Session B: Information Systems and Data Warehouse
Martin Malík, Tomá Kamrád: Information systems Conception of University of Ostrava

2. The Identification System Viking

The security of the access to some areas of UO is ensured with a Viking system above SQL database. Terminals and a computer with appropriate software form the access system. There is a possibility of defining an access right on the computer both for an individual and for a group, which enables generating pre-defined profiles. The profiles can be generated manually or in an automated way by means of a data transport from the subsystem of the access rights. The data are consecutively sent to the terminals and these take the physical control operation over individual access and identification devices. The data back-flow is again transparent, namely from a point where the data arise (a sensor, gate etc.) to a collecting terminal and by means of a batch stream through LAN into the central computer. A great advantage of the system is a fact that there is no need to maintain permanent connection among the terminals and a computer because the terminals are capable to operate independently.

2.1 Identification cards

Within the implementation of individual systems there occurred a requirement concerning establishing identification cards both for students (student‘s ID card) and for employees (employee‘s ID card) of UO. Use of contactless proximity cards proved to be the best solution. Concerning the students‘ cards a graphic format of the international student organization ISIC, which provides them with a number of other benefits, has been chosen. Currently the system is used especially for an authorized access to computer classrooms and labs, for an access to some restricted computers, for circulation operations in the university library, in the students‘ dining hall etc. We aren‘t considering the use of identification cards at the moment due to high costs of scanners for all the computer stations.



© This publication and its compilation in form and content is copyrighted. Every realization which is not explicitly allowed by copyright law requires a written agreement. Especially, this holds for reprography and processing / storing by electronic systems.

EUNIS Proceeding DTD Version 1.0
HTML - Version create: Fri Mar 23 15:30:43 2001