An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure.Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control.
A PIN on an ATM system at a bank is another means of access control. Bouncers standing in front of a night club is perhaps a more primitive mode of access control (given the evident lack of information technology involved).

The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive areas, information and equipment. Access control system concerns the managing of possessions/locations or small assets or physical (mechanical) keys.
In a modern office where equally expensive equipment may be left unattended, Security and movement restrictionswill be paramount. GASL proposes a role based control mechanism that will be integrated into the employees and visitors identification in many different ways. With an authenticated identification, an individual will be allowed to move between sections of the premise un-manned but with hi tech monitoring methods. These will be based on the model that the client will eventually prefer from a wide range of identification methods that may be combined to increase the effectiveness of the solution. Some of them are:

1. Finger Print Recognition - Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Here the individual will need to present a specified finger to a reader for authentication and upon successful check, allowed to go beyond a security point.

2. HID and Proximity Cards - Proximity card (or Prox Card) is a generic name for con tactless integrated circuit devices used for security access or payment systems. It can refer to the older 125 kHz devices or the newer 13.56 MHz contactless RFID cards, most commonly known as contactless smartcards. These are normal cards which may also be printed with information about the bearer, to be flashed around card readers that may be outside of the controlled areas. When the card is presented, pre programmed patterns are compared to either allow or deny passage to the card bearer.

3. Magnetic Stripe Cards - A magnetic stripe card is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on the card. The magnetic stripe, sometimes called a magstripe, is read by physical contact and swiping past a reading head. Magnetic stripe cards are commonly used in credit cards, identity cards, and signal

4. Key Pad - This is the most conventional method of code entry where a user will be required to enter his code through the provided keypad to go through the control point.

Advantages of IP Access Control Solution

  1. System will seamlessly integrate to client's existing LAN and Network infrastructure.
  2. The System in all the different stations will be hosted by a single database making the access to data and information easy and hustle free.
  3. Logs and information about the clocking in and out of the employees will be easily obtained in a simplified yet detailed format.
  4. The system will easily be integrated to any existing security infrastructure like CCTV and will make available more information about the employees.
  5. The solution will also provide the management about the where about of an individual into and out of areas under surveillance.
  6. Knowing that the check-in and check-out times of the premises are monitored, the solution will provide a mechanism to improve the punctuality of the employees.
  7. Officials and supervisors will be able to monitor the activities of the system remotely, thus providing an extra eye in the monitoring process.
  8. In the event of a disaster evacuation procedure, the solution will easily be able to track the individuals present in the premises during assembly.
  9. During a premises breach situations, the premises access can be shut down or disabled centrally to provide a dead-lock scenario, thus trapping in intruder or isolation.
  10. Tracking an individual's movement has also been simplified by IP based access control mechanisms without the need to physically monitor or follow an individual around the premises. Logs will automatically show the whereabouts of each and every authorized and unauthorized access.


Having to effectively monitor your employees and staff will be one key responsibility for the Human Resource, so as to ensure the reliability of the employees. The proposed solution will effectively monitor the first access events by each employee in their respective stations to convert it into their punctuality. We will be able to use the system as a two in one system capturing the exact time for Clock in, clock out and shift durations as well as the absence for each of them.