The basic objective of any Access Control solution is to protect an organization’s assets and ensure human safety by controlling movement of people to pre-defined rules. Matrix COSEC is a comprehensive and flexible Access Control solution to meet any Access Control need of any organization irrespective of its size, layout, locations and timings. Matrix COSEC allows controlling access on three simultaneous dimensions – User, Zone and Time by answering the three fundamental questions on Who, Where and When. In addition, a range of value-added features like anti-pass back, 2-person rule, first-in user, blocked users, door auto relock, guard tour, man-trap and smart card based identification ensure foolproof security of physical assets and safety of manpower.

Access Control (ACM)

Key Features

Access Zone

Access Zone is a predefined physical area for which specific access policies are required. Access Zones can be created by dividing the organization into various departments like, R&D, finance, production, marketing and IT. Matrix COSEC physical controls who (User) goes where (Access Zone) and when (Time) for each Access Zone. Using this feature, employee of one department can be restricted from entering into another department. Sub zones can also be created within an access zone to regulate further entry.

Access Mode

User can enter into a zone by showing his credentials (Finger, Palm Vein, RF Card, PIN) to the reader. Admin can select any one or combination of any two or three credential options as an Access Mode on the door controllers to access any particular zone.

Access Level

Access Level gives privileges to a user to enter into a controlled area. Access Levels are assigned separately to zones and users, ranging from 1 to 15. If user access level is greater than or equal to the zone access level, the user is allowed in that zone. Different access levels can be assigned for different times like working hours, break hours and non-working hours.

First-In User Rule

In some organizations, employees or workers are not allowed to enter certain work areas unless a designated person enters first to ensure higher level of safety and security. Matrix COSEC keeps the door locked until the designated first user registers his entry. Once the First-In entry is registered, other users are also allowed to enter during the working time of the First-In user.

2-Person Rule

Certain sensitive zones contain valuable assets like cash, gold, data, intellectual property, etc. Security of such assets should not be entrusted to any single individual. 2-Person Rule allows entry only when two persons from an authorized group jointly use their access rights within a specified time. 2-Person Rule helps in eliminating frauds. This feature can also be used to ensure user’s entry in certain hazardous areas.


Many times two or more doors are arranged in a sequence to regulate traffic or control dust and heat. The second door should open only after the first has completely closed. Man-Trap offers programmable delay to regulate traffic or the flow rate of people. It also prevents any intruder from escaping in a hurry.

Guard Tour

Guard Tour facilitates enforcing vigil patrol of security guards or such pre-fixed movement of other people. The guards have to show his credentials (palm, fingerprint or card) on defined checkpoints at specified time period. Guard Tour can be programmed to cover all required locations in a specific sequence. The maximum time period to complete a tour and total number of such tours in a defined time can also be defined. Successful completions and deviations logged for future review and reports. Deviation can also trigger immediate notification or alarm.

Dead-Man Zone

It is essential to track the physical safety of an employee who is working in hazardous environments like railroads, mines, chemical labs, etc. Dead-Man Zone makes it compulsory for the employee to confirm his presence at pre-defined interval. If the user fails to punch within the pre-defined duration, an alarm is activated to draw attention of others. This feature can also be used to ensure guards remain awake during night shifts.


Anti-Pass-Back prevents a card holder from passing his card back to another person to gain unauthorized entry. Second entry using the same card is allowed only after an exit is registered for every entry. Anti-Pass-Back helps organization in maximizing security by preventing fraudulent use of cards and maintaining an accurate record of the number of people in a specific zone. Anti-Pass-Back works in two modes:

  • Anti-Pass Back Global: In this mode, system verifies user’s exit marking on all zones before allowing re-entry.
  • Anti-Pass Back Local: In this mode, system verifies user’s exit marking on local zone (same zone of entry) only before allowing re-entry.

Do Not Disturb (DND) Zone

Do Not Disturb Zone feature is useful for meeting rooms, conference halls where people inside the area do not want to be disturbed by outside people. Users are restricted to enter DND zone till it is activated on the device. Certain users like VIP person can override DND rule.

Route based Access

Route based Access ensures users follow specific route to reach their destinations preventing them from wandering intentionally or unknowingly. A user must reach locations in a particular sequence which is defined on his smart card. The user cannot access devices which are not part of his route or out of sequence. This feature is very useful in large and sensitive areas like ports, pharmaceutical labs, R&D centers and mines where contract workers or external agencies need to reach their place of work following defined route.

Occupancy Control

Occupancy Control is used to control the number of users within a designated zone. Maximum number of users in a zone can be defined and when the count reaches this limit, COSEC blocks additional user from entering the zone. This is useful for facilities like seminar halls, conference rooms and cafeterias where space is for a limited number of people.

Smart Identification

Smart Identification is very useful where a large number of users are accessing one device. User’s fingerprint and other information are stored on the smart card instead of the device. User has to show his credential along with the smart card. COSEC allows access and marks attendance based on the result.




Interface Diagram


Network Application




Technical Specifications

Card and PIN Card, Fingerprint & PIN Card & PIN Card, Fingerprint & PIN
Fingerprint Module NA Optical NA Optical
Finger Templates NA 9600 NA 9600
LCD (128×64 Dot-Matrix) Yes
Touch Sense Keys (16) Yes
Communication Ethernet and RS485 Ethernet, Wi-Fi and 3G
Events Buffer 50,000 5,00,000
Communication Speed 10/100Mbps on Ethernet and 115.2 Kbps on RS485
External Reader 1 Port for Card or Fingerprint Reader
External Reader Interfaces RS232 and Wiegand
External Reader Power 12VDC@0.5A
Exit Switch Port Yes
Door Status Sense Programmable NO, NC, Supervised
Door Lock Relay Relay SPDT, Form C, 1A@30VDC
Door Lock Power Internal12VDC@0.5A or External
Auxiliary Input Port Programmable NO, NC, Supervised
Auxiliary Output Relay Relay SPDT, Form C, 1A@30VDC
Tamper Detection Yes
Buzzer Yes
Indications 4 LEDs (Status, Alarm, Allowed and Denied)
Memory 512KB Rom and 128KB RAM
Input Power 12 VDC@1A
Dimensions (WхHхD) 100×220×55mm (3.9”х8.7”х2.2”)
Weight 0.46Kg (1.00Lbs) 0.49Kg (1.07Lbs)
Environment 0° C to +50°C (32°F to 122°F), 5% to 95% RH Non-Condensing