|
|
TM 5-6350-275-24&P
(5) Access Denied (access level violation)
(6) Incorrect Personnel Identification Number (PIN) code (after three tries)
(7) No Personnel Identification Number (PIN) code (card swiped but no Personnel Identification Number (PIN)
put in)
(8) Passback Violation In and Out
(9) Door Forced
(10) Door Ajar (held open)
(11) Invalid Card (card invalidated by system)
(12) No Buddy Card (two man rule violation)
(13) Wrong Card Class
(14) Wrong Cipher
(15) Duress Cipher
(16) Cipher Altered
e. Violation Protection. Access readers also include tamper detection devices which monitor the reader's housing
and report any attempt at forced entry.
f. Access Levels. Access levels are used to define the zones that each card holder may access, together with the
times at which entry/exit will be allowed. They are optional and present the means for increasing security within the
protected area by restricting access in accordance with each person's security status. A security guard, for example,
could be allowed complete freedom of movement within the protected area at all times, while other employees could
be restricted to entering only selected zones between the times 0900 and 1700.
The system can support up to 255 different access levels, each of which defines the access requirements of one or
more card holders.
g. Accountability. Accountability allows the current location of personnel to be continually recorded by monitoring
their entry/exit through doors. It can be undertaken at two different levels: Full and Partial. Full accountability
requires readers on both entry and exit sides of the door.
Partial accountability can be employed where a system only supports entry readers. Similar to full accountability, all
entries into a zone are recorded by the system. However, since there are no exit readers, it is not possible to record
personnel when they leave zones. It simply corrects the last known zone position. Therefore, it offers a somewhat
less reliable form of tracking and cannot be used to report passback violations.
The last registered location of a card holder can be displayed by means of the [SUMMARY] soft-key.
h. Card Holder Profiles. A card holder profile is a collection of personal information relating to an individual. The
card holder profiles are created by the system administrator using the reconfiguration program and cannot be
changed in the operator mode. However, they are available for display, along with other information relating to card
holders, by the [ATTRS] soft-key.
1-49
|
Privacy Statement - Press Release - Copyright Information. - Contact Us |