When it comes to optimizing productivity and workforce planning, most businesses can use an additional set of hands to undertake larger projects or complete those in progress. Digital roots tech provide complete solutions from Design, Develop, Managed Services and Support of your company software projects

ACCESS CONTROL SECURITY SYSTEM

An access control system (ACS) is a type of security that manages and controls who or what is allowed entrance to a restricted or high security area, environment or facility. It identifies visitors that have access to a restricted area based on the authorization assigned by system. Our system provides two type of access control system.

   Physical Access Control
   Logical Access Control

Physical Access Control limits to physical access in restricted area and allow physical access to visitors from check post.
Logical Access Control system allow system user to access and view files & information and monitor their assigned cctv cameras and biometric devices and visitor information with their identification authentication & authorization information.
Logical access controlled from Station Head Quarter, they allow cameras and devices to check post and monitoring rooms and Control Room.
Both are often important parts of layered defense to protect access control in restricted area.
This Access control system allows two types of visitors

   Temporary Visitors
   Regular Visitors

Typically, Authorization assigned to Temporary visitor with their security token which includes access area and time limit by check post reception visitor step towards to entry gate and swipes his/her security to electronic device and system shows entry access authorization information along with personal information, cctv live view and same when visitor came back to get out from restricted area.
Same process for Regular visitor but their authorization assigned through Station head Quarter after intelligence and police verification and some other required documents station head quarter assign / print a smart card for regular visitor which include personal information, vehicle information allowed for restricted area and sponsored information with expiration date.
Control Room can see all entry members from all (In & Out) stations with their check post details and authorization access, suspicious alerts to control room, expired entry and unauthorized access alerts to take some physical action.
System includes multiple reports according to user requirements to analyze visitors access (In & Out) in restricted area.

Technology:

Scope:  Client/Server Desktop Application
Versions:  Intranet
Technology:  Visual Studio, Zkteco Biometric Devices
SQL Server Reports:  Microsoft SQL Server