Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Detailed number of security access control system four application modes

Detailed number of security access control system four application modes

May 07, 2023
Foreword:

The access control system is a subsystem of the access management system. Usually, it uses the technology of swiping cards, passwords, or human biometrics to manage the entrances and exits of people or vehicles under the control of the management software, so that people and cars that have obtained the approval can enter and leave freely. And those who should not go in and out are prohibited and interfered. Since the access control system can quickly identify the identity of a person or a car, the access control system has rapidly evolved from various possible developments over more than a decade. Like the use of the access control system, it has entered the residence, entered the office building office, parking, subway and It can be used at the entrance of the hotel to confirm the identity of the visitor. It can also be said that in many premises access systems that need to check the identity of people and vehicles have become indispensable configuration items. Therefore, in engineering projects, access control is a unique project implementation technology for security workers, and access control technology projects have a larger proportion of networked communication technologies. We will explore these access networks in this issue. Communication technology is actually applied.

What are the access control system application modes?

Before discussing the construction and application technologies of access control networks, we need to have some understanding and understanding of the mode of access control to the main brother of the access control network in accordance with the different modes of access control, so as to talk about the technology of networking and communication. It will be more architectural in concept, and it will also be able to grasp the key points of construction methods in construction.

All equipment and accessories in the access control system should also comply with China or international relevant cyber security standards while operating safely and reliably. They can also work effectively in non-ideal environments. Strong real-time monitoring and linkage capabilities fully guarantee the safety of the user environment, the technology of the access control system continues to evolve, and user needs are changing. Therefore, the design and implementation of the access control system should take into consideration the practicality of future expansion. Need, that is: can be flexible additions and deletions or updates of various subsystems to meet the needs of different periods, to maintain a long lead and become a code for intelligent buildings. When the system is designed, the functions that need to be implemented are reasonably configured, and this configuration can be changed. Even after the project is completed, this configuration change is possible and convenient. The system software conforms to different history according to the developer. The needs of the period market will be upgraded and improved accordingly, and free software upgrades will be provided for the corresponding application customers free of charge. At the same time, it can be expanded into attendance systems, meeting attendance systems, patrol management systems, and meal management systems and other card projects. Structure and configuration of access control systems, generally function according to the management structure model can be divided into the following four ways in order to facilitate their ban network engineering construction reference <br> <br> a pattern: one-way inductive (+ Reader Controller + Out button + electric lock)

The user presents an authorized proximity card outside the door. After the card reader recognizes the legal identity, the controller drives the electric lock to release and records the door entry time. Press the door open button to open the electric lock and go out directly. Applicable to a general security level environment, can effectively prevent illegal entry of outsiders. Is the most commonly used management model.

Mode 2: two-way induction (card reader + controller + card reader + electric lock)

The user presents an authorized proximity card outside the door. After the card reader recognizes the identity, the controller drives the electric lock to release and records the door entry time. When the user leaves the controlled room, an authorized proximity card must also be presented in the door. After the card reader recognizes the identity, the controller drives the electric lock to release and records the exit time. Applicable to a higher level of security, not only can effectively prevent illegal entry of outsiders, but also can query the last person and time left, to facilitate the implementation of the responsibility to provide evidence for a specific period (such as when stolen).

Mode 3: Card + Password (card reader + controller + exit button + electric lock)

After you finish the card, you must enter the correct password to open the door. The password is a personalized password, that is, one person and one password. The advantage of this is that, for more secure applications, even if the card is picked up and cannot be accessed, the correct password must be entered. And you can easily set the mode, for example, for the same door, some people must be allowed to enter the card + password, some people can swipe, you can enter without a password, a specific person can enter the password is released.

Mode 4: Card + password + time period (independent access control host + exit button + electric lock)

No external card reader is required for this mode, and the reader is integrated with the controller. The door opening mode is divided into: 1 card + time period 2 password + time period 3 card + password + time period.
Hubungi kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk populer
You may also like
Related Categories

Email ke pemasok ini

Subjek:
Email:
Pesan:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kami

Permintaan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Kirim