number), pressing one of the buttons on the fob transmits this number. When in range, this number is read by the reader and passed onto a standard access controller for decision making.

Each fob can be treated as any other credential and allocated:

 Access Levels

 Time zones

 Calendar limits

 ‘Valid from’ and ‘Valid to’ dates

The IP 56 enclosure of the reader makes it suitable for indoor or outdoor mounting. This removes any need to dig up the road or car park to run cables to readers near the gate or barrier. The reader also has two reader outputs that correspond to the two buttons on the fob. This can be used to control two barriers from one reader possibly for in/out applications.

Overview

 2 channels (2 buttons)

 Up to 25 Metre range possible

 Available with Crystal, HID or MIFARE proximity credentials

 Standard Progeny reader interface

 Surface mount

Long Range Reader

3300

Telekey Reader

Site Coded Credentials

3301

Telekey Fob

3806-10

2045-HID

3235

Sticky Dots pack of 10

Prox Sticky Dot iCLASS Sticky Dot

Hands Free &

Safety Registration

Features:

 ‘Hands Free’ Tags and Readers

 Long life active tags. Tags power down when away from door to save energy

 Hands free reading to over 3 metres

 Fast (20 tags/sec.)

 Able to read many tags in same area

 Automatically detects entry or exit

 Works in electronically noisy environments

Applications

The product is suitable for numerous applications, they include but are not limited to:

 Automatic Safety Registration (Roll Call)

 Two Door Controller

 Personnel & Product Tracking

 Time and Attendance

 Hands Free Access Control

 Car Parking Control

 Personnel Identification

 Personnel & Article Tracking

Disability: Used in the direction sensing mode, a tag moving from one loop to another will have its direction of travel identified by the reader.

Car Parking: The direction sensing reader utilises two loop aerials to enable sensing at ranges of up to 3 metres.

Automatic Roll Call: The direction sensing reader utilises two loop aerials to enable sensing at ranges of up to 3 metres.

Article Tagging: ‘Hands Free’ article and personnel tagging keeps track of high value assets.

Interlock Systems

High Security

Interlock systems control the locking of two or more doors, If one door is open or unlocked, all the other doors remain locked and will not open until the first door is closed and locked. Interlocks are sometimes referred to as ‘Air Locks’ or

‘Tiger Traps’,

Adaptable

Doors can be normally locked (normal action) or unlocked (reverse action) to suit the application. Doors may have full access control using card readers, keypads etc or simply be released using push buttons or touch switches.

Scope

Two, three and four way interlocks can be created as standard. Contact our support team for systems with more doors involved.

Normal Action

With this type of interlock all the doors are normally locked and a ‘Trigger’ device of some kind is used to request the opening of a door.

While a door is unlocked or open, other doors are prevented from unlocking.

Applications

The product is suitable for numerous applications:

 Bank Lobbies

 Cash Handling

 Photo Processing

 Laboratories

 Clean Rooms

 Jewellery Stores

Reverse Action

With reverse action interlocks, all the doors are normally unlocked and free to open. However, when one of the doors is detected as ‘open’, all the other doors will be locked.

This type of interlock most commonly used for functional control rather than security. ‘Reverse’ and ‘Normal’ action interlocks can also be mixed on the same system.

Simple 2 Door Interlock

Each door is electrically locked and monitored. The control electronics then generates a control signal to indicate when the door is closed and secure.

Each controller also has a control input that will prevent the releasing of the locking device.

By cross connecting these control signals, the door controllers communicate the door status, and only allow one door open at any given time.

3 Door Mixed with

Access Control

Doors may be controlled by a P4 controller and/or an interlock controller.

The door release device can be a simple push button or an access control keypad or card reader.

All of the Progeny controllers have interlocking interfaces as standard. This means you can mix interlock controllers with access controllers on the same system.

Interlock Programmer

An “Interlock Programmer” is used to greatly simplify connecting the interlock signals. It also allows for easy and flexible programming of the interlock system. A 12 way DIP switch allows the interlocking to be programmed in any combination. On board indicators show current interlock signal status.

Interlock Product Codes

2089

2089D

2069

Interlock Controller with 5A PSU (1 Door)

Interlock Controller with 5A PSU (2 Door)

Interlock Programmer

Access Controllers with Interlock

4163

4001

4002

4006

Stand Alone Controller with 5A PSU

P4 Controller with 5A PSU

P4.net Controller with 5A PSU

P4.GPRS Controller with 5A PSU

Compact Keypad Controllers

Simple and cost effective systems . The keypads have the access control mechanism built in to the keypad. To complete the system, a low voltage power supply and a locking device are all that is required.

Simple Installation

Any competent installation engineer will be able to install this equipment without any special training. Simply connect the power supply unit, locking device and egress device and you are then ready to program the control unit.

Easy to Use

Each channel can be operated with up to 50 codes per channel. The two channels can be combined to give a total of 100 access codes for a single door. The codes can be 4, 5 or 6 digits in length, to operate one of the channels simply enter the access code for that channel.

2059 Classic

This unit offers the lowest cost of the compact range. The keypad is fully potted and weather proof with a membrane keypad and key press ‘beep’.

This particular design features a call button for visitors and includes a tamper switch.

2064 VR

Designed for outdoor environments, this keypad-controller is vandal resistant and weatherproof.

The satin chromed solid zinc keys and housing are also backlit.

This comes with the Progeny Lifetime Warranty and is also backed by a Vandal Proof

Guarantee.

Features:

 Available in three designs

 Low Power

 2 Channels

 50 Codes Per Channel

 1 to 99 Seconds and Toggle Mode

 Voltage Free Contacts

 Tamper Switch

 Individual Request to Exit Inputs

 Hacker Alarm

 “Door Failed to Close” Alarm

 “Door Forced” Alarm

Keypad Controllers

2059

Classic

2064

2131

2132

Vandal Resistant

Flush mount Back Box

Surface mount Back Box

Compact Proximity

C2 Compact Prox

This compact system consists of a proximity reader and a two-channel keypadcontroller. Each channel has its own relay output. One channel is dedicated to the proximity reader and cards. The second channel is used in conjunction with a keypad to provide code based secure switch or access control.

C2 has a 100 UID encoded card user capacity, 50 access codes and allows control of 1 or 2 doors.

The proximity reader is normally used for entry. The keypad/Control unit can be situated in a number of locations to serve as an additional role: Second Door,

Secure Switch Etc.

C2 with Switch Plate Reader

The reader supplied with this model mounts directly on to a standard UK single gang back box making it an ideal for second fix installation.

C2 with Mullion Reader

This mullion style reader is suitable for mounting on to door frames or posts or other locations that cannot make use of a single gang back box. The reader is also supplied with a stainless steel cover for a modern aesthetic.

Features:

 100 UID Credentials

 1000 Site Coded Credentials

 Crystal readers & RQEs

 Low cost solution

 50 access codes

C2 Product Codes

3859

3859-SP

3859-MULL

3859-P

C2 Compact Crystal & Keypad

C2 Compact with Switch Plate Reader

C2 Compact with Mullion Reader

C2 Compact with Panel Mount Reader

Integration

Progeny Access Control Systems have a wealth of integration options at the Software, Hardware &

Credential level.

Examples include:

 Integrated Security and Building

Management

 Time & Attendance

 Leisure Park Booking System

 Spas or gyms

 Golf / bowling clubs

CREDENTIAL HARDWARE

SOFTWARE

Integrated Security & Building

Management including Milestone

RISCO SynopSYS software integrates with Doors Enterprise through the SQL server database and also integrates with

Milestone open NVR system and enables:

 Graphic display of all of the buildings areas and doors

 Execution of remote actions such as opening doors

 Real-time monitoring of all access control events

 Customizable triggering of actions when specific events occur, such as camera pop-up when an unauthorized entry occurs

The SynopSYS Integrated Security & Building Management™

PSIM Software provides simplified site monitoring and control from a single interface, using intuitive synoptic maps. SynopSYS

Integrated Security & Building Management™ provides a central console for security officers including:

 A comprehensive overview of all security solutions

 A centralized view point of all local and remote security infrastructures

 A security audit tool to ensure that all security procedures had been followed

 The ability to identify potential weaknesses in the security system

Time & Attendance

Thinking Software ‘Rota Horizon’ software also links to Doors

Enterprise via the SQL server database. Access control Readers points are identified as terminals and the ‘Rota Horizon’ software collects data recorded from the readers. The data is then processed using defined rules to produce reports and optionally link to payroll systems.

Leisure Park Booking System

This system makes use of the automated data import facility in Doors Enterprise. The online booking system allows for booking and payment of the Leisure facility and at the end of the payment process issues a generated access code

(PIN) that will be used on site. At the same time a text file is saved with the booking details including; the PIN and its valid from and valid to dates. This is then automatically picked up by Doors Enterprise which copies the details onto its own database and updates the controllers with required access data.

Golf Club

Membership management system synchronises with Doors Enterprise using the ADI interface. This is used both for members with RFID fobs and also for Day members by changing the daily access code. The doors then have both RFID reader and Keypad to allow access for both full and day members.

Training

Office Based Training

Progeny Access Control provide training courses at Progeny House. The courses are aimed at the installer of access control systems and equipment and give the installation engineer a thorough insight into the P4 & Crystal hardware, Doors Enterprise software and related products.

Our training courses run for a full day, commencing at 9.30am with the course drawing to a close around 4pm. Lunch and all refreshments are provided.

Our highly experienced technical team deliver the training courses. Not only will all delegates have both an enjoyable and rewarding day with us but will also gain valuable technical knowledge which will have a positive impact on your day-today jobs.

Courses are held once a month, if you would like to attend, please book online:www.progeny.co.uk/training/

Or contact our customer support team on 01254 883348.

On Site Training

Progeny can also provide on-site training. The course length will be approximately five hours long and will provide an overview of the product along with a solid grounding on use and the setup of the system on Doors Enterprise.

On Site Commissioning and End User Training

Progeny can provide a commissioning day and, if required, or time permitting, end user training. The hardware installation will be inspected and tested, and the software installation (if an online system) will also be inspected and tested for correct setup. A commissioning day commences at 10:00 and lasts until approximately 16:00.

Compliance

We are committed to working closely with our suppliers, distributors, installers and customers to ensure that we are properly prepared and taking the necessary steps to comply with any European Directives. More detailed information on compliance can be found on our website.

CE

CE marking is a declaration by the manufacturer that the product meets all the appropriate provisions of the relevant legislation implementing certain European Directives.

WEEE

(Waste Electrical & Electronics Equipment Directive)

This directive is aimed at the reduction of waste from Electrical and Electronic Equipment and to improve the environment. Producers are encouraged to improve the life cycles of the equipment they manufacture.

DDA 2005

(Disability Discrimination Act 2005)

This directive builds on and extends earlier disability discrimination legislation, principally the Disability Discrimination Act

1995. Under the Act, small to medium sized businesses have to make reasonable adjustments so they do not discriminate against disabled customers or employees. Progeny access control products have features to help meet these requirements including:

 Touch Switches - Clear labelling & no moving parts

 P4 Controller - Two stage lock release for automatic door openers

 Controller delay to lock release

 P4 Controller auto relock feature

 P4 Controller with Crystal Readers - Adjustable sound levels

Keypad Reader - Adjust the sound levels

RoHS

(Restricted Use of Certain Hazardous Substances Directive)

Directive 2002/95/EC on the Restriction of the use of certain Hazardous Substances in Electrical and Electronic Equipment (RoHS)

IP Ratings

(Ingress Protection)

IP Ratings are defined in international standard EN 60529 (British BS EN 60529:1992, European IEC 60509:1989).

How to Find Us

Directions From M65 J7

Exit M65 at Junction 7

At roundabout, take the exit onto Dunkenhalgh

Way (A6185) sign posted Accrington/Clitheroe.

At the lights turn right onto Blackburn Rd (A678)

At the next lights turn left onto Whalley Rd

(A680)

Continue on A680 for 1.2 Miles

At the lights (sign posted Great Harwood), turn left into Hyndburn Road

Take the first left onto Alan Ramsbottom Way, leading to Heys Lane Industrial Estate.

Continue along Alan Ramsbottom Way for approximately 600m and Progeny House on the right.

The right turn leading to Union Court is just past

Progeny House.

BSB Electronics Ltd

Progeny House

Union Court

Heys Lane Industrial Estate

Great Harwood

Lancashire

T: 01254 883348

F: 01254 889113

www.progeny.co.uk

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement