PCSC offers the world’s first Fault Tolerant (FT) controller series creating the highest level of reliability with its automated process of system recovery for access control, alarm monitoring and output control systems. The FT Architecture (FTA) is the next evolution of building security management designed with a Virtual Point Definition network, integrated peer-to-peer and redundant communications.
The FT system is designed to automatically recover regardless of communications or controller failure. The FT system may be designed with an “Active/Active” or “Active/Inactive” system architecture. If for any reason, a primary controller fails, an alternate controller shall automatically take over the duties of the failed controller. The progression of successors to a faulty controller shall continue to provide security without any degradation in system operations. The FTA consists of one or more Fault Tolerant Controllers (FTC) and Door Interface Modules (DIM). The FTCs and DIMs are designed with an Open Standards Operating System utilizing Hydra Protocol to provide the highest level of system operations and reliability.
The DIM is currently offered in a Dual Door Module (DDM) or Single Door Module (SDM). PCSC’s Hydra Protocol not only maintains communication integrity but also provides a network database manager to control system parameters, access, alarm and output data. Utilizing peer-to-peer communication, the Hydra Protocol communicates system updates with other FTCs within its network.
Changes to data such as: cardholder, input and output statuses are automatically updated among the appropriate FTC. Hydra Protocol also contains a firmware management application to maintain firmware integrity of its DIMs. It maintains the approved firmware and firmware level and automatically updates older versions of DIM firmware, eliminating any security breach or service time.
- Fault Tolerant Process
- Automatic Hot Cutover
- Fail Safe Operations
- Open Systems Platform
- Open Architecture Protocol
- Ethernet / PoE Communication
- Peer to Peer Communications
- WirelessMeshCommunications (Optional)
- Designed to be 99.9999% reliable and available
- “Threat Level” Card Authorization Logic
- Two Person Minimum Occupancy Rule
- 5 State Alarm Monitoring
- FIPS 201 and TWIC Compliant
- User Configurable Cardholder and History Capacity
- Automatic Card Activation and Deactivation by Date and Time
- U.S. Patent No. 7,644,299