Access control

An access control system offers personal protection for residential and commercial property


An access control system offers personal protection for residential and commercial property, whether it is for offices, banks, airports, shops, your private property or simply for the purpose of providing security for your staff or clients. The objectives of an access control system are often described in terms of protecting system resources against inappropriate or undesired user access.

Jantar provides some of the most cost-effective, sophisticated access control systems and readers for all types of customers. Our access control systems provide security for your property, your employees and, most importantly, they ensure that your business information is protected effectively.

The main aim of the research & development team is to focus on designing systems that are both user friendly and cost effective while incorporating all the functions and features that are needed to run the most efficient organization.


More than 20 years experience



More than 20 years experience


Comparative table of applications for ACCESS CONTROL

NO MONTHLY FEES - when you purchase a licence there is no additional cost (month/year, etc.) Blocker Codeks AC Codeks TA
Basic access control
Advanced access control
Limited number of users
Controls only one line of communication
Controls multiple lines of communication
Supports multiple access controllers
Assigning time rights to users (timetables for access)
Multiple groups of users
Users' names can be imported from .csv or Excel files
Live events monitor
Events history
Past events reports and filtering
Access to all hardware’s setup parameters
Multiple administrators
Editing of macro commands
Optional upgrades with software modules
The table lists only some of the features of the Codeks applications. Are you missing the one that would solve your problem? If you have any request or question don't hesitate to contact us. We are happy to answer all your questions and find the right solution for you!

Modules & Apps

More than 20 years experience


A comparative table of UPGRADING MODULES

NO MONTHLY FEES - when you purchase a licence there is no additional cost (month/year, etc.) Blocker Codeks AC Codeks TA
LAYOUTS - Monitoring of live events on the map (alarms, registration ...)
E-PERMITS - Electronic permit for private and business exits of employees
FRONT DESK - Reception - Visitors management software
IP CAMERA - Integration of IP cameras into access control and T&A systems
SCREEN KEYPAD EDITOR - Keypad editor for touch screen controllers Regis
ELECTRONIC PURSE - Writing data on the protocol card
In Jantar company we are constantly developing and upgrading our skills and offer. If the module that would suit your needs is not listed above, don't hesitate to contact us. We will be happy to help you and find the solution for your problem!

Wiring diagrams


All wiring diagrams and documentation for old and new hardware and software can be found on Jantar FORUM.


Access - readerOperating with an access control system is simple: the user must prove that he has the right to access a particular location. The user presents his credentials (in the form of a contactless card, numerical code or fingerprint or any other biometric feature) to the device that reads it and sends information to the access controller.

The access controller compares the read credentials (e.g. number of contactless cards) with the list of all registered credentials and rights received by the program managing the system. On this basis controller approves or rejects the user's request (e.g. unlocks the electric strike and enables the user to move through the door) while simultaneously recording each event in the log. The reader also gives the user feedback on whether the request has been approved or rejected (e.g. sound signal or change of color on signal lights on the reader).

What do we need to implement an access control system?

Doors leading into the premises or buildings to which we want to limit entry or exit must be equipped with an electric strike. The electric strike has to be connected to the control electronics which allow the user to enter or exit the premises.

The electric strike can be locked or unlocked by an identification means (a proximity card, a bracelet or a key fob, a remote button, a fingerprint etc.) or by entering the numeric code with a keypad.

In addition to an electric strike, standalone access controllers will suffice for basic access control. Inside of the access controller's casing there is a built-in reader of identification means as well as a controller of an electric strike. There are also special variants equipped with a keypad for entering the numeric code (a cipher).

Complex access control systems require sophisticated hardware; in such cases, readers of proximity identification or fingerprints are built into their own casings and separated from the access controllers. In addition to control electronics for locking and unlocking the electric locks, there is also a built-in power supply for charging locks and readers, as well as support for battery charging (the accumulator must be purchased separately). In some cases, controllers also have a built-in TCP/IP communication converter.

Several readers (2 or 4 readers) are connected to a single access controller. Any number of controllers can be connected consecutively with each other in a communication line at the end of which there is a communication converter. Through this converter the entire line of controllers is connected to a computer.

With simple or more advanced application software for access control running on the computer, the application software sets the access rights to an individual holder of the identification means and keeps track of all occurrences which are detected by the access control system (entry, exit, attempt of unauthorized access etc.).