TM 5-6350-275-24&P
f. Entry Control Equipment. Entry control equipment provides the means to automatically unlock doors when
authorized personnel wish to enter or leave a particular area. ICIDS can use three types of access control devices.
The most common device is the Intelligent Access Unit (IAU). is normally mounted on a wall adjacent to each door.
Personnel are issued an identity card, which they present to an access reader each time they wish to enter and/or
leave a protected area. Each access is recorded and all attempted breaches in security are reported to operators by
system alarms.
The second type of access control device is called a key pad. Personnel use it to enter 6 digit Personnel
Identification Ciphers (PICs) and/or 4 digit Personnel Identification Numbers (PINs). It can operate as a stand-alone
unit, where the entry of a valid PIN unlocks the door. It may be linked to an access reader so that access is only
granted when both a valid card has been presented and a valid PIN is then entered. Each person is allowed up to
three attempts to enter the correct PIC or PIN, after which the system reports the incident to the control center by a
system alarm.
The third type of access control device is called an access reader, which has two optional features, called
Accountability and Messaging. Accountability records the current location of all authorized personnel by monitoring
their access into and out of each protected area. Operators can create displays which list the personnel within each
protected area and may also review the movements of an employee on a particular day or during a selected time.
Messaging permits the System Administrator to send messages to a card holder or a group of card holders.
1-18. SOFTWARE PROGRAMS. The ICIDS programs for carrying out day-to-day operations are known as application
programs. They are stored on the hard disk of the CPU and include a data acquisition unit (DAU) program,
reconfiguration program, and an operator utility program.
a. DAU Program. The DAU Program retrieves all data recorded by the remote stations, and stores this information
in a series of "engineering tables" which form the system database. It acquires data by periodically requesting
information from each remote station. When a remote station fails to respond to a pre-determined number of
requests, operators are notified by a system alarm.
b. Reconfiguration Program. The Reconfiguration Program allows operators to create and modify the system's
database. It can be accessed through any operator workstation and is password protected to prevent use by
unauthorized personnel. Information about the number of remote stations, the types of sensors, the conditions that
will cause alarms to be generated, and other variables is entered using a series of forms. A comprehensive graphics
package provides the means to draw color graphics of the areas and equipment being monitored. Additionally, the
program enables reconfiguration personnel to access a number of Operator Profile Records, for tailoring the system
to meet the operational needs of each operator. This information includes the commands available to each operator,
the remote stations and/or types of equipment in use, and the printers the operator can use.
c. Operator Utility Program. The Operator Utility Program monitors the status of all equipment. It is also
password protected and is copied into the memory of a workstation when an operator logs in. Commands are entered
through the workstation keyboard and/or an optional mouse. Commands are selected by using 10 soft-keys, so
called because their functions are determined by software. A legend of the available soft-keys appears on each
operator's display and changes when necessary to reflect alternative soft-key options. By using these soft keys, you
can:
* Display the status of monitored equipment.
* Unlock doors remotely.
* Control CCTV equipment.
* Switch non-security related equipment on or off.
1-47