GEMOS access - Performance features

GEMOS access is the access control system from ela-soft GmbH.

The open scaling starts with small projects with e. g. one or two access points and an authorised circle of people of up to 100 and reaches up to a maximum of 10,000 access points on large projects and an authorised circle of people of a maximum of 1,000,000.

With its superior availability and integral performance, GEMOS access makes itself a high-end access control system.

  • Path guidance / path tracking
  • Assignment of several identifi cations to one user
  • Management of user groups with authorisation and time profiles
  • Timed Anti Passback
  • Re-register
  • Validation
  • Intrusion detection funtionality
  • Anti-passback
  • Four-eyes principle (multiple person presence check)
  • Two person access check
  • Visitor / employee access control
  • Car park (or other balancing)
  • Linking with third-party systems for extended rights check (e.g. connection to biometric systems, image comparison)
  • Control via danger alarm systems (e. g. with triggered fireextinguishing system)
  • Bag check
  • Multi-door sluice system
  • Elevator control
  • Integration with key management systems/lock box systems (authorisation control and protocol of access management)
  • Management of offl ine readers (offl ine cylinders)
  • Writing time-limited access information on the identification for offline cylinders
  • Redundant server with hot standby possible
  • Simple gatekeeper interface for creating daily replacements and visitor passes
  • Visitor pre-registration by an employee via a web interface possible
  • Up to 1,000,000 users (authorised access)
  • Up to 1,000,000 identification cards
  • Up to 10 identification cards per user
  • Up to 10,000 user groups
  • Up to 10,000 reader groups or room zones
  • Up to 20,000 readers
  • Up to 2,000 GEMOS access controllers
  • Up to 1,000 time zones
  • Up to 1,000 time zones per user
  • Up to 4 time intervals per day


  • Mixed operation with various types of identification cards and types of readers in one installation
  • Web-based user interface
  • Superior availability due to redundant bus structure
  • Cryptographically encoded security bus
  • Connection of intelligent escape route terminals
  • Integration into existing networks, also heterogeneous ones
  • Integration into the building security information management systems through open interfaces