SlideShare a Scribd company logo
Warm Welcome
Presentation Agenda
•COSEC Access Control
•Applications
•COSEC Solution
•Key Features
 Advanced Access Control
 Emergency Handling
 Monitoring and Controlling
 Hardware
•Access Control Reports and Features List
COSEC Access Control
What is Access Control?
• Prevent Unauthorized Entry
• Protects and Preserves Enterprise’s Resources
• Allow Authorized People Entry at Specified Time
• Round the Clock Security
What is COSEC Access Control?
• Advanced Access Control for SOHO, SMB, SME and LE
• Fingerprint, Card and PIN
• Time, Zone and User based Access Control
• Access Zone, Access Level and Time Zone
• Employee-wise Access Rights
• Higher Security in Sensitive Area
• Alarm Monitoring and Supervision
How Access Control Works?
Access

Read

Process

Respond

User Access the
System with
Credentials

Reader Reads
Information from
Card, Biometric
ID or PIN

Compare User
Identity with Its
Database

Respond with
Allow or Deny
Command to
User /Door
Benefits of Access Control System
• Higher Security for Organization and Employees
• Protects Enterprise Assets
• Restricts Unauthorized Access
• Eliminates Lock and Key Problems
• Provides Audit Trail
• Complete History Logging
• Monitor Status of Devices throughout a Facility
•

Reduce Cost of Security Personnel
Why COSEC Access Control?
• Deliver Advanced Security Features
• Centralized Monitoring and Control
• Superior Control over Employees and Visitor Access
• User-wise Access Rights
• User, Zone and Time based Access Control
• Input and Output Port Linking
• Integration with Fire Alarm Panel, Surveillance System etc.
Target Customers...

Hospitals

Government
Organizations

Small Offices

Corporate Offices

Financial Institutes Shopping Malls

R & D Labs

Factories
Target Customers…

Remote Sites

Retail Stores

Clubs

And Many
More…
Hotels

Server Rooms

Educational
Institutes
Applications
Basic Access Control Application
COSEC Application Server

EM Lock

Ethernet

Exit Reader
COSEC
Door Controller
Basic Access Control Application
• Fig Shows COSEC Connectivity with Door Lock and Exit
Reader for an Access Control Application without any
Complex Wiring
• Door Controller is Connected with COSEC Application
Server through Ethernet
• Whole system is Centrally Monitored and Controlled by
COSEC Application Software in Real-time
Multi Floor Application
Campus Application
Canteen

Head Office

COSEC Server

R&D Lab

Door Controller

Factory
COSEC Layered Architecture
COSEC Application Software
• Complete and Powerful Web based Application Software
• Controls up to 1000 PANEL LITE and 65,000 Door Controllers
• Manage up to 1 Million Users
• Time-attendance, Access Control, Leave Management,
Visitor Management, Employee Self Service, Roster
Management and e-Canteen Management
• Real-time Monitoring and Control
• Comprehensive Reports Generation
• Integration with ERP, Active Directory, HRM, Tally and
Payroll
COSEC Hardware Solution
COSEC PANEL LITE
• Controls up to 75 Door Controllers
 Maximum 75 Door Controllers on Ethernet
 Maximum 32 Door Controllers on RS-485
• Ethernet, RS-485, Wi-Fi and 3G Interface
• 25,000 Users Capacity
• Store 1,00,000 Events in Log
• Supervised Alarm Input Port and Auxiliary Output Relay
Contact
• Built-in USB Port
• Audio Visual Indication in terms of LEDs and Buzzer
When COSEC PANEL LITE is Required ?
• When More than 2000 Users per Door Controller are Required
• Greater than 50,000, Local Events Storage is Required
• When below Additional Security Features are Needed:

 Access Groups

 Home Zone

 Access Levels

 Visit Zone

 Day Light Saving

 Input-output Ports Link

 Dead-Man Zone

 Man Trap

 Do Not Disturb

 Soft Override

 Duress Detection

 Time Zone based Access

 Who’s In

 Guard Tour
COSEC PANEL LITE Connectivity
COSEC Door
• 128×64 Dot Matrix Display with Backlit
• 16 Touch Sense Keys
• Fingerprint and Card Reader
• Ethernet, RS-485 and Wi-Fi Interface
• 50,000 Events Storage
• Built-in Auxiliary Input, Auxiliary Output and Relay Port
• 4 LEDs and Buzzer
• USB Port for Data Transfer and 3G Connectivity
COSEC Door Connectivity
COSEC Door Series Models

CAP

FOP

FOW

FOT
COSEC PATH Series Models

DCCX

DCFX

X = E: EM Proximity Card, I: HID iClASS Card, M: Mifare Smart Card
COSEC NGT Series Model

NGT FCX
COSEC Reader
Exit Reader
• Fingerprint or Contactless Card Reader
• Wiegand and RS-232 Interface
• Allowed, Denied, Status and Alarm LEDs
• Built-in Buzzer
• Power Supply from COSEC Door
Card based Readers

COSEC READER CA

COSEC PATH RDCE COSEC PATH RDCM COSEC PATH RDCI
Fingerprint based Readers

COSEC READER FO

COSEC PATH RDFE

COSEC PATH RDFM

COSEC PATH RDFI
COSEC Enrollment Station
• Enrollment Stations for Easy User Enrollment
• Card and Finger Enrollment
• Desktop based Devices
COSEC Card Personality Module
• Pluggable Card Reader Module
• Inserted at the backside of COSEC Door Controller and COSEC
READER CA
• EM PROX
• HID PROX
• HID iCLASS
• Mifare

COSEC CPM
Electronic Lock
• COSEC Door Controller Supports Various Electronic Locks
 Electro Magnetic Lock
 Bolt Lock
 Strike Lock
Key Features
Access Group
• Group of Persons Carrying Similar Work Profile
• Easy to Assign Same Access Policies
• Supports up to 99 Access Groups
Access Group-1

Access Group-2
Access Zone
•
•
•
•

Controlled Area to Keep Out Unauthorized Users
Multiple Zones can be Created on Requirement
Creation of Sub Zones or Logical Zones Inside a Single Zone
Various Time based Access Policies can be Assigned to a Zone
Dispatch

Documentation

Main Zones
Sub Zones

QC
Production

`

Manufacturing

Hardware
R&D

Software
Access Levels
• Give Rights to a User to Enter into a Controlled Area or a Zone
• Up to 15 Access Levels for Zones and Users
• If User Access Level is Higher than or Equal to Zone Access
Level, User is Allowed in that Zone
• Different Access Levels During Working Hours, Break Hours and
Non-working Hours
Access Level based Access
Zone Access Level 8

User Access Level =>8
Home Zone
• Pre-defined Area for an User to Work
• Allow User to Access the Zone without Checking his Access
Level during Working and Break Hours
• User’s Access Level is Checked During Non-Working Hours
Zone Access Mode
• Various Zone Access Modes to Enable Users to Access a Zone
• Administrator can Select more than One Mode for Higher
Security
• Flexibility to Select Zone Access Mode
 Card
Fingerprint
PIN + Card + Fingerprint

 Card + Fingerprint
 Card + PIN
 Fingerprint + PIN
 Any
2-Person Access
• Access is Allowed only when Two Authorized Persons Use
their Access Rights within a Defined Amount of Time
• Maximum 16 Groups with 20 Users in Each Group
• Useful for High Security Areas like ATM, Record Room, Safe
Deposit Vault etc.
First-in User
• Door Opens Only after Designated Person Make the First Entry
• 4 First-in User Lists with 25 Users in Each List
• Useful for Areas where Supervisor needs to Make First Entry
followed by Workers
Occupancy Control
• Controls Number of Users in a Controlled Area or a Zone
• Users are Restricted after Pre-defined Number is Reached
• Great Use in Conference Hall, Canteen, Public Hall etc.,
where Limited Space is Available
Man-Trap
•
•
•
•
•

Useful for Multiple Doors, Arranged in a Sequence
Regulate Opening and Closing of Doors
Second Door will Open only After First Door has Closed
Manage Traffic and Control Dust and Heat
Useful to Restrict Intruder from Escaping the Premises
Quickly
• Mantrap wait & Door Pulse timer limit is 65535 seconds.
Do Not Disturb(DND) Zone
• User Entry is Restricted in a DND Zone
• Administrator can Declare any Zone as a DND Zone
• Zone Access Level is Changed to Highest
• VIP can Override this Zone
• Useful for Business Meeting, Seminar, Operation Theater etc.
where Privacy is Vital

D
N
D
Anti-Pass Back
• Prevent a Card Holder from Passing his Card back to a Second
Person to Gain Entry in a Controlled Area
• Card Holder can Make Re-entry only after Exit Mark
• Useful for Maintaining Accurate Record of the Number of
People in a Controlled Area
• Two Modes:
 Anti-Pass Back Local
 Anti-Pass Back Global
• Two Types:
 Hard Anti-Pass Back: Does not Allow User but Keep Log in
the System
 Soft Anti-Pass Back: Allow User with Log In the System
Blocked User
• Blocked Users are Restricted from using their Access Rights
• Access Privileges are Withdrawn Temporarily, but not the
Deletion of Identity from the Database
• System Blocks User for
• Absentee User
• Consecutive Attempts to Access Unauthorized Zone
• Consecutive Attempts per Minutes in a Authorized Zone
VIP Access
• Empower User to Access any Controlled Area or a Zone
• Any Person Holding VIP Label has Highest Access Level(15)
• Administrator can Assign VIP Access to any User
Guard Tour
• Ensures that Security Guard makes Round of the Facility During
Non- working Hours
• Guard has to Show his Identity on Various Check Points on
Specified Time
• Record can be viewed later by System Administrator
• System can assign up to Four Cards
Facility Code
• Unique Number String Encoded on Card
• Common Code for Entire Organisation
• System Identify User based on his Basic Identity(Facility
Code) to Grant Permission
• Very Useful when System is in a Degraded Mode

Facility Code
DVR Integration
• Matrix/Dahua DVR can be Integrated with COSEC
• Capture Photograph of an User on Allowed or Denied
• Administrator can Check from Software who have Access the
Door
• Very Important for Security and Attendance Purpose
Dead-Man Zone
• Zone or Area where there is a Threat of Person’s Physical
Safety
• Administrator can Declare any Zone as a Dead-Man Zone
• User has to Show his Identity every time before Expiration of
Predefined Time Period
• Once Timer is Expired, Alarm Gets Activated
• Very Useful Feature for Users who are Working in Mines,
Chemical Plants, Nuclear Lab etc.
Tamper Detection
• System Generates Alarm on Detection of any Tampering
• Tamper Detection on Door Controller and Reader
• Generates Alarm on Door Controller
• Can be Disabled Temporarily for Maintenance Purpose
• Useful Security Feature
Smart Identification
• It helps in overcoming limitation of number of users
• Uses information stored in smart card
• No need to store any information in door controller
• Number of users passing through door controller can be
unlimited
Emergency Handling
Degrade Mode

System will Switch
into Degrade Mode
Duress Detection
• Useful Feature when User is Forced to Use his Access Rights
Under Threat
• User Need to Dial his Access Code Followed by a Secret Code
for Duress Detection
• System Opens the Door and at the Same Time Informs
Concerned Person without Giving any Local Alarm
• Great Security Feature
Soft Override Feature
• Deactivate Various Functions Temporary from Monitoring
Window
• Temporally Deactivate Functions
• Features can be Disable like:
 2-Person Rule
 First-In User Rule
 Open Door Lock
 Lock Door
Who’s In
• Generate List of Users Inside a Controlled Area at that
Particular Time
• Useful in Emergency
Monitoring and Controlling
COSEC Live Monitoring Window
• Real-time Events Monitoring and Control
• Live Status of Door Controllers and PANEL LITE
• Alarm Monitoring and Control
• Firmware Up gradation
• Temporary Deactivate Function/Features
• Auxiliary Input and Output Status
• Automatic Events Download
Input-Output Groups and Linking
• Link Input and Output Port of the COSEC Door Controller and
PANEL LITE
• Automatically Activate Output Port on Activation of Input
Port
• Program Various Functions Like:
•

Unlock Door on Fire Detection

•

Capture User Photo when he is Allowed

•

Start Video Recording on any Motion Detected
Alarm
• Various Alarms on the Occurrence of Pre-defined Situations
• Available on both PANEL LITE and Door Controllers
• Built-in Alarm Detection and Management
• Admin can Control, Acknowledge, Clear and Monitor Alarm in a
Real-time
• Various Alarms Like Tamper Alarm, Mains Fail, Battery Fail
Alarm etc.
• Audio Visual Indication in terms of LEDs and Buzzer
Time-Trigger Function
• Automatically Activate Output Port based on Pre-defined Time
• Used for many Time based Applications
• School Bell, Siren, Camera etc. can be Activated without any
Manual Involvement
Hardware Connections
Auxiliary Ports
•
•
•
•
•

Auxiliary Input and Output Port
Input Port for Connecting Smoke Detector, Sensor etc.
Output Port for Connecting Siren, Strobe etc.
Available on both PANEL LITE and Door Controllers
Can be Programmed for Various Applications Like Camera
should Start Recording when any Motion is Detected in the
Premises
USB Connectivity
• Easy Data Transfer from Controller to Server
• Easy Firmware Upgrade of Door Controller and PANEL LITE
• No Physical Connectivity is Required between Door Controller
and Server
• Ideal Application for Remote Applications
• For Connecting Wi-Fi or 3G/GSM/GPRS/CDMA Modems
Wi-Fi Connectivity
• Simple Connectivity between Controller and Server
• No Wiring is Required
• Real-time Events and Report Generation
• Ideal for Applications where Ethernet is not Possible because
of Aesthetic Purpose or Architectural Limitations
3G Connectivity
• Wireless Connectivity between DOORs/PANEL LITE and Server
• Faster Data Transactions over 3G Communication Speed
• Real-time Events and Report Generation
• Perfect for Remote Location Applications where Ethernet or
RS-485 is Not Possible
Access Control Reports
Access Control Reports List
Reports List
• Access Zone
• Access Group
• Access Group-wise Time Zone
• Functional Group
• Time Zone
• 2-Person Rule
• First-In User
• Guard Tour
• Input Port Group
• Output Port Group
• Door Held Open
• Zone Accessed by User
Guard Tour Report
Zone Accessed by User
Door Held Open
I/O Linking Report
Feature List
Feature list

*These features are available with COSEC PANEL LITE
Feature List
Matrix Security Solutions: COSEC - Access Control and Time-Attendance
For Further Information Please Contact:
Email ID: Security@MatrixComSec.com
Tel: +91 265 2630555
Visit us at www.MatrixComSec.com
Version: V2R1

More Related Content

PDF
Matrix Cosec Acm Presentation V1 R1
PDF
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
PDF
Hacking RF based IoT devices
PPTX
Rfid technology
PPTX
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
PDF
Comp4010 lecture11 VR Applications
PPTX
Presentation RFID
PPTX
IMU General Introduction
Matrix Cosec Acm Presentation V1 R1
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Hacking RF based IoT devices
Rfid technology
Comparison of MQTT and DDS as M2M Protocols for the Internet of Things
Comp4010 lecture11 VR Applications
Presentation RFID
IMU General Introduction

What's hot (20)

PPTX
Wireless gesture controlled robotic arm
PPT
RFID Technology
PPTX
Introduction to Sensor
PDF
Why Check Point - Top 4 Facts
PPTX
PPT
Sensors
PPT
Time-Based Blind SQL Injection using Heavy Queries
PDF
Multi Object Filtering Multi Target Tracking
PPTX
Introduction to shodan
PPT
Sensors
PPT
Sensors by saurabh jawale
PPTX
Industrial protocols for pentesters
PPT
RFID Technology
PPTX
PDF
001 introduction Fortigate Administration Introduction
PPTX
Rfid ppt anjali 12mt07ind002
PDF
Design of Industrial Automation Functional Specifications for PLCs, DCs and S...
PPTX
Top 10 Design & Security Tips to Elevate Your SCADA System
PDF
The Art of VoIP Hacking - Defcon 23 Workshop
Wireless gesture controlled robotic arm
RFID Technology
Introduction to Sensor
Why Check Point - Top 4 Facts
Sensors
Time-Based Blind SQL Injection using Heavy Queries
Multi Object Filtering Multi Target Tracking
Introduction to shodan
Sensors
Sensors by saurabh jawale
Industrial protocols for pentesters
RFID Technology
001 introduction Fortigate Administration Introduction
Rfid ppt anjali 12mt07ind002
Design of Industrial Automation Functional Specifications for PLCs, DCs and S...
Top 10 Design & Security Tips to Elevate Your SCADA System
The Art of VoIP Hacking - Defcon 23 Workshop
Ad

Viewers also liked (20)

PPTX
Slide 5 keys
PPT
Managing Attendance Effectively
PPTX
Fingerprint Time Attendance Management System Bangalore - 09066656366
PPS
TimeTrax: Biometric Based Attendance System
PPT
Attendance Management: Getting Staff to Come to Work
PPTX
Auto theft prevention using fingerprint scanner
PPTX
Smart Attendance Management System Using Android WIFI Technology
PPT
Facial recognition technology by vaibhav
PPTX
Why Do You Need BIO-METRIC Time and Attendance?
PPT
BAASS Connect 2013 - Time and Attendance
PDF
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
PDF
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
PPSX
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
PPTX
Face detection By Abdul Hanan
PPTX
Cuckoo - Time & Attendance by Opportune
PPT
Automatic Attendance system using Facial Recognition
PPTX
Face Recognition based Lecture Attendance System
PDF
Matrix Cosec Tam Presentation V1 R1
PPTX
Face Recognition System for Door Unlocking
PPTX
Inttelix OnTime
Slide 5 keys
Managing Attendance Effectively
Fingerprint Time Attendance Management System Bangalore - 09066656366
TimeTrax: Biometric Based Attendance System
Attendance Management: Getting Staff to Come to Work
Auto theft prevention using fingerprint scanner
Smart Attendance Management System Using Android WIFI Technology
Facial recognition technology by vaibhav
Why Do You Need BIO-METRIC Time and Attendance?
BAASS Connect 2013 - Time and Attendance
ENSURE YOU ARE HIRING THE BEST AND BRIGHTEST TALENT
MORE THAN JUST CONTENT: WHY DEEP SKILLS DEVELOPMENT REQUIRES A LEARNING ECOSY...
STUDENTS ATTITUDE AND ATTENDANCE powerpoint.
Face detection By Abdul Hanan
Cuckoo - Time & Attendance by Opportune
Automatic Attendance system using Facial Recognition
Face Recognition based Lecture Attendance System
Matrix Cosec Tam Presentation V1 R1
Face Recognition System for Door Unlocking
Inttelix OnTime
Ad

Similar to Matrix Security Solutions: COSEC - Access Control and Time-Attendance (20)

PDF
Matrix cosec acm_presentation_v1_r1
PPTX
Access control system
PDF
MATRIX Cosec Introduction New
PDF
access control systems.pdf Physical Security Domains
PPTX
Access-control-system
PDF
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PDF
Matrix cosec tam_presentation_v1_r1
PPT
Access control basics-2
PPT
managingyouraccesscontrolsystems-130223182036-phpapp01
PPT
Latest Web based Access Management Software - Resilient Technologies
DOCX
Access control
PDF
Bosch AIM-AEC21-CVT Data Sheet
PDF
Matrix Cosec Presentation
PDF
Matrix cosec presentation
PPTX
Powerpoint Marketing Template
PDF
Case Study: Hero Moto Corp Ltd.
PDF
Act1000
PDF
protegegx-brochure-ict-access-control- system
PDF
Step Into Security Webinar - Physical Security Integration & Access Control -...
PPTX
Matrix People Mobility Solution
Matrix cosec acm_presentation_v1_r1
Access control system
MATRIX Cosec Introduction New
access control systems.pdf Physical Security Domains
Access-control-system
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
Matrix cosec tam_presentation_v1_r1
Access control basics-2
managingyouraccesscontrolsystems-130223182036-phpapp01
Latest Web based Access Management Software - Resilient Technologies
Access control
Bosch AIM-AEC21-CVT Data Sheet
Matrix Cosec Presentation
Matrix cosec presentation
Powerpoint Marketing Template
Case Study: Hero Moto Corp Ltd.
Act1000
protegegx-brochure-ict-access-control- system
Step Into Security Webinar - Physical Security Integration & Access Control -...
Matrix People Mobility Solution

More from Matrix Comsec (20)

PPTX
Time Attendance Management System
PPTX
Video Management Solution Providers India
PPTX
Hybrid Video Surveillance Systems India | Video Surveillance
PPTX
Become a Partner: A Few Good Reasons why it Makes Sense to PARTNER WITH MATRIX
PPT
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
PPT
Matrix Telecom Solutions: SETU VGB - Fixed VoIP to GSM/3G-ISDN BRI Gateway
PPT
Matrix Telecom Solutions: User Terminals Introduction
PPT
Matrix Telecom Solutions: VISION - The Office Communicator
PPTX
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
PPTX
Matrix Telecom Solutions: ETERNITY MEX - The ULSB MK III Switch
PPT
Matrix Telecom Solutions: SPARSH VP248 - Feature-rich SIP Phones
PPT
Matrix Telecom Solutions: NAVAN CNX200 - Office-in-a-Box Solution for Small B...
PPTX
Matrix Security Solutions: SATATYA HVR - Hybrid Video Recorders
PPTX
Matrix Security Solutions: SATATYA NVR - Network Video Recorder
PPT
Matrix e-Canteen Management (CMM)
PPT
Roster Management Module (RSM)
PPTX
Matrix Security Solutions: SATATYA DVR - Digital Video Recorders
PPT
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
PPT
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
PPT
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS Gateways
Time Attendance Management System
Video Management Solution Providers India
Hybrid Video Surveillance Systems India | Video Surveillance
Become a Partner: A Few Good Reasons why it Makes Sense to PARTNER WITH MATRIX
Matrix Video Surveillance Solution: SATATYA - The Persistent Vision
Matrix Telecom Solutions: SETU VGB - Fixed VoIP to GSM/3G-ISDN BRI Gateway
Matrix Telecom Solutions: User Terminals Introduction
Matrix Telecom Solutions: VISION - The Office Communicator
Matrix Telecom Solutions: ETERNITY - Building Intercom Solution
Matrix Telecom Solutions: ETERNITY MEX - The ULSB MK III Switch
Matrix Telecom Solutions: SPARSH VP248 - Feature-rich SIP Phones
Matrix Telecom Solutions: NAVAN CNX200 - Office-in-a-Box Solution for Small B...
Matrix Security Solutions: SATATYA HVR - Hybrid Video Recorders
Matrix Security Solutions: SATATYA NVR - Network Video Recorder
Matrix e-Canteen Management (CMM)
Roster Management Module (RSM)
Matrix Security Solutions: SATATYA DVR - Digital Video Recorders
Matrix Telecom Solutions: SETU VTEP - Fixed VoIP to T1/E1 PRI Gateway
Matrix Telecom Solutions: SETU VGFX - Fixed VoIP to GSM/3G-FXO-FXS Voice Gat...
Matrix Telecom Solutions: SETU VFXTH - Fixed VoIP to FXO-FXS Gateways

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Spectroscopy.pptx food analysis technology
PDF
Getting Started with Data Integration: FME Form 101
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Spectral efficient network and resource selection model in 5G networks
NewMind AI Weekly Chronicles - August'25-Week II
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
A comparative analysis of optical character recognition models for extracting...
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Assigned Numbers - 2025 - Bluetooth® Document
Spectroscopy.pptx food analysis technology
Getting Started with Data Integration: FME Form 101
MYSQL Presentation for SQL database connectivity
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...

Matrix Security Solutions: COSEC - Access Control and Time-Attendance

  • 2. Presentation Agenda •COSEC Access Control •Applications •COSEC Solution •Key Features  Advanced Access Control  Emergency Handling  Monitoring and Controlling  Hardware •Access Control Reports and Features List
  • 4. What is Access Control? • Prevent Unauthorized Entry • Protects and Preserves Enterprise’s Resources • Allow Authorized People Entry at Specified Time • Round the Clock Security
  • 5. What is COSEC Access Control? • Advanced Access Control for SOHO, SMB, SME and LE • Fingerprint, Card and PIN • Time, Zone and User based Access Control • Access Zone, Access Level and Time Zone • Employee-wise Access Rights • Higher Security in Sensitive Area • Alarm Monitoring and Supervision
  • 6. How Access Control Works? Access Read Process Respond User Access the System with Credentials Reader Reads Information from Card, Biometric ID or PIN Compare User Identity with Its Database Respond with Allow or Deny Command to User /Door
  • 7. Benefits of Access Control System • Higher Security for Organization and Employees • Protects Enterprise Assets • Restricts Unauthorized Access • Eliminates Lock and Key Problems • Provides Audit Trail • Complete History Logging • Monitor Status of Devices throughout a Facility • Reduce Cost of Security Personnel
  • 8. Why COSEC Access Control? • Deliver Advanced Security Features • Centralized Monitoring and Control • Superior Control over Employees and Visitor Access • User-wise Access Rights • User, Zone and Time based Access Control • Input and Output Port Linking • Integration with Fire Alarm Panel, Surveillance System etc.
  • 9. Target Customers... Hospitals Government Organizations Small Offices Corporate Offices Financial Institutes Shopping Malls R & D Labs Factories
  • 10. Target Customers… Remote Sites Retail Stores Clubs And Many More… Hotels Server Rooms Educational Institutes
  • 12. Basic Access Control Application COSEC Application Server EM Lock Ethernet Exit Reader COSEC Door Controller
  • 13. Basic Access Control Application • Fig Shows COSEC Connectivity with Door Lock and Exit Reader for an Access Control Application without any Complex Wiring • Door Controller is Connected with COSEC Application Server through Ethernet • Whole system is Centrally Monitored and Controlled by COSEC Application Software in Real-time
  • 15. Campus Application Canteen Head Office COSEC Server R&D Lab Door Controller Factory
  • 17. COSEC Application Software • Complete and Powerful Web based Application Software • Controls up to 1000 PANEL LITE and 65,000 Door Controllers • Manage up to 1 Million Users • Time-attendance, Access Control, Leave Management, Visitor Management, Employee Self Service, Roster Management and e-Canteen Management • Real-time Monitoring and Control • Comprehensive Reports Generation • Integration with ERP, Active Directory, HRM, Tally and Payroll
  • 19. COSEC PANEL LITE • Controls up to 75 Door Controllers  Maximum 75 Door Controllers on Ethernet  Maximum 32 Door Controllers on RS-485 • Ethernet, RS-485, Wi-Fi and 3G Interface • 25,000 Users Capacity • Store 1,00,000 Events in Log • Supervised Alarm Input Port and Auxiliary Output Relay Contact • Built-in USB Port • Audio Visual Indication in terms of LEDs and Buzzer
  • 20. When COSEC PANEL LITE is Required ? • When More than 2000 Users per Door Controller are Required • Greater than 50,000, Local Events Storage is Required • When below Additional Security Features are Needed:  Access Groups  Home Zone  Access Levels  Visit Zone  Day Light Saving  Input-output Ports Link  Dead-Man Zone  Man Trap  Do Not Disturb  Soft Override  Duress Detection  Time Zone based Access  Who’s In  Guard Tour
  • 21. COSEC PANEL LITE Connectivity
  • 22. COSEC Door • 128×64 Dot Matrix Display with Backlit • 16 Touch Sense Keys • Fingerprint and Card Reader • Ethernet, RS-485 and Wi-Fi Interface • 50,000 Events Storage • Built-in Auxiliary Input, Auxiliary Output and Relay Port • 4 LEDs and Buzzer • USB Port for Data Transfer and 3G Connectivity
  • 24. COSEC Door Series Models CAP FOP FOW FOT
  • 25. COSEC PATH Series Models DCCX DCFX X = E: EM Proximity Card, I: HID iClASS Card, M: Mifare Smart Card
  • 26. COSEC NGT Series Model NGT FCX
  • 27. COSEC Reader Exit Reader • Fingerprint or Contactless Card Reader • Wiegand and RS-232 Interface • Allowed, Denied, Status and Alarm LEDs • Built-in Buzzer • Power Supply from COSEC Door
  • 28. Card based Readers COSEC READER CA COSEC PATH RDCE COSEC PATH RDCM COSEC PATH RDCI
  • 29. Fingerprint based Readers COSEC READER FO COSEC PATH RDFE COSEC PATH RDFM COSEC PATH RDFI
  • 30. COSEC Enrollment Station • Enrollment Stations for Easy User Enrollment • Card and Finger Enrollment • Desktop based Devices
  • 31. COSEC Card Personality Module • Pluggable Card Reader Module • Inserted at the backside of COSEC Door Controller and COSEC READER CA • EM PROX • HID PROX • HID iCLASS • Mifare COSEC CPM
  • 32. Electronic Lock • COSEC Door Controller Supports Various Electronic Locks  Electro Magnetic Lock  Bolt Lock  Strike Lock
  • 34. Access Group • Group of Persons Carrying Similar Work Profile • Easy to Assign Same Access Policies • Supports up to 99 Access Groups Access Group-1 Access Group-2
  • 35. Access Zone • • • • Controlled Area to Keep Out Unauthorized Users Multiple Zones can be Created on Requirement Creation of Sub Zones or Logical Zones Inside a Single Zone Various Time based Access Policies can be Assigned to a Zone Dispatch Documentation Main Zones Sub Zones QC Production ` Manufacturing Hardware R&D Software
  • 36. Access Levels • Give Rights to a User to Enter into a Controlled Area or a Zone • Up to 15 Access Levels for Zones and Users • If User Access Level is Higher than or Equal to Zone Access Level, User is Allowed in that Zone • Different Access Levels During Working Hours, Break Hours and Non-working Hours
  • 37. Access Level based Access Zone Access Level 8 User Access Level =>8
  • 38. Home Zone • Pre-defined Area for an User to Work • Allow User to Access the Zone without Checking his Access Level during Working and Break Hours • User’s Access Level is Checked During Non-Working Hours
  • 39. Zone Access Mode • Various Zone Access Modes to Enable Users to Access a Zone • Administrator can Select more than One Mode for Higher Security • Flexibility to Select Zone Access Mode  Card Fingerprint PIN + Card + Fingerprint  Card + Fingerprint  Card + PIN  Fingerprint + PIN  Any
  • 40. 2-Person Access • Access is Allowed only when Two Authorized Persons Use their Access Rights within a Defined Amount of Time • Maximum 16 Groups with 20 Users in Each Group • Useful for High Security Areas like ATM, Record Room, Safe Deposit Vault etc.
  • 41. First-in User • Door Opens Only after Designated Person Make the First Entry • 4 First-in User Lists with 25 Users in Each List • Useful for Areas where Supervisor needs to Make First Entry followed by Workers
  • 42. Occupancy Control • Controls Number of Users in a Controlled Area or a Zone • Users are Restricted after Pre-defined Number is Reached • Great Use in Conference Hall, Canteen, Public Hall etc., where Limited Space is Available
  • 43. Man-Trap • • • • • Useful for Multiple Doors, Arranged in a Sequence Regulate Opening and Closing of Doors Second Door will Open only After First Door has Closed Manage Traffic and Control Dust and Heat Useful to Restrict Intruder from Escaping the Premises Quickly • Mantrap wait & Door Pulse timer limit is 65535 seconds.
  • 44. Do Not Disturb(DND) Zone • User Entry is Restricted in a DND Zone • Administrator can Declare any Zone as a DND Zone • Zone Access Level is Changed to Highest • VIP can Override this Zone • Useful for Business Meeting, Seminar, Operation Theater etc. where Privacy is Vital D N D
  • 45. Anti-Pass Back • Prevent a Card Holder from Passing his Card back to a Second Person to Gain Entry in a Controlled Area • Card Holder can Make Re-entry only after Exit Mark • Useful for Maintaining Accurate Record of the Number of People in a Controlled Area • Two Modes:  Anti-Pass Back Local  Anti-Pass Back Global • Two Types:  Hard Anti-Pass Back: Does not Allow User but Keep Log in the System  Soft Anti-Pass Back: Allow User with Log In the System
  • 46. Blocked User • Blocked Users are Restricted from using their Access Rights • Access Privileges are Withdrawn Temporarily, but not the Deletion of Identity from the Database • System Blocks User for • Absentee User • Consecutive Attempts to Access Unauthorized Zone • Consecutive Attempts per Minutes in a Authorized Zone
  • 47. VIP Access • Empower User to Access any Controlled Area or a Zone • Any Person Holding VIP Label has Highest Access Level(15) • Administrator can Assign VIP Access to any User
  • 48. Guard Tour • Ensures that Security Guard makes Round of the Facility During Non- working Hours • Guard has to Show his Identity on Various Check Points on Specified Time • Record can be viewed later by System Administrator • System can assign up to Four Cards
  • 49. Facility Code • Unique Number String Encoded on Card • Common Code for Entire Organisation • System Identify User based on his Basic Identity(Facility Code) to Grant Permission • Very Useful when System is in a Degraded Mode Facility Code
  • 50. DVR Integration • Matrix/Dahua DVR can be Integrated with COSEC • Capture Photograph of an User on Allowed or Denied • Administrator can Check from Software who have Access the Door • Very Important for Security and Attendance Purpose
  • 51. Dead-Man Zone • Zone or Area where there is a Threat of Person’s Physical Safety • Administrator can Declare any Zone as a Dead-Man Zone • User has to Show his Identity every time before Expiration of Predefined Time Period • Once Timer is Expired, Alarm Gets Activated • Very Useful Feature for Users who are Working in Mines, Chemical Plants, Nuclear Lab etc.
  • 52. Tamper Detection • System Generates Alarm on Detection of any Tampering • Tamper Detection on Door Controller and Reader • Generates Alarm on Door Controller • Can be Disabled Temporarily for Maintenance Purpose • Useful Security Feature
  • 53. Smart Identification • It helps in overcoming limitation of number of users • Uses information stored in smart card • No need to store any information in door controller • Number of users passing through door controller can be unlimited
  • 55. Degrade Mode System will Switch into Degrade Mode
  • 56. Duress Detection • Useful Feature when User is Forced to Use his Access Rights Under Threat • User Need to Dial his Access Code Followed by a Secret Code for Duress Detection • System Opens the Door and at the Same Time Informs Concerned Person without Giving any Local Alarm • Great Security Feature
  • 57. Soft Override Feature • Deactivate Various Functions Temporary from Monitoring Window • Temporally Deactivate Functions • Features can be Disable like:  2-Person Rule  First-In User Rule  Open Door Lock  Lock Door
  • 58. Who’s In • Generate List of Users Inside a Controlled Area at that Particular Time • Useful in Emergency
  • 60. COSEC Live Monitoring Window • Real-time Events Monitoring and Control • Live Status of Door Controllers and PANEL LITE • Alarm Monitoring and Control • Firmware Up gradation • Temporary Deactivate Function/Features • Auxiliary Input and Output Status • Automatic Events Download
  • 61. Input-Output Groups and Linking • Link Input and Output Port of the COSEC Door Controller and PANEL LITE • Automatically Activate Output Port on Activation of Input Port • Program Various Functions Like: • Unlock Door on Fire Detection • Capture User Photo when he is Allowed • Start Video Recording on any Motion Detected
  • 62. Alarm • Various Alarms on the Occurrence of Pre-defined Situations • Available on both PANEL LITE and Door Controllers • Built-in Alarm Detection and Management • Admin can Control, Acknowledge, Clear and Monitor Alarm in a Real-time • Various Alarms Like Tamper Alarm, Mains Fail, Battery Fail Alarm etc. • Audio Visual Indication in terms of LEDs and Buzzer
  • 63. Time-Trigger Function • Automatically Activate Output Port based on Pre-defined Time • Used for many Time based Applications • School Bell, Siren, Camera etc. can be Activated without any Manual Involvement
  • 65. Auxiliary Ports • • • • • Auxiliary Input and Output Port Input Port for Connecting Smoke Detector, Sensor etc. Output Port for Connecting Siren, Strobe etc. Available on both PANEL LITE and Door Controllers Can be Programmed for Various Applications Like Camera should Start Recording when any Motion is Detected in the Premises
  • 66. USB Connectivity • Easy Data Transfer from Controller to Server • Easy Firmware Upgrade of Door Controller and PANEL LITE • No Physical Connectivity is Required between Door Controller and Server • Ideal Application for Remote Applications • For Connecting Wi-Fi or 3G/GSM/GPRS/CDMA Modems
  • 67. Wi-Fi Connectivity • Simple Connectivity between Controller and Server • No Wiring is Required • Real-time Events and Report Generation • Ideal for Applications where Ethernet is not Possible because of Aesthetic Purpose or Architectural Limitations
  • 68. 3G Connectivity • Wireless Connectivity between DOORs/PANEL LITE and Server • Faster Data Transactions over 3G Communication Speed • Real-time Events and Report Generation • Perfect for Remote Location Applications where Ethernet or RS-485 is Not Possible
  • 70. Access Control Reports List Reports List • Access Zone • Access Group • Access Group-wise Time Zone • Functional Group • Time Zone • 2-Person Rule • First-In User • Guard Tour • Input Port Group • Output Port Group • Door Held Open • Zone Accessed by User
  • 76. Feature list *These features are available with COSEC PANEL LITE
  • 79. For Further Information Please Contact: Email ID: Security@MatrixComSec.com Tel: +91 265 2630555 Visit us at www.MatrixComSec.com Version: V2R1

Editor's Notes

  • #6: Prevent Unauthorized Entry – Function Protects and Preserves Enterprise’s Resources Restrict Unauthorized Entry Allow Authorized People Entry at Specified Time Round the Clock Security
  • #8: Keys can't be regulated and if they are lost or stolen can pose an immense security threat to your organization unless new locks are installed. For large companies, this can be an expensive and time consuming proposition
  • #15: Fig shows a typical deployment of COSEC in a multi-floor building for access control. Door Controllers are connected with the COSEC PANEL, installed at various floors with exit reader or exit switch to control entry of a person with various access control policies. This complete system is monitored and controlled by COSEC Software in real time.
  • #16: Fig shows the COSEC installation in an organization campus for access control. Door controllers are installed at various divisions of the organization and they are centrally connected with a PANEL. This complete system is monitored and controlled by COSEC application software. Various access control and time-attendance policies can be applied for each door controller.
  • #17: Above Diagram shows basic master-Slave architecture of COSEC where all Door Controllers(Slave) are connected with Master Controller either through Ethernet or RS-485. Master Controller supports up to 75 door controllers. Maximum 32 door controllers are Possible with RS-485 All 75 door controllers can be connected with Ethernet Computers are used for programming, monitoring and controlling application