Access control

An access control system offers personal protection for residential and commercial property

Controller

An access control system offers personal protection for residential and commercial property, whether it is for offices, banks, airports, shops, your private property or simply for the purpose of providing security for your staff or clients. The objectives of an access control system are often described in terms of protecting system resources against inappropriate or undesired user access.

Jantar provides some of the most cost-effective, sophisticated access control systems and readers for all types of customers. Our access control systems provide security for your property, your employees and, most importantly, they ensure that your business information is protected effectively.

The main aim of the research & development team is to focus on designing systems that are both user friendly and cost effective while incorporating all the functions and features that are needed to run the most efficient organization.

Products

More than 20 years experience

ALL ACCESS CONTROL PRODUCTS ARE THE RESULT OF OUR OWN PRODUCTION

Software

More than 20 years experience

ALL ACCESS CONTROL SOFTWARE IS THE RESULT OF OUR OWN PRODUCTION


Comparative table of applications for ACCESS CONTROL

FEATURES Blocker Codeks AC Codeks TA
Basic access control
Advanced access control
Limited number of users
Controls only one line of communication
Controls multiple lines of communication
Supports multiple access controllers
Assigning time rights to users (timetables for access)
Multiple groups of users
Users' names can be imported from .csv or Excel files
Live events monitor
Events history
Past events reports and filtering
Access to all hardware’s setup parameters
Multiple administrators
Editing of macro commands
Optional upgrades with software modules

Modules & Apps

More than 20 years experience

LIST OF MODULES AND APPS FOR UPGRADE


Comparative table of UPGRADING MODULES

MODULE OR APPLICATION Codeks TA Kit Codeks AC Codeks TA
TA LEAVE ANNOUNCES
ePERMITS
PRESENCE MONITOR
LAYOUTS
FRONT DESK
IP CAMERA
LUNCH
RESERVATIONS
SHIFTS
EXPORTS
CODEKS MOBILITY

Wiring diagrams


JANTAR FORUM

All wiring diagrams and documentation for old and new hardware and software can be found on Jantar FORUM.

Operating


Access - readerOperating with an access control system is simple: the user must prove that he has the right to access a particular location. The user presents his credentials (in the form of a contactless card, numerical code or fingerprint or any other biometric feature) to the device that reads it and sends information to the access controller.

The access controller compares the read credentials (e.g. number of contactless cards) with the list of all registered credentials and rights received by the program managing the system. On this basis controller approves or rejects the user's request (e.g. unlocks the electric strike and enables the user to move through the door) while simultaneously recording each event in the log. The reader also gives the user feedback on whether the request has been approved or rejected (e.g. sound signal or change of color on signal lights on the reader).

What do we need to implement an access control system?

Doors leading into the premises or buildings to which we want to limit entry or exit must be equipped with an electric strike. The electric strike has to be connected to the control electronics which allow the user to enter or exit the premises.

The electric strike can be locked or unlocked by an identification means (a proximity card, a bracelet or a key fob, a remote button, a fingerprint etc.) or by entering the numeric code with a keypad.

In addition to an electric strike, standalone access controllers will suffice for basic access control. Inside of the access controller's casing there is a built-in reader of identification means as well as a controller of an electric strike. There are also special variants equipped with a keypad for entering the numeric code (a cipher).

Complex access control systems require sophisticated hardware; in such cases, readers of proximity identification or fingerprints are built into their own casings and separated from the access controllers. In addition to control electronics for locking and unlocking the electric locks, there is also a built-in power supply for charging locks and readers, as well as support for battery charging (the accumulator must be purchased separately). In some cases, controllers also have a built-in TCP/IP communication converter.

Several readers (2 or 4 readers) are connected to a single access controller. Any number of controllers can be connected consecutively with each other in a communication line at the end of which there is a communication converter. Through this converter the entire line of controllers is connected to a computer.

With simple or more advanced application software for access control running on the computer, the application software sets the access rights to an individual holder of the identification means and keeps track of all occurrences which are detected by the access control system (entry, exit, attempt of unauthorized access etc.).