Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Security Engineers Understanding the Function of Access Control Systems

Security Engineers Understanding the Function of Access Control Systems

April 24, 2023
In today's security systems, the requirements for the function of the access control system are getting higher and higher. This requires the engineering company to have a more in-depth understanding of the access control system. This article gives you an in-depth analysis of the function of the access control system and provides you with a choice of suitable products. Theoretical basis.

1. Compatibility and Extensibility

In the purchase of products, hardware compatibility and scalability are certainly the preferred products. For example, some domestic manufacturers' input devices can be compatible: card readers, fingerprint readers, palm readers, out-of-order keyboards, etc., and can share a communication bus with fingerprint readers and palm readers. Card reading technology can be compatible with: magnetic cards, barcodes, Wiegand, biometrics, and many other technologies.

Flexible configuration and networking

In addition, whether to provide serialized products and provide users with comprehensive solutions must also assess the priorities. More ideal manufacturers and suppliers should be able to choose different access control software and controllers according to different scales and functional requirements of the system. The system network can also be flexibly networked according to the actual situation on the site. For example: When the control area is more dense, RS485 bus structure can be applied; when the control area is relatively large or not at the same location, real-time monitoring is not required, the dial-up networking can be done through the Modem dial-up network; when the control area is relatively large and not in the same location If there is already a local area network on the construction site and the server is required to monitor the system in real time, you can select the TCP/IP networking mode to implement local and remote multi-site multi-level management and achieve global networking. In the same system, three networking methods can be applied at the same time, even if individual controllers have problems, it will not affect the entire system.

3. Security
The security of the access control system is also crucial. When the communication between the bus and the PC is interrupted, the operation of the controller cannot be affected. All setup commands and entry and exit records should be stored in the controller. When communication is resumed, the data is uploaded to the server again to ensure that the data is not lost. When a controller fails, it does not affect the operation of other controllers. The security of communications is equally important. For example, some products have “encryption protection” capabilities, and their software allows each end user to use a 32-bit password to encrypt the communication protocol. The corresponding controller does not accept any unencrypted commands except talking to the software used by the user. The encrypted key is set by the user, and any person, including the system developer, cannot unlock it, and has extremely high security.

4. Rich software features

In a better access control system, the access controller is networked through RS485 bus, TCP/IP network, Modem and other communication methods and unified management through access control management software. The system server installing the software sets the system parameters of the access control master through the network, and collects all data including the access control card reader and the alarm detector in real time. When an event occurs such as an alarm event, a controlled entrance or exit, an event occurs. The system will perform corresponding actions according to a preset program, including: opening/closing the controlled door; sending an alarm signal to the alarm center; and controlling the corresponding camera to monitor or record the alarm location; turn on/off the lighting, air conditioning Such as the corresponding action and other functions. Others include:

(1) One card:

Now most of the projects require the realization of card functions. The core part of the project is the access control system. The following functions need to be implemented: access control, attendance, POS consumption, parking, visitors, elevators, online patrols, and book lending.

(2) Supports dual fault tolerance:

Under normal circumstances, one is in the working state of the host, the other is the slave, as a backup machine, and constantly monitor the operation of the host. When the host computer is abnormal and cannot support the normal operation of the information system, the slave takes over the operation and IP address of the (TakeOver) host and continues to host the operation of the information so as to ensure the continuous operation of the information system. When the host recovers, it automatically Take over the original operation, the slave will be the backup machine, and monitor the operation of the host at all times.

(3) photo comparison:

When the cardholder swipes the cardholder photos stored on the computer are displayed on the computer, and the security personnel or the CCTV system can perform the comparison to confirm the identity of the card user.

(4) Interlocking function: For areas where the security level is very high, many layers of channels are required for management, such as banks. When swiping the first door with a pass-through card, the swipe is in the area between the first door and the second door. At this time, the system will detect the door status of the first door. When the system confirms that the first door is closed, the cardholder is allowed to brush the second door if it is confirmed that the first door is not closed even if the card is authorized. When entering the second door and swiping the card, the system will also refuse to open the second door. Some systems can also support multiple interlocking functions.

(5) Interworking with CCTV system

Users can communicate with the monitoring system through software-in-use protocols and programmatically control CCTV front-end devices (eg, call images, control cameras, pan/tilt heads, focus adjustment, etc.). At the same time, some manufacturers' access control systems have been seamlessly integrated with DVRs of some well-known brands at home and abroad, and the recorded images can be freely called in the software.

(6) Linkage with fire protection system

Emergency evacuation situations such as fires or other special circumstances may be forced to open or close certain designated doors through the pre-setting of software, so as to achieve the purpose of personnel escape and protection of important financial and documents.

(7) Linkage with alarm system
The system can be linked with the alarm system. When a police situation occurs, a pre-set action can be performed, for example, opening/closing a pre-set door, and an audible and visual alarm is activated to send the alarm information to the monitoring center.

(8) Linkage with building control system

Through open OPC, the system can be integrated with many building control systems for unified management. For example, the system can be set to turn off/on elevators, insulation, ventilation, air conditioning, lighting, etc. when an employee leaves/enters, so as to achieve the effect of saving energy and facilitating management.

(9) Global linkage from PC
When certain events occur (alarms, swipes, or until a certain time, etc.), pre-programmed programs (activate sound and light alarms, open/close doors, turn on/off lighting, air conditioning, etc.) can be performed. These executed programs may be internal linkages within the same controller, or may be linkages between the system and other controllers. And the system can be extended to perform global linkage without any computer support, even if it is offline.

(10) Controller supports dual bus transmission extension function

(A) Communication backup: When the regional security level controlled by the system is very high, the user will require the system to monitor the line in real time and all the information will be displayed in real time. Therefore, there are manufacturers proposed a dual bus solution, ie, connecting the system through two buses. device of. If the first bus (TCP/IP or RS485) is interrupted or the connection fails, the communication is automatically transferred to the second bus. This ensures the smooth communication of the system.

(B) Alarm Event Upload: The conventional access control system uses polling to communicate with the controller. A large amount of data will be uploaded to the PC at the same time. This will result in blockage of the communication information and may cause delays in time. In the dual bus system, the first bus interface is used for normal round robin mode and handles general event information (such as credit card information, etc.). The second bus is designed to handle the transmission of information for alarms and special events. It automatically uploads information to the PC at the moment of alarm generation. Regardless of the number of controllers and alarm points in the network, the transmission is completed in an instant, and real-time alarms can be truly achieved.
Hubungi kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk populer
You may also like
Related Categories

Email ke pemasok ini

Subjek:
Email:
Pesan:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kami

Permintaan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Kirim