Custom-driven and flexible

M500 is coherently conceived right through to its peripherals, providing solutions for virtually all access scenarios and access points. Online and offline components complement each other to the dot whilst simultaneously taking account of your own specific requirements.

M500 is to be recommended wherever large numbers of people congregate – be it in office blocks, clinics, schools or hotels – and complex organisational challenges have to be met.
Instead of the card-based programming that characterises M100, M500 is programmed by means of FSB M Access Management software and a WiFi/LAN-based network of FSB M access points.

This enables complex building structures to be manageably mapped and administered from a central workstation, which puts an end to the “doing-the-rounds” form of administration under which each fitting is programmed individually.

M500 augments the great variety of options afforded by an online system with meaningful offline functionalities and can accommodate almost any access scenario/point of access. M500 is all about multi-dimensional solutions, employing “data-on cards” and offline functionalities to facilitate multi-user applications in, for instance, the administration of large properties or handling of complex requirements.

M500’s innovative features include decentralised update terminals, the assignment of locational information, the award of individual and group access rights and temporarily valid guest media and easy implementation of customers’ specific requirements. It is also possible, over and above the core application, to perform a large number of specified functions for bespoke organisational tasks.

In addition to sets for flush, glass and narrow-frame doors, it is also possible to deploy readers (wall-mounted) for the actuation of further functions. An armoured fitting acts to secure external points of access. In terms of both looks and materials, it marries the virtues of traditional mechanical fittings to those with an electronic access function in a manner that is unique in the Civic/Commercial sector.

M500 can be installed either new or as an upgrade of M100.


To the dot: offline and online modules in perfect complementarity

1 | E-Modules, offline
2 | PC with M Access management client
3 | M Card Reader
4 | M Access Point
5 | E-Modules, online
6 | M Update terminal
7 | M RF USB stick
8 | PC with M Offline synchronisation software

Access organisation is about opening up means of structuring traffic within a building to the operator as well as about satisfying their budget requirements. This is what determines the quality and sophistication of any access scheme. “Access management” is the term coined by FSB to describe such an all-embracing approach to digital building organisation.

We are pursuing three main objectives with our M access management systems in seeking, in its day-to-day application, to square operators’ access-organisation requirements with the applicable ergonomic parameters and the experience we have amassed in more than 30 years of in-depth architecture consultancy:

New: extended offline functionalities

With M500, FSB has in the first instance extended the output capability of its M systems by means of target-responsive online/offline functionalities so as to guarantee a virtually exhaustive traffic-structuring service coupled with the utmost in flexibility. Direct activating access rights on the Key enable the user to update their Key at any time at terminals distributed throughout the building.

For all types of building and door

The M access management concept was from the outset geared towards the types of door most commonly used in architecture. The electronic and mechanical hardware solutions from the House of FSB are truly “a piece of art”. No other manufacturer offers such a complete solution.

Ergonomics + convenience – people centre-stage

Hold up the identifier medium and open the door with the handle – it could hardly be easier, “more customary” or convenient. But we really want to impress you with the M500 Access Management software: it delivers a wealth of efficient, convenient, intuitively usable functions that, as well as making the administrator’s day-to-day work more straightforward, can also be individually configured to the extent required by a given access remit. Individual and group access rights, custom-definable Key schemas and a multi-layered identifier-medium concept are just some of the building blocks involved.

Technology and description of functions

ID medium can be authenticated without any need for contact using passive transponder technology via the electronics module. The electronics module in the key rose will automatically identify a medium as authorised or unauthorised as soon as it is held in its immediate vicinity. Although the ID medium’s transponder carries specific and individually programmable information, it does not need a battery and is completely maintenance-free.

Passive transponder technology

Passive transponder technology means that the energy needed for communication and to run internal processes comes exclusively from the reading unit’s field. As a result, the ID medium does not need its own power supply.

The electronics module of the M-system uses MIFARE™ chip technology by NXP. Data communication takes place at a frequency of 13.56 MHz. In conjunction with the key cards based on MIFARE™ DESFire EV1, secure encryption with a system-specific security feature is guaranteed. Technology meets the highest security requirements and corresponds to current state-of-the-art standards.

FS approval for fire doors

Electronic fittings from FSB simplify planning work considerably as well as offering reliability with regard to liability and complaints. With respect to use on fire safety components, electronic fittings by FSB are approved for fire safety and meet the applicable requirements according to DIN 18 273. Over and above this, they can even be used for emergency exits with door handles pursuant to DIN EN 179 in conjunction with suitable locks.

Both for renovations and for new buildings, the advantages are clear: owing to its FS approval, electronic access management systems can be installed on corresponding fire doors, without having to add the use of the fitting to the building’s monitoring documents. Already existing FS doors or even FS doors preconfigured with other fittings can continue to be used without any problems, and electronic fittings by FSB can be used to bring them in line with the latest state-of-the-art technology.

Update terminal and Positional information

Directly activating access rights on the Key

It is possible under M500 for user-specific access rights to be stored on M Key cards or M Key Fobs, i. e. what are known as “data media”.

Update terminals distributed throughout the building enable the user to update his or her Key at any time. The applicable identifier medium solely acquires the altered or new access rights of relevance to the Key in question.

One merit of this solution is the great flexibility afforded by being able to alter access rights at any time and in a directly acting manner without having to modify the programming of the hardware fittings: It is not absolutely necessary to use the M Access Management software to keep the entire suite constellation completely up to date online at all times. Where frequently changing access rights in particular are concerned, administrative input can be confined within reasonable limits as a result.

Straightforward structuring of large suites

Complex and/or large building structures dispose over a large number of doors, hardware fittings and access rights. It is important to remain in control of the overview at all times.

That’s child’s play with M500: details of exactly where the various hardware fittings are located in the building are provided in spatially intelligible form by the FSB M Access Management software.
The user has scope for adding supplementary information and data to a given fitting, moreover.

Individual and group access rights, Guest media and Key schemas

Reduced input when changing access rights

User and/or door profiles of an equivalent kind can be grouped together, thus avoiding the need to administer access rights individually in the event of alterations being made. Staff in a particular section of a building with the same access rights and “behavioural patterns” or duties can be administered collectively, for instance. Alterations are applied to the group as a whole.

This approach opens up potential for a “s mart” combination that makes the administrator’s work even more straightforward: a door may be “affiliated” to several door groups, whilst an identifier medium is only ever part of a single Key group.

Temporary access rights on the Key

Identifier media generally incorporate a time profile that can, for instance, authorise cleaning staff to access specified rooms within a recurring time slot. M500 additionally enables users to be allowed defined time budgets: the medium loses its validity for a given day once a specified
time budget has been exhausted and needs to be refreshed with new access rights the next day. This enables different types of authorisation to be awarded without in any way impairing the security parameters involved, e. g. in the event of the card being lost and it having to be assumed that the administrator will not immediately become aware of the loss, if at all. This is a help to the administrator that additionally renders him or her less individually accountable.

The media types available are:

  • booked-in media
  • guest media

Meeting bespoke requirements

M systems are configured in such a way as to be able to adapt to changing or growing requirements in a particularly flexible manner. This is notably the case where link-ups with other systems are concerned.

Like the partitioning of a hard disk, it is possible to predefine the segmentation of M500 identifier modules so as to guarantee optimum resource exploitation of M500 system output – depending on the number of M identifier media and thirdparty, booked-in or guest media (and with what functionality) to be covered by the applicable access solution.

Each Key schema concretely parameterises possible Keys by type, quantity and function and lays down specific constellations.