Access Granted With Electronic Keys

Dec. 3, 2012

The Guardian II  system is a non-networked electronic access control system that  utilizes controllers operated by electronic keys. It includes an Admin Key to program the controllers, an Export Key to retrieve the audit trail data and User Keys that  identify users to the system’s controllers. Admin and Export Keys eliminate the need for a laptop computer or PDA for data transfer.

Guardian II software is managed by an administrator who assigns access rights and monitors activities of the users. Setting up a system can be completed by following the systematic instructions in the User Guide.

Each Guardian II controller is connected to an electromechanical lock mechanism to control access for each door. If the User Key is authorized, the controller activates a timed relay contact that powers the lock mechanism.

Controllers are installed between the device power supply and the lock mechanism. Each controller operates on 9 to 12 VAC/VDC with a current draw of .3 Amps. The controller has one Form C, SPDT 2 Amp @ 30VDC relay that controls the Fail Safe or Fail Secure lock mechanism. Each relay can control an electric strike, magnetic lock or electrified lock mechanism that does not exceed the relay's current draw.

Note: The Guardian II controller circuit board can be configured for remote release input.

Four controller models comprise the Guardian II family. Each controller provides the same functionality, but is designed for a specific mounting method. These are:

  1. Open construction (G50)
  2. Heavy duty aluminum enclosure (G450)
  3. Narrow jamb stiles (G150)
  4. Single gang box (G250)

The open construction controller can be installed into an existing panel. The heavy duty aluminum enclosure controller is mounted behind a plate that can be used in gate/fence applications or onto a pedestal or wall. Each controller must be mounted within 25 feet of the lock mechanism. The controller keyway receptacles are weather resistant. Each controller comes with a tri-color LED and a Piezo buzzer that indicates the status of the controller.

Once the hardware has been installed and wired, each controller is initialized individually for date and time, naming the controller and its site name. The software will assign an identification number for each controller. Once the controllers have been initially programmed, multiple controllers can be programmed to control access using the Admin Key.

Controllers are configured as either an admission or a restriction type. Admission controllers only grant access to users or groups that are programmed in its memory. Restriction controllers will deny access to users or groups that are programmed in its memory.

The two controller types allow the administrator of the system to minimize setup time by selecting the controller type that will have the shortest list.  For example, an employee entrance could be set up as a restriction controller, where all key holders get access, except those added to the restriction list.  Conversely, an admission controller might be used for an executive office, where only a few people would be given access.

Guardian II software contains records for each user of the system. Users can be seen as individuals or as part of a group. For a large number of similar users, it is easier to list one group on a controller list, rather than listing many users. Access is granted or denied based upon the settings programmed to the controller and/or the User Key. When access is granted, the relay energizes and permits the lock mechanism to activate.

Access can be controlled by date, time, schedules, access point, auto-unlock and dual key access. A limited number User Key can be used for temporary access. Access can be overridden by the holiday schedule and by disabling User Keys. An interesting feature is Instant Access, which validates a new User Key instantly, without having to first program the controller.

The Admin Key loads the programmed information from the computer into the controllers. When the Admin Key is inserted and rotated clockwise, the LED changes from red to yellow for programming to green indicating the programming is completed.

Information programmed into each User Key is encrypted and the technology is copy proof. User Keys are reprogrammable.

User Keys, approximately the size of a six-pin tumbler key, are available in four colors, blue (standard), green, red and yellow. The User Keys have an opening to accommodate a key ring/chain. They are designed to function in extreme temperatures, moisture, dirt and electro-static discharge.  There is no limit to the number of User Keys that can be programmed for a specific application.

When a user attempts to gain access to an authorized door, the key is inserted and rotated approximately 90 degrees clockwise. The LED changes from red to green indicating the lock mechanism is unlocked and the door can be opened. The key is returned to vertical and removed. When time runs out, the relay disengages and the LED illuminates red again. If a User Key should ever be lost or stolen, the key can be harvested (disabled) from the software.

Audit Trail

The Export Key retrieves the audit trail data from the controllers. The logged event capacity for each door is approximately 1,500 records. The Export Key can retrieve 5,000 event records, giving it the capability of retrieving records from multiple controllers. When an Export Key is inserted into a controller, the controller writes the records to the Export Key, confirms accuracy and erases the memory in the controller. When records from the Export Key are saved to the computer's database and confirmed, the records are erased from the Export Key.

Once collected, reports can be viewed and printed in a number of formats, showing who gained or tried to gain access and when (what date and time). There are 17 standard event report forms. The data can also be exported as a CSV (comma-separated values) file for specialized report formats.

The Admin Kit is comprised of the G2 Programmer, the Admin Key, the Export Key, USB cable and the Guardian II Administration Software. The software can operate on Windows® XP, Windows Vista or Windows 7 based computers. To complete an access control system, add the number and type of controllers required and the User Keys.

The Guardian II system provides access control for entrances, executive offices, shared facilities, specialized rooms, gates and remote locations including pool gates, marina gates, etc.

Technical support is provided free for Guardian II dealers. For more information, contact Larco, 210 N.E. 10th Ave., Brainerd, MN 56401. Telephone: 800-523-6996 or 218-829-9797. Web Site: www.Guardian2.com.