Click here to make tpub.com your Home Page

Page Title: Violation Protection
Back | Up | Next

Click here for thousands of PDF manuals

Google


Web
www.tpub.com

Home


   
Information Categories
.... Administration
Advancement
Aerographer
Automotive
Aviation
Construction
Diving
Draftsman
Engineering
Electronics
Food and Cooking
Logistics
Math
Medical
Music
Nuclear Fundamentals
Photography
Religion
   
   

 

TM 5-6350-275-10
(7) No Personnel Identification Number (PIN) code (card swiped but no Personnel Identification Number (PIN) put
in)
(8) Passback Violation - In and Out
(9) Door Forced
(10) Door Ajar (held open)
(11) Invalid Card (card invalidated by system)
(12) No Buddy Card (two man rule violation)
(13) Wrong Card Class
(14) Wrong Cipher
(15) Duress Cipher
(16) Cipher Altered
e. Violation Protection. Access readers also include tamper detection devices which monitor the reader's housing
and report any attempt at forced entry.
f. Access Levels. Access levels are used to define the zones that each card, holder may access, together with the
times at which entry/exit will be allowed. They are optional and present the means for increasing security within the
protected area by restricting access in accordance with each person's security status. A security guard, for example,
could be allowed complete freedom of movement within the protected area at all times, while other employees could be
restricted to entering only selected zones between the times 0900 and 1700.
The system can support up to 255 different access levels, each of which defines the access requirements of one or
more card holders.
g. Accountability . Accountability allows the current location of personnel to be continually recorded by monitoring
their entry/exit through doors. It can be undertaken at two different levels: Full and Partial. Full accountability requires
readers on both entry and exit sides of the door.
Partial accountability can be employed where a system only supports entry readers. Similar to full accountability, all
entries into a zone are recorded by the system. However, since there are no exit readers, it is not possible to record
personnel when they leave zones. It simply corrects the last known zone position. Therefore, it offers a somewhat less
reliable form of tracking and cannot be used to report passback violations.
The last registered location of a card holder can be displayed by means of the [SUMMARY] soft-key.
h. Card Holder Profiles. A card holder profile is a collection of personal information relating to an individual. The
card holder profiles are created by the system administrator using the reconfiguration program and cannot be changed in
the operator mode. However, they are available for display, along with other information relating to card holders, by the
[ATTRS] soft-key.
1-16. ALARM GENERATION . Alarms are generated to draw the operator's attention to significant system events, such
as the triggering of an intruder detection device or the failure of a communications cable. They are shown by messages
which appear on the monitor and an audible warning tone emitted by the workstation. Each message can contain up to
three lines of text and typically includes details of the
1-37

Privacy Statement - Press Release - Copyright Information. - Contact Us

Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business