What are the functions and categories of the Xi'an access control system ? How to choose the right product for our use? 陕西思翔实业有限责任公司西安分公司小编为您来详细介绍： The following editor from Shaanxi Sixiang Industrial Co., Ltd. Xi'an Branch will introduce you in detail:
A brief history of development
As the name suggests, the access control system is a system that controls the entrance and exit channels. It is developed on the basis of traditional door locks. Traditional mechanical door locks are simply mechanical devices. No matter how reasonable the structural design and how strong the material is, people can always open it by various means. In the passages with many people (such as office buildings, hotel rooms), the management of keys is troublesome. If the keys are lost or the personnel are replaced, the locks and the keys must be replaced together.
In order to solve these problems, electronic magnetic card locks and electronic password locks have emerged. The emergence of these two locks has improved the degree of management of entrance and exit channels to a certain extent, and has brought channel management into the electronic age. With the continuous application of electronic locks, their own defects are gradually exposed. The problem with magnetic card locks is that information is easy to copy, the wear between the card and the card reader is large, the failure rate is high, and the safety factor is low. The problem with the password lock is that the password is easy to leak, and it is impossible to check, and the security factor is very low.
At the same time, most of the products in this period are installed outside the door by using the card reading part (password input) and the control part together, so they can be easily unlocked by people outside. The access control system in this period is still in the early immature stage, so the access control system at that time was often referred to as an electronic lock, and it was not widely used.
In recent years, with the development of proximity card technology and biometric technology, the access control system has developed by leaps and bounds, and has entered a mature period. Inductive card access control systems, fingerprint access control systems , iris access control systems, and facial recognition access control systems have appeared. Finger vein recognition access control system, out-of-order keyboard access control system and other technical systems, they have their own specialties in terms of security, convenience, easy management, etc., and the application field of access control systems is also getting wider and wider.
The access control system has the main purpose of preventing loss and preventing crime, so it must have extremely high reliability. An access control system may not have an alarm for most of its operation, so no alarm is required. The probability of an alarm requiring an alarm is generally very small, but if the alarm system fails within this extremely small probability, Often it means the advent of disaster. Therefore, the access control security system must implement reliability design (redundant design) and reliability management in each stage of design, construction, and use to ensure high reliability of products and systems.
In addition, in the system design, equipment selection, commissioning, installation and other links are strictly implemented in accordance with national or industry standards, as well as the requirements of public security departments on safety and technical precautions, products must pass a number of authoritative certifications, and have many typical User, normal operation for many years.
The access control and security system is used to protect people and property, so the system itself must be safe. The high security mentioned here refers to the natural or quasi-natural properties of the product or system. On the one hand, it should ensure the safety of equipment and system operation and the safety of the operator. For example, the equipment and system must be able to prevent high temperature, low temperature, Warm, smoke, mold, rain, and can prevent radiation, electromagnetic interference (electromagnetic compatibility), shock, collision, and fall, etc. The operation safety of equipment and systems also includes fire prevention, lightning protection, explosion protection, Protection against electric shock, etc. On the other hand, the access control and security system should also have the function of preventing human damage, such as: a protective housing with anti-destruct, and a tamper-proof alarm, anti-short circuit and open circuit.
With the continuous improvement of people's requirements for all aspects of the access control system, the application range of the access control system is getting wider and wider. People's application of the access control system is not limited to a single access control, but also requires that it can be applied not only to access control, attendance management, security alarm, parking lot control, elevator control, building automatic control, etc. in smart buildings or smart communities, but also Various control functions such as linkage control with other systems.
5, network system
Networked access control appeared earlier in the 1990s. With the increasing application scope of the access control system, people's demands for the access control system are no longer limited to a single entrance and exit control, but they are required to have multiple control functions such as access control, attendance management, and building self-control, and integrate the system. And remote control functions have very clear requirements. However, the traditional access control is based on the RS485 communication method, the transmission distance and the number of nodes are limited, and remote control and intelligent management cannot be achieved. The networked access control based on the Ethernet transmission method came into being. It not only solves the problem of long-distance transmission, but also makes it possible for more servers and workstations to participate in management, thereby providing customers with multi-level and multi-module access control. management.
In response to changes in application requirements, many access control vendors have launched network access control products. The so-called networked access control refers to the access control system based on TCP / IP protocol for data transmission. Both the control center server and the front-end controller adopt a networked structure, and the servers and workstations (PCs) in the management system also perform data transmission through the network. .
Third, the basic components
The identity recognition unit part is an important part of the access control system. It plays the role of identifying and confirming the identity of the passerby. There are many ways and types of identity recognition, including card identification, password identification, and biological identification. Identification type identification method and composite type identification method.
2.Sensing and alarm
The sensing and alarm unit includes various sensors, detectors, and buttons, and it should have certain measures to prevent mechanical trauma. The more commonly used in the access control system are the door sensor and the exit button. All of these devices use the digital output mode to output signals. A well-designed access control system can encrypt or convert the door sensor alarm signal and the exit button signal, such as converting to TTL. Flat or digital signals. At the same time, the access control system can also monitor the following alarm states: alarm, short circuit, safety, open circuit, request to withdraw, noise, interference, shielding, equipment disconnection, tampering, etc., which can prevent artificial shielding and destruction of digital alarm signals. To improve the security of the access control system. In addition, the access control system should also have real-time detection capabilities for the alarm line (regardless of whether the system is in the disarmed or armed state).
3. Processing and control
The processing and control equipment part usually refers to the controller of the access control system. The access controller is the center of the access control system. Just like the human brain, it stores a lot of relevant personnel's card numbers and passwords. The importance of these data is obvious. of. In addition, the access control controller also bears the tasks of operation and processing, and makes judgments and responses to various access requests, including operation units, storage units, input units, output units, and communication units. It is the core part of the access control system and the more important part of the access control system.
4. Electric lock and execution
The electric lock and execution unit includes various electronic locks, car stoppers and other control equipment. These devices should have sensitive action, reliable execution, good moisture and corrosion resistance, and have sufficient mechanical strength and anti-damage capabilities. There are many types and types of electronic locks. According to the difference in working principles, they can be divided into electric locks, magnetic locks, cathode locks, anode locks, shear locks, etc., which can meet various wooden doors, glass doors, metal doors, etc. Required for installation. Each type of electronic lock has its own characteristics, and there are also differences in safety, convenience and reliability. It is necessary to choose a suitable electronic lock according to the specific actual situation.
5.Control the executive agency
The entrance and exit control execution mechanism executes the control command sent from the entrance and exit management subsystem, and performs corresponding actions at the entrance and exit to realize the rejection and release operations of the entrance and exit control system. Common examples include controlled equipment such as electric locks, car stops, alarm indicating devices, and control objects such as electric doors.
6. Line and communication
The access controller should be able to support multiple networking communication methods, such as RS232, 485, or TCP / IP, etc., and use various networking methods in different situations to achieve system networking nationwide and even globally. In order to consider the overall security of the access control system, communication must be able to be transmitted in an encrypted manner, and the number of encrypted bits is generally not less than 64 bits.
7. Management and settings
The management and setting unit part mainly refers to the management software of the access control system. The management software can run in Windows2000, 2003, XP and other environments, supports the server / client working mode, and can authorize and manage operable functions for different users. The management software should use large databases such as Microsoft's SQL, with good developability and integration capabilities. Management software should have functions such as equipment management, personnel information management, badge printing, user authorization, operator authority management, alarm information management, event browsing, and electronic maps.
Fourth, system function
In the event of a network failure, it can be run offline, and fire-fighting linkage can report the loss of cards.
The access control read head uses a capacitive touch password keyboard.
Flexible setting of card holder's door opening authority, door opening time, and area time zone for door opening
Support multiple door opening methods: password, swipe card, remote door opening (Internet connection required)
It can support multiple conditions to flexibly combine access records, sort report data in different orders, and support report data printing and export to file functions.
Can be used with Doao Elevator / Parking / Access / Consumer / Smart Card
2, abnormal alarm function
Under abnormal circumstances, you can use the access control software to implement a computer alarm or an additional audible and visual alarm.
Anti-passback function: Set different area marks according to the location of the access point, and then make the cardholder enter and exit in accordance with the preset route, otherwise the next channel swipe card is invalid. This function allows cardholders to follow the designated regional route. Usually used in prisons.
Anti-trailing function: In the case of using a two-way card reader, it prevents a card from being reused multiple times, that is, after a valid card is swiped into the door, the card must be swiped out of the same door once before it can be swiped into the door again. Deemed illegal card refused entry.
Double door interlocking: usually used in bank vaults, also called AB doors, it needs to be used in conjunction with door magnets. When the door sensor detects that one door is not locked, the other door cannot be opened normally. Only when one door is properly locked can the other door be opened normally, thus isolating a safe passageway and preventing criminals from entering to hinder the deferment of the crime.
Duress code to open the door: When the cardholder is hijacked, to ensure the life of the cardholder, the cardholder can open the door after entering the duress code, but at the same time alert the control center. After receiving the alarm signal, the control center can Take corresponding emergency measures, the duress code is usually set to 4 digits.
Fire alarm monitoring linkage function: In the event of a fire alarm, the access control system can automatically open all electronic locks to allow people inside to escape at any time. Linkage with monitoring usually means that the monitoring system automatically records the current situation when someone swipes the card (valid / invalid), and also records the situation when the access control system alarms.
You can also set up remote monitoring and management inquiries through the Internet.
Logic door opening function: Simply put, the same door requires several people to swipe cards (or other methods) at the same time to open the electric door lock.
Five, system classification
(A), press in and out identification
The access control system can be divided into the following four categories according to the access mode:
Password identification: identify access permissions by checking whether the entered password is correct. These products are divided into two categories: one is the ordinary type, and the other is the out-of-order keyboard type (the numbers on the keyboard are not fixed and change automatically from time to time).
Advantages: easy operation, no need to carry a card; low cost.
Disadvantages: Only three groups of passwords can be accommodated at the same time, which is easy to leak and has poor security; no entry and exit records; only one-way control.
Card identification: identify the access authority by reading the card or reading the card and password.
Advantages: low cost; one person, one card (+ password), general security, can be connected to a microcomputer, and has a door opening record
Disadvantages: cards and equipment are worn and have a short life; cards are easy to copy; not easy to control in both directions. Card information is easily lost due to external magnetic fields, making the card invalid.
Biometrics: identify the entry and exit by examining the biometrics of the person. There are fingerprint type, palm type, iris type, facial recognition type, and finger vein recognition type.
Advantages: Excellent security from a recognition perspective; no need to carry a card.
Cons: High cost. Recognition rate is not high, high environmental requirements, high user requirements (such as fingerprints can not be scratched, eyes can not be red and swollen, bleeding on the face, or the number of beards), inconvenient to use (such as iris and facial recognition Type, the installation height is fixed, but the height of the user is different)
It is worth noting that most people think that the biometric access control system is very safe. In fact, this is a misunderstanding. The security of the access control system is not only the security of the identification method, but also the security of the control system, the security of the software system, and the security of the communication system. The security of the power supply system is a whole system, which is not safe in any way. For example, in some fingerprint access control systems, the controller and the fingerprint reader are integrated, and they must be installed outdoors when installed. In this way, the line that controls the lock switch is exposed outdoors and can be easily opened.
5. QR code recognition
The QR code access control system, combined with the characteristics of the QR code, will send valid QR code vouchers to the students, teachers, parents, and back-office staff who enter the campus, so that parents can easily scan the QR code when entering the campus. Code, which facilitates the management of personnel entering and leaving. As the school needs to register the mobile phone number of the student's parents and the second-generation ID number of the family member, the parent's mobile phone will receive the text message containing the QR code sent by the school using the QR code campus access control system platform. At the same time, ID cards and mobile phones will be supported for verification to ensure the safety of people entering and leaving.
1. Safe, simple, convenient and fast For the school, it saves time and labor costs; the traditional need for personnel registration information is too cumbersome, and the security is relatively low. For parents also rest assured that their children are safe at school.
2. The novel and stylish QR code uses mobile phones as the means of acquisition and can be forwarded. Since mobile phones are a must-have item for users, they are very convenient to use.
3. The campus access control system can support multiple forms of credential verification.
4. The campus access control system platform provides accurate statistical data, and the school can more specifically and accurately grasp the information of incoming and outgoing personnel.