Orion ISS
www.bolid.com
40
KEY PATTERN BASED ACCESS CONTROL
In order to provide identification for a wide range of individuals whose access keys need not or cannot
be stored in the S2000-2 or network controller memory (for example, if there are too many keys) the
key pattern based access control mode can be implemented by the S2000-2. To make it possible all
the key codes which are supposed to be identified by the S2000-2 based on key pattern must meet
some specific rule (for example, start from the same numerical sequence).
Each pattern is represented by a base code and a mask that ‘opens’ certain positions of the base
code. Only the digits in ‘opened’ positions have a meaning in identifications process. When the digits
of the code of a presented key match for ‘opened’ positions with the relevant digits of the base code,
access to the key owner is granted with access rights specified for the pattern. The values of other
(not ‘opened’) digits of the presented key code are ignored.
In order to limit access rights of all the keys meeting a pattern, each pattern is assigned to a specific
access group and specific validity period. Granting access for a person presenting the key which
meets to rules of any pattern is equivalent to that for the key which is stored in a controller memory,
has access rights of the pattern access group and pattern validity period, except for the following limi-
tations:
−
The key can be only of User Type and cannot be Locking, Unlocking or Master
−
Anti-passback rules are not monitored (for the keys that are not stored in the controller memory
passage events are not logged)
−
Two-factor authentication cannot be implemented (neither main nor additional key codes are
stored in the controller memory)
When a key is presented to a reader of the S2000-2 controller the controller first checks if the pre-
sented key code is stored in its database. If the key code is not found in the controller memory, it is
checked against the first access key pattern, then against the second one, etc. So if the code is
stored in the controller database, the access rights set for this specific key will be applied. Otherwise,
if the code is not stored in the controller memory, but meets at least one key pattern, access rights set
for this specific key pattern will be applied (for the first of the key patterns, if the code meets several
key patterns simultaneously).
NOTE
: It should be kept in mind that the keys that are used for centralized access and/or arm-
ing/disarming must neither be stored in the controller memory no meet any access key pattern
programmed.
Up to five different key patterns can be programmed for the S2000-2 controller. By default, all the five
patterns are locked, that is the key pattern based access control mode is disabled. In order to enable
identification based on a key pattern it is necessary to unlock one of the available patterns, enter the
base code of the pattern (type manually or read by presenting to a reader one of the keys which code
Summary of Contents for S2000-2
Page 1: ...Orion ISS Access Controller S2000 2 User s Manual ISO 9001 ...
Page 5: ...S2000 2 Features and Design 5 www bolid com FEATURES AND DESIGN ...
Page 8: ...Orion ISS www bolid com 8 ...
Page 9: ...S2000 2 Specifications 9 www bolid com SPECIFICATIONS ...
Page 12: ...Orion ISS www bolid com 12 ...
Page 13: ...S2000 2 Operating 13 www bolid com OPERATING ...
Page 47: ...S2000 2 Installation 47 www bolid com INSTALLATION ...
Page 67: ...S2000 2 S2000 2 Programming 67 www bolid com S2000 2 PROGRAMMING ...
Page 89: ...S2000 2 Maintenance 89 www bolid com MAINTENANCE ...
Page 94: ...Orion ISS www bolid com 94 ...
Page 95: ...S2000 2 95 www bolid com Appendix Connecting Some Models of Readers to the S2000 2 Controller ...