Computrols Access Control Solutions

Access Control

Computrols access control system gives our customers the ease and flexibility of CBAS while providing lifetime-warranty door controllers. With the flexibility of our 8-LX controllers and AC-3 door controllers, we can integrate most existing third-party devices whether they be access card readers, keypads, fingerprint readers, QR code readers, or iris scanners. We can also import existing access cards for a smooth transition from the previous system.

AC-3 Controller

Computrols | Building Automation Systems | Access Controls | Computrols AC-3 door controller

Each AC-3 door controller controls one access point and can hold the data of more than 20,000 users. It also features Computrols unique two-piece board design so that it can be removed and replaced without disturbing terminal board connections. Unlike other access point controllers the AC-3 features scalable output voltage for both readers and locking devices. This hardware is easy to install and comes with the industry’s only lifetime warranty.

Access Control Software

Computrols Building Automation Software (CBAS) is known for its simplicity, and it’s access control component is no different. Our user-friendly system allows administrators to effortlessly set up alarms, add and remove users, set schedules, and more, all while seamlessly integrating with our HVAC, lighting, and fire alarm systems.

Access Control Web Software for Administrators

In the case of a commercial office building or even a college campus, you’ll likely want to enable certain users to easily request new access cards, cancel those of employees that have been terminated, and allow access to expected visitors. Computrols CBAS Web allows your tenants, faculty, etc. to do just that. This application gives you most of the functionality of CBAS while limiting users to a defined set of capabilities.

Visitor Management System

Within CBAS Web is a visitor management system which can provide you all of the features you’d want to ensure your building’s safety and security from unwanted guests. Along with typical visitor logging and ID badge printing, this system gives future visitors the ability to make a request online that will subsequently be reviewed by the person(s) they are visiting. Once their request is approved, they will receive a QR code they scan to access the building and floor of their host.

Access System Architecture

Each 8-LX controller can effectively host up to 60 AC-3 controllers, 30 on each of the 2 channels. This architecture scales both up and down depending on your application.


Choose an access control system to learn more about it.

AC-3 Access Controller »

Introduction

AC-3 Access Control

The AC-3 provides programmed access control using CBAS Access Control software. The point count is perfect for single door control. Use several together in places like garages where more than one reader is required. And the AC-3’s small footprint makes it perfect for hard to reach enclosures. A seven segment keypad requiring a PIN number can also be added for extra security. The flexible Wiegand input allows inputs from an array of card reader vendors including proximity, bar code, and magnetic strip readers.


Highlights

Scalability
The AC-3 can support upwards of 20,000 users; can hold a 5000 transactions buffer.

Intuitive Design
The unique terminal board design allows the AC-3 to be removed and replaced without disturbing the terminal board connections.

Wiegand Compatible
The AC-3 works with the standard 26-bit Wiegand format as well as with other popular Wiegand formats and features a bi-directional Wiegand interface for advanced Wiegand devices such as biometric readers.

Voltage Command
The AC-3 features a fully programmable strike voltage output and a separate, fully programmable, voltage source for powering card readers. Both of these voltage outputs can be commanded through the software interface to any voltage between 5V and 24V to match the wide variety of card readers and strikes available on the market today.

CBAS Ready
The AC-3 works with Computrols’ well-known CBAS Access Control Software to offer a full range of features normally associated only with larger and more expensive systems. Features like “Remote Download” capability, “Self-Diagnostics,” and multiple mounting options.

AC-5 Access Controller »

Introduction

ac-5

The AC-5 Access Controller is ideal for multi-level biohazard laboratories, clean rooms, or any facility where door lockout is needed for negative or positive, ante-room to isolation-room scenarios. The AC-5 provides programmed access control using CBAS Access Control software. And the AC-5’s small footprint makes it perfect for hard to reach enclosures. A seven segment keypad requiring a PIN number can also be added for extra security. The flexible Wiegand input allows inputs from an array of card reader vendors including proximity, bar code, and magnetic strip readers.


Highlights

Scalability
The AC-5 can support upwards of 20,000 users; can hold a 5000 transactions buffer.

Intuitive Design
The unique terminal board design allows the AC-5 to be removed and replaced without disturbing the terminal board connections.

Wiegand Compatible
The AC-5 works with the standard 26-bit Wiegand format as well as with other popular Wiegand formats and features a bi-directional Wiegand interface for advanced Wiegand devices such as biometric readers.

Voltage Command
The AC-5 features a fully programmable strike voltage output and a separate, fully programmable, voltage source for powering card readers. Both of these voltage outputs can be commanded through the software interface to any voltage between 5V and 24V to match the wide variety of card readers and strikes available on the market today.

CBAS Ready
The AC-5 works with Computrols’ well-known CBAS Access Control Software to offer a full range of features normally associated only with larger and more expensive systems. Features like “Remote Download” capability, “Self-Diagnostics,” and multiple mounting options.


Overview

The AC-5 is ideal for multi-level biohazard laboratories, clean rooms, or any facility where door lockout is needed for negative or positive, ante-room to isolation-room scenarios. The AC-5 provides programmed access control using CBAS Access Control software. And the AC-5’s small footprint makes it perfect for hard to reach enclosures. A seven segment keypad requiring a PIN number can also be added for extra security. The flexible Wiegand input allows inputs from an array of card reader vendors including proximity, bar code, and magnetic strip readers.

Panasonic BM-ET200 Iris Reader
Computrols’ Access Control uses advanced iris reading technology from Panasonic to ensure security of sensitive facilities. The BM-ET200 offers more-accurate, faster, non-contact entry/exit control utilizing biometric technology for iris recognition. The system can be used to check identification in a variety of applications, including airports and entry/exit control for many types of industries. Iris recognition uses individual differences in the complex patterns found within the iris of the human eye to authenticate individual identities. Iris recognition is the most precise of all biometric identification systems.

Destination Dispatch »

Elevator Access Control

Destination Dispatch

The Computrols access control system is capable of interfacing with two of the elevator industries leading manufacturers. The access system offers an ethernet interface to both Thyssen Krupp and Motion Control Engineering’s destination based system. The destination system groups people based on desired floor which reduces the number of stops and increases efficiency. The Computrols access system grants or denies access based on user credentials. This cutting edge interface allows passengers to get to their destination quickly and securely.


Datasheets

AC-3-Access-Controller.pdf (490 kb)
Computrols’ AC-3 Access Controller

AC-5_Controller_datasheet.pdf (293 kb)
Computrols’ AC-5 Access Controller

Computrols-Access-Control-Manual.pdf (1.8 MB)
Manual for Computrols’ Access Control security hardware and software.

Relay-Accessories.pdf (90 kb)
Accessories for Idec relay.