Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Nhà> Blog> Make access control to buy large decryption more simple combination of soft and hard features

Make access control to buy large decryption more simple combination of soft and hard features

September 07, 2022
In today's security systems, the requirements for the function of the access control system are getting higher and higher. This requires the engineering company to have a more in-depth understanding of the access control system. This article gives you an in-depth analysis of the function of the access control system and provides you with a choice of suitable products. Theoretical basis.

Types of Access Control Currently, the access control products offered on the market generally include the following types:

Independent controller with independent controller as the main body This type of stand-alone controller integrates the card reader with the access control circuit and implements various function settings through the keys on the controller surface, such as adding a card, deleting a card, etc. . As long as the registered card, a credit card can enter the door open signal at any time. This access controller cannot be networked, does not require background software drivers, and can only be controlled by a single door.

This kind of stand-alone simple access control system is only suitable for simple office access control, no other strict security control logic (such as: time, combination, etc.), does not provide open log, can not monitor the access of personnel and an examination. 2000 represented by LCJ.

Attendance/access control system based on the attendance machine input unlock signal This type of time attendance/access control machine is based on the original mature attendance machine and is realized by adding one (or more) unlock signal interface. This kind of time attendance/access control generally has a liquid crystal display, a keypad, and an external (or multiple) card reader to meet the need to install the attendance/access control in the room. In addition, this time attendance access control supports RS485 networking, back-end support for simple time and attendance software, and simple access control management software (integrated with attendance software). JS168 is represented by Junsi, and is OEM by many one-card merchants. The market application is better.

The professional access control system with professional access controller and independent card reader as the main body is the main body of this access control system. It is divided into three parts: professional access controller, independent standard card reader and professional power supply chassis. The access controller is installed in the power supply enclosure to form a whole. The power supply chassis provides power supply for the entire system, including: regulated/transformed and standby power functions. The power supply chassis is generally installed in a hidden, safe place in the room. Unlike attendance attendance machines, this access control system is a professional access security control system. All hardware and software design functions are fully targeted for access security control.

Access control purchase problem: software concern In a better access control system, the access controller is networked through RS485 bus, TCP/IP network, Modem and other communication methods and unified management through access control management software. The system server installing the software sets the system parameters of the access control master through the network, and collects all data including the access control card reader and the alarm detector in real time. When an event occurs such as an alarm event, a controlled entrance or exit, an event occurs. The system will perform corresponding actions according to a preset program, including: opening/closing the controlled door; sending an alarm signal to the alarm center; and controlling the corresponding camera to monitor or record the alarm location; turn on/off the lighting, air conditioning Such as the corresponding action and other functions. Others include:

(1) One card: Most of the projects now require the realization of a card function. The core part is the access control system. The following functions need to be implemented: access control, attendance, POS consumption, parking lot, visitors, elevators, online patrolling, and book lending. .

(2) Support dual-machine fault tolerance: Under normal conditions, one is in the working state of the host, and the other is the slave, acting as the backup machine, and monitoring the operation of the host at all times. When the host is abnormal and cannot support the normal operation of the information system, the slave takes over the operation and IP address of the host, and continues to host the operation of the information, thus ensuring that the information system can run uninterruptedly and when the host recovers. Automatically take over the original job, the slave will be the backup machine, and monitor the operation of the host at all times.

(3) Photo comparison: When the cardholder swipes, the cardholder's photos stored on the computer are displayed on the computer, and the security personnel or the CCTV system can perform the comparison to confirm the identity of the card user.

(4) Interlocking function: For areas where the security level is very high, many layers of channels are required for management, such as banks. When swiping the first door with a pass-through card, the swipe is in the area between the first door and the second door. At this time, the system will detect the door status of the first door. When the system confirms that the first door is closed, the cardholder is allowed to brush the second door if it is confirmed that the first door is not closed even if the card is authorized. When entering the second door and swiping the card, the system will also refuse to open the second door. Some systems can also support multiple interlocking functions.

(5) Linkage with CCTV System Users can use the software-in-use protocol to communicate with the monitoring system to program and control CCTV front-end equipment (for example, call images, control cameras, pan/tilt heads, focus adjustment, etc.). At the same time, some manufacturers' access control systems have been seamlessly integrated with DVRs of some well-known brands at home and abroad, and the recorded images can be freely called in the software.

(6) Emergency evacuation situations or other special circumstances occur in conjunction with the fire fighting system. Forced opening or closing of certain designated doors may be made through software pre-setting to facilitate the escape of personnel and protect important financial and documentary purposes.

(7) The linkage system with the alarm system can be linked with the alarm system. When the alarm condition occurs, preset actions can be performed. For example, the preset door is opened/closed, the sound and light alarm is activated, and the alarm information is transmitted to the monitoring. center.

(8) Linkage system with building control system Through open OPC, it can be integrated with many building control systems and unified management. For example, the system can be set to turn off/on elevators, insulation, ventilation, air conditioning, lighting, etc. when an employee leaves/enters, so as to achieve the effect of saving energy and facilitating management.

(9) Global linkage can be separated from the PC When some specific events occur (alarms, swipes, or until a certain time, etc.), a preset program can be executed (Start audible and visual alarm, open/close door, open/close Lighting, air conditioning and other equipment, etc.). These executed programs may be internal linkages within the same controller, or may be linkages between the system and other controllers. And the system can be extended to perform global linkage without any computer support, even if it is offline.

(10) The controller supports dual bus transmission extension function (A) Communication backup: When the area security controlled by the system is very high, the user will require the system to monitor the line in real time and all the information is displayed in real time. Therefore, there are manufacturers proposed a dual bus. The solution, that is, the equipment connected to the system via two buses. If the first bus (TCP/IP or RS485) is interrupted or the connection fails, the communication will be automatically transferred to the second bus, which can ensure the smooth communication of the system.

(B) Alarm Event Upload: The conventional access control system uses polling to communicate with the controller. A large amount of data will be uploaded to the PC at the same time. This will result in blockage of the communication information and may cause delays in time. In the dual bus system, the first bus interface is used for normal round robin mode and handles general event information (such as credit card information, etc.). The second bus is designed to handle the transmission of information for alarms and special events. It automatically uploads information to the PC at the moment of alarm generation. Regardless of the number of controllers and alarm points in the network, the transmission is completed in an instant, and real-time alarms can be truly achieved.

Access control purchase problem: hardware attention 1. Compatibility and Extensibility When purchasing a product, the hardware compatibility and scalability are certainly the preferred products. For example, some domestic manufacturers' input devices can be compatible: card readers, fingerprint readers, palm readers, out-of-order keyboards, etc., and can share a communication bus with fingerprint readers and palm readers. Card reading technology can be compatible with: magnetic cards, barcodes, Wiegand, biometrics, and many other technologies.

2. Flexible configuration and networking In addition, whether to provide serialized products and provide users with comprehensive solutions, but also to assess the focus. More ideal manufacturers and suppliers should be able to choose different access control software and controllers according to different scales and functional requirements of the system. The system network can also be flexibly networked according to the actual situation on the site. For example: When the control area is more dense, RS485 bus structure can be applied; when the control area is relatively large or not in the same place, real-time monitoring is not required, dial-up networking can be done through the Modem dial-up network; when the control area is relatively large and not in the same location If there is already a local area network on the construction site and the server is required to monitor the system in real time, the TCP/IP networking mode can be selected to implement local and remote multi-site multi-level management and global networking can be achieved. In the same system, three networking methods can be applied at the same time, even if individual controllers have problems, it will not affect the entire system.

3. The security of security access control systems is also crucial. When the communication between the bus and the PC is interrupted, the operation of the controller cannot be affected. All setup commands and entry and exit records should be stored in the controller. When communication is resumed, the data is uploaded to the server again to ensure that the data is not lost. When a controller fails, it does not affect the operation of other controllers. The security of communications is equally important. For example, some products have “encryption protection” capabilities, and their software allows each end user to use a 32-bit password to encrypt the communication protocol. The corresponding controller will not accept any unencrypted commands except talking to the software used by the user. The encrypted key is set by the user, and any person, including the system developer, cannot unlock it, and has extremely high security.

In short, as a safe access control system, the choice of products is of the utmost importance. Otherwise, it will be virtually useless and will not achieve the functional requirements of security control. To choose a smart card access control product, you should first select a networked professional access control system.
Liên hệ chúng tôi

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Sản phẩm được ưa thích
You may also like
Related Categories

Gửi email cho nhà cung cấp này

Chủ đề:
Thư điện tử:
Tin nhắn:

Your message must be betwwen 20-8000 characters

Nhà

Product

Phone

Về chúng tôi

Yêu cầu thông tin

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Gửi