Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Nhà> Blog> What is the access control card system

What is the access control card system

June 27, 2023
Access Control Card System Overview

The access control card system is an electronic system that records the card holder's access time by entering and leaving the card. With a smart card and a set of smart card hardware and software platforms, provide users with convenient, secure and accurate access control, attendance, consumption, identification, electronic payment and information search services and other needs of the application.

The card system data is stored in a database, and the basic information of the card is shared by the sector. The entire system realizes one card issue and one report loss, and reaches the true meaning of the card (cartoon, netcom, and kutong).

idea

The most fundamental requirement of the access control card system is “information sharing and centralized control”. Therefore, the design of the access control card system should not be a simple combination of individual functions, but it should be from a unified network platform, a unified database, a unified identity authentication system, and data transmission. The technical implementation considerations of the overall design ideas of security, various types of management system interfaces, exception handling, etc. enable the intelligent system of each management system and each access control card reading terminal device to achieve the best system design.

Features

The access control card system can achieve a variety of different management functions. For example: access control, attendance, dining, consumption, parking access, patrolling check-in, meeting check-in, elevator use, and other functions. These functions can use equipment from different manufacturers, such as: access control attendance using A manufacturer's products, consumption of the use of B manufacturers' products, parking management use C manufacturers' products. Everyone agrees to use the same format of the card, the user holds a card, respectively, registered in the software of different manufacturers, and has access control parking attendance parking management for a variety of purposes.


The advantage of this model is that: from the various functions, you can choose products that are highly specialized for the customer's own use. As long as you agree on the same type of card, you can implement a variety of card functions, and there is no compatibility issue. Users can choose the best manufacturers in various fields, such as access control attendance consumption, to purchase the most suitable products for themselves. A system failure will not affect other systems, a system is not properly selected, easy to change and replace with minimal loss.

Access control, parking, consumption, attendance, check-in, elevators, passages, visitors, patrols, etc., where identification and control are needed, all users of these applications use one card for access and use, so they are called cards. They are not accurately defined. There is no true cross-regional or cross-industry common use. In fact, the card system is not just to look at "one card use," mainly to see whether there is a card management platform (back-end authorization, consumer rights can not be multiple sets of systems, can only be an interface operation, although the network can be installed) and a database management That is, "a network, a card, a library" ("line, a card, a library" is a limitation is wrong).

The disadvantage is that managers need to register cards in separate software. However, different functional managers will generally be different. For example, if attendance is managed by the Ministry of Personnel, access control is managed by the Security Department, and dining consumption is managed by the dining hall. Instead, the software can do its part independently without affecting each other. (This can be done using metadata-driven technologies to make it uniform at a level.)

The characteristics of the access control card system include

1. Rights Management Sets, changes, cancels, and restores access rights for personnel.

2. Powerful and flexible rights management functions can specify which operators have certain rights and can set the scope of their rights management. This function is consistent with Party A's usage habits and is a unique feature that can improve the product's competitive advantage.

3, professional OPC interface through this interface can easily integrate the access control system to almost all building automation systems.

4, combined with calendar calendar schedule can be set to use different ways to open the door at different times.

5. The video linkage function can realize the seamless integration of access control and video systems. It is easy to implement the query and management of door-to-door events that are convenient for video capture and enhance the value of the system.

6. The alarm workstation uses an electronic map and a graphical interface design to visually display the current status of each device and door point. The alarm station's SMS and phone alarm functions can be reported by voice and SMS, and can be set to five levels to form a closed-loop process for troubleshooting and problem points.

7, online patrol without additional hardware costs Graphical interface can easily complete the patrol route layout and patrolling personnel management.

8. The conference sign-in is based on the access control without any additional hardware costs to fully and effectively manage the conference room. (Conference signing system interface).

9, the system can be added according to the actual needs of parking, visitor management, elevator control, consumer systems and other more workstation modules? Realize a true card on UISYS server platform.

10. The hardware structure (main control + sub-control) and international mainstream brands can save engineering costs and post-maintenance costs as much as possible.

11, the system is quick and easy to use. The software operates in the same way as the Microsoft Windows operating system provides a rich right-click menu, drag and drop functionality is very easy for users accustomed to Windows, and we provide a multimedia operation demonstration on the software interface to create a system when the operator For a step that does not know how to operate, click the button of this step and you can see that the multimedia demonstration of this step basically allows you to easily operate the software without reading the instructions.

12. Modular system structure (server + workstation). This structure facilitates independent management of different functional departments based on the authority to avoid the confusion of privilege management. For example, the server ui-sys is used for data processing and maintenance workstations for system maintenance Patrol workstations for security management elevator workstations for elevator control visitor workstation application visitor management.

Typical subsystem

Although the access control card system is still evolving, it has matured from technology to application. This can roughly summarize the typical subsystems of the five aspects of access control cards:

1 platform management: rights management, equipment management, data management, card management and other subsystems;

2 Identity: Subsystems such as access control, ladder control, attendance, patrolling, vehicle access, vehicle commuting, conference signing, visitor management, storage management, etc.;

3 Electronic transactions: subsystems in the banking circle, consumer management, water control management, and electronic control management;

4 information services: WEB inquiries, touch screen queries, telephone voice queries, SMS inquiries and other subsystems;

5 integrated access: ERP interface, library management interface, educational administration interface, human resources interface, office automation system, can provide OPC interface and other video surveillance, alarm, fire, building automation system integration.

There are two general types of typical card access control architectures:

The first type: TCP/IP+ bus architecture, the bus can be RS485, CAN, etc. Each subsystem has an independent management server, which is connected to the terminal controller through the bus under the management server to realize the professional functions of each subsystem.

The second category: The full TCP/IP architecture, including the terminal controllers are all network-based. All device, service, and application layer devices are hung on TCP/IP networks. Service layer subsystems and applications of this type of architecture. The layer subsystem is the same as the first type architecture, and the management server of the corresponding subsystem and the professional controller are not connected in the form of a bus, and everyone exchanges data by TCP/IP.

In general, the TCP/IP system has the following advantages over the previous pure 485 bus system:

1) Fast transmission speed, making full use of TCP/IP network transmission advantages;

2) Flexible and convenient system application and expansion, compatible with 485 bus structure, each subsystem is accessed in a modular manner;

3) User friendly user interface, simple installation and use;

4) It can be based on the user's original computer network, reducing the large-scale wiring, suitable for large-scale and ultra-large-scale applications.

5) The maintainability of the system is improved, and the IP network facilitates remote diagnosis and maintenance.
Liên hệ chúng tôi

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Sản phẩm được ưa thích
You may also like
Related Categories

Gửi email cho nhà cung cấp này

Chủ đề:
Thư điện tử:
Tin nhắn:

Your message must be betwwen 20-8000 characters

Nhà

Product

Phone

Về chúng tôi

Yêu cầu thông tin

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Gửi