- Time of issue:2016-07-14 00:00
- Time of issue:2016-07-14 00:00
In the Hollywood blockbusters,there is often a chamber Indiana story.Such as a password or key to get agent secretly came to a secret base, by hand in front of a smart board, doors open automatically after the ring uttered. Fans may think it is amazing, I feel this incredible. Yes, this is a kind of high-end access control system, in reality, access control system is divided into many, depending on the security level is divided into different access prices, different functions. Access control system in use in today's society is very broad, almost has been integrated into our lives. So, access control in the end is what, exactly what does it do to make it play repeatedly Hollywood "hero"? Today, let us together to uncover the mystery access.
Access Control System, also known as access control systems, generally divided into card access control, biometric access control and password identification access control in several ways. Access control system can be both inside and outside the normal building of access management, personnel access control can also be controlled movement of persons in the building and related areas, it replaces the role of security personnel control, door locks and walls. Access control technology can also be used for time and attendance management, parking management, logistics, capital flow management. Access control system allows authorized personnel with a valid proof of identity (such as cards, passwords or human characteristics) to enter; unauthorized person will be refused to enter, and the police; able to access certain period of time the case officer, the presence of a list of persons the implementation of statistical and other information, query and print output. Electronic attendance management, parking management, card consumption, electronic Patrol, electronic tags, radio frequency identification and management also uses the same entrance control technology.
Since access to the building instead of security personnel security system, then, is how amazing they consist of?
Access control system consisting of
Access control system mainly consists of three parts, the bottom is the most front-end equipment, and direct contact with visitors, known as the front end of the system, mainly by the identification device (cards and card readers, biometric devices, password, keyboard, etc.), electronic door lock, exit button, alarm sensors and alarm devices such as horns composition. Movies by palm palmprint recognition access control system is called biometric systems. In practice, once a visitor can not front-end system, the visit will be considered invalid, visitors can not enter the area visited.
In addition to the front-end equipment, there is a controller in the back end, we call system terminal. System is responsible for receiving the bottom terminal device sends information to the persons concerned with the information they store compared judgment issued after processing information. Information for each access control system access control systems are established in the time allowed by the entry of visitors personally own information. And when it comes to the security requirements of large-scale systems, large areas, access control systems by the controller, the underlying equipment to build a small system control computer via the communication bus with the central linked to form a large access control system. In addition, the access control system will be installed magnetic switches in the upper part of the door frame to detect the state of the door switch, the door can be installed out control buttons, alarm devices. When it detects unauthorized access, and a door is forced open or held open state for too long and so will generate an alarm signal.
It seems that constitute the access control system is not complicated, just before and after the end of the system cooperate with each other to complete the task in the security. But reality must require the user to use a realistic access control, how good use of access control system will issue the customer to consider. Next we access through the use of access in practice how the operating mechanism of view.
Operation mechanism and an entry management rules
Use in access control, we must follow a rule two mechanisms, namely, FAILSAFE, FAILSECURE operation mechanism and an entry management rules.
Loss of power may be out for when personnel safety mechanism that, when a power failure or battery backup value decreased, lock in the unlocked state, so that in an emergency can also access, such as evacuation, power outage magnetic lock cinema staff is vested this category.
Loss of power security mechanism for the protection of property, namely, when a power failure when the device is in the locked state. For the protection of property safety of the occasion, this mechanism is preferable, but the need for a mechanical key can only wait out or else power is restored.
Getting out of management rules
Two-way access control - the user must swipe machine or via keyboard input code is installed at the door in order to enter the security area; To go from the same security within the region, but also need to install the device via the exit door. This control helps prevent more than one person to enter the security area, and some of them have not registered to the system, but also allows the system to track and report on who is located within the security area, such a system can control the number of users in the security zone.
Multiple control - that allows the user to enter the security area, the need to enter the password again to another keyboard in order to enter the interior region is tightly controlled. This is for the security of demanding applications.
Control the frequency of use - the maximum number of times for each user can access provisions, once this maximum number is reached, the user will no longer allowed access or the user will be deleted.
Modern access control in response to different customer needs in different places and have different functions. It is also designed to follow the people-oriented, the principle of seeking truth from facts. FAILSAFE, FAILSECURE operation mechanism and an entry management rules for access effectively deal with the different needs of customers. Make access control systems excel.
to sum up:
Scan the QR code to read on your phone