Slide 1
DMS
Access Control.
Intrusion Detection.
DMS
Access Control.
Intrusion Detection.
Slide 1
DMS
Access Control.
Intrusion Detection.
DMS
Access Control.
Intrusion Detection.
Slide 1
Door Management System
DMS

DMS is a monitoring and configuring software. It keeps track of which door was accessed, the access card number, the time and date of use.
It also allows the user to create new access cards, set card access level, and even schedule time and dates for when card access is denied.

Slide 1
Door Management System
DMS

DMS is a monitoring and configuring software. It keeps track of which door was accessed, the access card number, the time and date of use.
It also allows the user to create new access cards, set card access level, and even schedule time and dates for when card access is denied.

Slide 1
Component Devices
Component Devices
Proximity Access Card Reader
Detects and reads access cards, biometrics and number codes.
Proximity Access Card Reader
Detects and reads access cards, biometrics and number codes.
Slide 2
Component Devices
Component Devices
Door Node
Sends data from the access card to the door controller. Each door node is capable of controlling up to two doors
Door Node
Sends data from the access card to the door controller. Each door node is capable of controlling up to two doors
Slide 3
Component Devices
Component Devices
memory
Door Controller
Compares the access card ID sent from the door node to the database's list of registered IDs.
memory
Door Controller
Compares the access card ID sent from the door node to the database's list of registered IDs.
Slide 4
Component Devices
Component Devices
Database
Stores the list of all registered IDs and their profile associated and communicates with the Door Controller
Database
Stores the list of all registered IDs and their profile associated and communicates with the Door Controller
Slide 1
Data encryption on all access cards

All information stored in access cards are encrypted. The card reader can read the access card when its in close proximity.

Slide 1
Data encryption on all access cards

All information stored in access cards are encrypted. The card reader can read the access card when its in close proximity.

Slide 1
Controllers can communicate over long distances
Controllers can communicate over long distances

Each controller can communicate with up to 32 door nodes within a range of 1 km. Communication between the controller and the node is hardwired to work independently of internet or Wifi.

Slide 1
Controllers can communicate over long distances
Controllers can communicate over long distances

Each controller can communicate with up to 32 door nodes within a range of 1 km. Communication between the controller and the node is hardwired to work independently of internet or Wifi.

Slide 1
One-to-one or one-to-many

Controllers can be configured to be one-to-many, to control multiple doors in close proximity of each other. They can also be configured to be one-to-one to accommodate systems that value minimizing the damage done in the event that one controller is compromised.

Slide 1
One-to-one or one-to-many

Controllers can be configured to be one-to-many, to control multiple doors in close proximity of each other. They can also be configured to be one-to-one to accommodate systems that value minimizing the damage done in the event that one controller is compromised.

Slide 1
Controller fail-safe
Controller fail-safe

Door controllers have a fail-safe option. A smart switch can be added to the DMS so that in the event of a controller failure, the smart switch will switch door control to a backup controller

Slide 1
Controller fail-safe
Controller fail-safe

Door controllers have a fail-safe option. A smart switch can be added to the DMS so that in the event of a controller failure, the smart switch will switch door control to a backup controller

Slide 1
Database is encrypted and offline

All information stored on the database server is encrypted, and disconnected from the internet. Backup database servers can be added for redundancy.

Slide 1
Database is encrypted and offline

All information stored on the database server is encrypted, and disconnected from the internet. Backup database servers can be added for redundancy.

Slide 1
DMS keeps track of battery
DMS keeps track of battery

DMS notifies the operator when the battery is low or missing for any of the devices connected to the system.

In the event of a power failure, the door node will still grant access to users with known access cards and won’t permit new access cards to be added to the database.

Slide 1
DMS keeps track of battery
DMS keeps track of battery

DMS notifies the operator when the battery is low or missing for any of the devices connected to the system.

In the event of a power failure, the door node will still grant access to users with known access cards and won’t permit new access cards to be added to the database.