Access control system


NODER access control is a Polish access control system, which has been developed on the basis of many years experience in the field of physical security systems. It is characterised by unprecedented – in this type of system – flexibility in design, installation and use. It is free of the issues and disadvantages typical of other access control systems. NODER ACS has end-to-end encryption, i.e. encryption of communication from the card (and also mobile credentials) to the server, management and visualisation of the system. It makes it possible to build a comprehensive solution that meets every level (grade) of the IEC 60839-11-1 standard.

Flexibility of ACS NODER is characterised by:

  • Supports up to 12 readers on a single controller
  • Each controller is an independent IP device based on Linux OS
  • Unlimited number of controllers in the system
  • Simplicity of installation, as there is no need to fit intermediate modules
  • Local preview of current controller operating parameters
  • Versatility in connecting RS-485 readers
  • Unlimited possibilities for building user rights
  • Off-line mode with the same capabilities as on-line mode
  • Control of the alarm systems from NODER’s readers
  • Common user management with other security systems


Access control controllers

ACS controller with LCD display board description EWE4-LCD NODER

There are EWE4-LCD, EWE4 and EE12 controllers, which are fully autonomous devices based on the Linux operating system. In addition, they are equipped with a microprocessor for the management and operation of inputs, relay outputs and reader communication buses. The controllers store off-line:

  • schedules
  • access levels
  • scripts
  • events
  • other necessary information for offline operation of the controller.

In the event of a loss of communication with the server, the controllers will still allow access to the protected areas to authorised users, together with a record of events in the built-in local memory, which can store more than 2 million logs. The decision to allow access to a protected room (e.g. after an employee’s card has been read from the readers) can be taken directly by the controller itself (unless otherwise set), which ensures immediate reaction to the fact that the card has been placed in the reader and, for example, the door lock is released.

The operations of the controller are independent of the availability and quality of communication with the server. When the connection to the server is re-established, all events stored in the controller are automatically downloaded by the server and saved in the system database. This allows events to be stored for any length of time, limited only by the capacity of the hard drives installed in the server. Changing the settings of controllers, readers and users takes place immediately and does not entail any interruption of system operation!

Communication protocols with access control readers

NODER controllers have the ability to connect readers via several communication protocols. The possibilities are shown in the table below:

Controller model RS-485 readers (NODER) RS-485 readers (OSDP) Wiegand readers
EWE4 Yes Yes Yes
EWE4-LCD Yes Yes Yes
EE12 Yes Yes No

Access control readers

Readers are based on the secure MIFARE DESFire RFID card standard and NFC with the possibility of granting access via a mobile app NODER Mobile Access. However, the connection between the readers and the controller is via the RS-485 protocol for MD-R and MDK-R readers, and communication is encrypted using the AES-256 algorithm.

For customised applications, e.g. as a key depository or printer access reader, the MD-W reader is available, communicating via the Wiegand protocol. This reader, like all NODER readers, supports the MIFARE DESFire card standard.


Proximity reader with nfc MD-R NODER Proximity desfire reader with NFC MD-R NODER

Modern access control systems must adapt to the non-standard requirements of our customers, that is why we offer the NODER QR-W reader. These allow bar code or QR code reading, which is most often used as temporary access to e.g. a conference room. Through integration with third-party systems such as the queue system and the use of bar code readers, it is possible to grant temporary access depending on the queue to which a person has been assigned.


NODER ACS – Software

  • Supervision over connections with controllers and the state of connected peripheries
  • Configuration of controllers and access control transitions
  • Monitoring of statuses and events in the system with the accuracy of a single door
    • accepted or rejected access
    • entrance or exit
    • waiting for passage
    • no passage after using authorized card
    • operating mode (normal, unlocked reader)
    • strain
    • too long holding the door
    • switching to battery operation
    • sabotage of the controller’s casing
  • Control from the map level (view of the building):
    • one-time passage opening
    • permanent unlocking the passage
    • permission to access (in the case of working in dual access mode – with the operator’s confirmation)
    • possibility of individual control of controller outputs
    • displaying the image from the camera observing the passage after clicking the chosen camera icon on the map
    • automatic display of a camera or several cameras assigned to a chosen passage after clicking the door icon on the map

NODER ACS – User management

  • creating rules of permissions and schedules
  • adding users and granting permissions
  • automatic filling the field with the card number in cooperation with a dedicated USB reader or from any reader in the system
  • data update, blocking or deleting users
  • creating and granting rights for user groups (departments)
  • assigning photo to a user (from a file or by capturing a picture from any camera in the system)
  • quick cards printing using previously prepared templates
  • quick search for users, schedules, access levels
  • ability to create any user types which will contain various, individually created data fields (Employees, Guests, Customers, etc.)
  • ability to restrict operator’s access to selected data user (invisible, read, read and record)
  • granting operators the ability to create, delete and modify users / departments
  • creating users with the Anti-pass-back function
  • locating users
  • Ability to import or export users to other systems (txt, csv, Excel, database file)
  • Cooperation with the “Event Manager” module enabling eg. photo identification or access in dual mode. Examples of action scenarios:
    • Tracking events, related only to specific access control passage. The security guard tracks events only from the passages he is responsible for, at the same time only events that are relate to selected passages are displayed on the screen
    • Photoidentifiation. When the security guard walks nerby the passage, on the screen displayes a picture of a passing employee, connected with his identifier. The security guard approves access via the software interface or by pressing the door open buton connected directly to the controller
    • Photo- and videoidentyfication. When the security guard is far from the access point. While identifying employees (card reading), not only their photographs, but also videos from the appropriate camera appear on the screen of the security guard. No matter how far away the work station is from the passage, the security guard can grant access after comparing photographs and videos
    • Displaying special information about employees. While identifying an employee, any information stored in his file can be displayed on the security guard’s screen. For example next to basic information such as photo, name, position etc. on the screen might be an information if the employee can bring a laptop with him
    • A central point of tracking of disturbing events, which is displaying the status of access points on the map and automatically displaying the video from the corresponding camera. In a central supervisory position, only disturbing events ar usually dispalyed, such as burglary or changing the status of connection with controllers etc. As their number is small, therefore the station may serve at the same time more passages. All events are real-time displayed on the map with the video from a specific camera

Guard Route System

By using the the NODER Access Control management system, we have the possibility to tracking security guards attendance in designated points of building or area. The module can also be used to monitor the presence of service teams or other operating services in remote locations.

The configured guard route consists of a MIFARE DESFire NODER RFID readers located on the object, which are part of the access control system operating on the site. We can configure dedicated card for a given route or a card of any user of the access control system. Guard route starts automatically when the card is applied to the first reader on a configured guard route or according to a previously configured schedule, which is signaled graphically and by sound. Security guard has a designated time to reach the route registration point, which is determined independently for each of them. If card is not read at this time, alarm will be generated at the client station and it has to be verified, classified and confirmed by the system operator.

All points of the route are visualized on the map of the object/building, and during the active tour they show their current status (point inactive, point active, whether it has been counted in the tour, time remaining to reach the point, reader failure). Clicking on a given point displays the cameras assigned to them from CCTV system of the object. Up to four cameras can be assigned to each of the points, which will be automatically displayed to the operator after the card has been applied to the given route reader by the guard or in case of a route alarm. In the case of PTZ cameras, you can also define a preset that will be called in the these situations.


All events are saved and correlated with the video archive. It is also possible to generate reports on the route, route point or card.

NODER Parking

NODER Parking logo ciemne Check out NODER Parking and other elements of the parking occupancy visualisation system

NODER Parking – System characteristics


To make it easier to calculate the current requirements for the ACS NODER system, a calculator is available for selecting the appropriate battery size for the access control system being designed.

Are you looking for more information on the NODER access control system? Please fill in the contact form below: