Product Details
Access control system Wuhan access control machine/Wuhan induction access control machine/Wuhan access control system
Access control system The entrance and exit access control security management system is a new modern security management system. It integrates microcomputer automatic identification technology and modern security management measures. It involves electronics, Mechanical, optics, computer technology, communication technology, biotechnology and many other new technologies. It is an effective measure to achieve security management at the entrances and exits of important departments. It is suitable for various confidential departments, such as banks, hotel rooms, armories, confidential rooms, offices, intelligent communities, factories, etc.
Today, with the rapid development of digital technology and network technology, access control technology has developed rapidly. The access control system has long gone beyond simple doorway and key management. It has gradually developed into a complete access management system. It plays a huge role in administrative management work such as work environment safety, personnel attendance management, etc.
On the basis of this system, corresponding auxiliary equipment can be added for elevator control, vehicle entry and exit control, property fire monitoring, security inspection management, catering fee management, etc., to truly realize one-card intelligent management in the area.
Access control system
Wuhan access control machine/Wuhan induction access control machine/Wuhan access control system
Also known as the access management control system, it is an intelligent management system that manages the entry and exit of personnel. In summary, it manages who and when. You can enter and exit those doors, and provide subsequent query reports, etc. Common access control systems include password access control systems, non-contact card access control systems, fingerprint iris palm biometric access control systems, etc. The access control system has developed rapidly in recent years and is widely used. Used in management control systems
As the name suggests, the entrance and exit access control system is a system for controlling entrance and exit passages. It is developed on the basis of traditional door locks. The traditional mechanical door lock is just a simple mechanical device. No matter how reasonable the structural design is and how strong the material is, people can always open it by various means. In passages with many people coming in and out (such as offices and hotel rooms), key management is very troublesome. If the key is lost or the personnel changes, the lock and key must be replaced together. In order to solve these problems, electronic magnetic card locks and electronic password locks have appeared. The emergence of these two locks has improved people's management of entrance and exit passages to a certain extent, bringing passage management into the electronic age. However, with these two types of locks, With the continuous application of electronic locks, their own flaws are gradually exposed. The problems with magnetic card locks are that information is easy to copy, there is a lot of wear between the card and the card reading machine, the failure rate is high, and the safety factor is low. The problem with password locks is that the password is easily leaked and cannot be traced, so the security factor is very low. At the same time, since most of the products of this period used the card reading part (password input) and the control part to be installed outside the door, it was easy for someone to open the lock outdoors. The access control system during this period was still in its early immature stage, so the access control system at that time was usually called an electronic lock and was not widely used.
In recent years, with the development of proximity card technology and biometric identification technology, access control systems have developed by leaps and bounds and entered a mature stage. There have been proximity card access control systems, fingerprint access control systems, iris access control systems, and facial recognition systems. Systems with various technologies such as identification access control systems and scrambled keyboard access control systems have their own strengths in terms of security, convenience, and ease of management. The application fields of access control systems are also becoming wider and wider.
Edit this section Access control system functions
Basic functions implemented by a mature access control system
Management of access permissions
Access control permissions
Wuhan access control machine/Wuhan sensor Access control machine/Wuhan access control system
It is to set who can enter and exit for each channel and who cannot enter and exit
The way of entering and exiting the channel
It is to authorize the entry and exit method for those who can enter and exit the channel. , there are usually three ways of entry and exit: password reading, card reading (biometric identification), card reading (biometric identification) and password
The time period for entering and exiting the channel
It is to set the time range within which people who can access the channel can enter and exit
/>Real-time monitoring function
System managers can check the entry and exit status of each door area in real time through a microcomputer (with photos displayed at the same time) the status of each door area (including door switches, various abnormal status alarms, etc. ) can also open or close all door areas in an emergency.
Entry and exit record query function
The system can store all entry and exit record status records, which can be queried according to different query conditions. Equipped with corresponding attendance software, it can realize attendance and access control card
Abnormal alarm function
Microcomputer alarm or alarm alarm can be realized under abnormal circumstances, such as illegal intrusion and the door is not closed after timeout, etc.
According to the different access control systems of the system, the following special functions can also be realized
Wuhan access control machine/Wuhan induction access control machine /Wuhan Access Control System
The anti-passback function means that the cardholder must follow the preset route to enter and exit, otherwise the card swipe at the next channel will be invalid. This function is to prevent the cardholder from following others in.
The anti-tailgating function means that the cardholder must close the door they just entered before opening the next door. This function is the same as that implemented by anti-passback, but in a different way.
The fire alarm monitoring linkage function allows the access control system to automatically open all electronic locks when a fire alarm occurs, allowing people inside to escape at any time. Linkage with monitoring usually means that the monitoring system automatically records the situation when someone swipes the card (valid/invalid), and also records the situation when an alarm occurs in the access control system.
Network setting management and monitoring function. Most access control systems can only be managed by a microcomputer, while technologically advanced systems can set, monitor, query and manage the entire system at any authorized location on the network, or through the Internet. Remotely set up management monitoring queries.
The logical door opening function simply means that the same door requires several people to swipe their cards (or other methods) at the same time to open the electronically controlled door lock
Edit this section Access control system classification
Access control system according to the entry and exit identification method Can be divided into the following three categories
Password identification
Identify access permissions by checking whether the entered password is correct.
This type of product is divided into two categories: one is the ordinary type, and the other is the scrambled keyboard type (the numbers on the keyboard are not fixed and change automatically from time to time).
Ordinary type
Advantages: Easy to operate, no need to carry cards, low cost.
Disadvantages: It can only accommodate three sets of passwords at the same time, which is easy to leak. The security is very poor, there is no entry and exit records, and it can only be controlled in one direction. Buttons are easily damaged and malfunction.
Wuhan access control machine/Wuhan induction access control machine/Wuhan access control system
Out-of-sequence keyboard type (the numbers on the keyboard are not fixed and change automatically from time to time)
Advantages: Easy to operate, no need to carry cards, safe The coefficient is slightly higher
Disadvantages: The password is easy to leak, and the security is still not high. There is no entry and exit records and only one-way control. high cost. Buttons are easily damaged and malfunction.
Card identification
Identifies entry and exit permissions by reading the card or reading the card and adding a password. It is divided into
magnetic cards according to the card type
Advantages: low cost, one card per person (password security is generally Can be connected to a microcomputer, with door opening record
Disadvantages of cards, equipment wear and tear, short life. Cards are easy to copy and difficult to control in two directions. Card information is easily lost due to external magnetic fields, making the card invalid.
Radio frequency card
Advantages: card, no contact with the equipment, easy to open the door, safe and long life, theoretical data for at least ten years, high security, can be connected to a computer, and has opening records to achieve two-way control. The card is difficult to copy
Disadvantages: high cost
Biometric identification
Identifies entry and exit by checking the biometric characteristics of the person. There are fingerprint type, iris type, and facial recognition type.
Advantages From the perspective of identification, security is excellent and no need to carry a card
Wuhan access control machine/Wuhan sensor access control machine/Wuhan access control system
Disadvantages: The cost is very high. The recognition rate is not high, the environment is high, and the user is high (for example, fingerprints cannot be scratched, eyes cannot be red, swollen and bleeding, and the face must not be swollen or bleeding. There must be no injuries, or the beard is inconvenient to use (such as iris type and facial recognition type, the installation height and position are fixed, but the height of the user is different)
It is worth noting that most people think that biometric recognition The access control system is very safe. In fact, this is a misunderstanding. The security of the access control system is not only the security of the identification method, but also includes the security of the control system, the security of the software system, the security of the communication system, and the security of the power system. The entire system is a Overall, if any aspect fails, the entire system is unsafe. For example, in some fingerprint access control systems, the controller and fingerprint reader are integrated. They must be installed outdoors, so that the wires that control the lock switch are exposed. Outdoors, it is easy to be opened.
The controller comes with a card reader (identifier)
The disadvantage of this design is that the controller must be installed outside the door, so part of the control wires must be exposed outside the door. , an expert can easily open the door without a card or password.
The controller and card reader (identifier) are separated
This type of system controller is installed indoors, and only the card reader input line is exposed outdoors. , all other control lines are indoors, and the card reader transmits digital signals, so no one can enter the door without a valid card or password.
This type of system should be the first choice for users.
Machine-controlled type
This type of product is the most common and is suitable for small systems or units with centralized installation locations. Usually communication methods are used. Its advantages are small investment and dedicated communication lines. The disadvantage is that it is not convenient once installed It is difficult to change the location of the management center locally, and it is difficult to realize network control and remote control.
Network type
This type of product has high technical content and is currently rare. Only a few companies have products. Its The communication method adopts common network/protocols. The advantage of this type of system is that the controller and management center transmit data through the LAN. The location of the management center can be changed at any time without rewiring, and it is easy to realize network control or remote control.
Suitable for use in large systems or units with scattered installation locations. The disadvantage of this type of system is that the stability of the communication part of the system depends on the stability of the local area network.
Access Controller
The core part of the access control system is equivalent to a computer. It is responsible for the processing, storage, control, etc. of the input and output information of the entire system.
Card reader (identifier)
A device that reads the data (biometric information) in the card.
Control lock
The execution component of the door lock in the access control system. Users should choose different locks according to the door material and exit requirements. There are mainly the following types
Electromagnetic locks. The electromagnetic locks can open the door after the power is turned off, which meets fire protection requirements. And equipped with a variety of mounting brackets for customers to use. This kind of lock is suitable for one-way wooden doors, glass doors, fire doors, and electric doors that open opposite each other.
Anode lock The anode lock is a power-off door-opening type, which complies with fire protection requirements. It is installed on the upper part of the door frame. Different from the electromagnetic lock, the anode lock is suitable for two-way wooden and glass door fire doors, and it has a door magnetic detector that can detect the safety status of the door at any time.
Cathode locks. Generally, cathode locks are powered and open the door type. Suitable for one-way wooden doors. A power source must be provided when installing a cathode lock. Because the door is locked when there is a power outage.
Card
The key to open the door. The cardholder's personal photo can be printed on the card, and the door card and badge are combined into one.
Other equipment
A device that opens the door by pressing the exit button, suitable for situations where there are no restrictions on going out.
Door sensors are used to detect the safety/switch status of the door, etc.
Power supply The power supply equipment of the entire system is divided into two types: ordinary and backup (with battery).
Intelligent building office building company offices, intelligent community access management control, access control in government offices, medical hospital systems, telecommunications base stations and power supply bureau substationsbr/> Applications in intelligent building office building company offices
/> Installing access control on the company door can effectively prevent outside salesmen from entering the company and disrupting office order. It can also effectively prevent outsiders from entering the company, ensuring the safety of the company and employees' property, displaying and improving the company's management level, and improving Corporate image can effectively track whether employees are absent from their posts through the supporting attendance management software. There is no need to purchase a time clock. The attendance results are more objective and fair, and the statistics are fast and accurate, which can greatly reduce the work intensity and work of the personnel department. It can effectively solve the problem of some employees having to change door keys out of fear after leaving their jobs. It can conveniently and flexibly arrange anyone's permissions and opening times for each door. You only need to carry one card, and there is no need to wear a large number of heavy keys. Security is more reassuring than keys
Installing an access control system on the door of the company leader's office can ensure that the information and documents in the leader's office will not be seen and leaked by others, and can give the leader a safer and quieter private environment.
Installing an access control system in the development technology department can ensure that core technical information is not easily stolen by outsiders and prevent employees from other departments from joining the development department to affect development work
Installing an access control system in the financial department, It can ensure the safety of property and the company's financial information
Installing an access control system on the production workshop door can effectively prevent idle people from entering the production workshop and avoid causing safety hazards
In intelligent communities Application of access management control
Generally, access control systems are installed on community gates, electric gates, fence doors, and iron doors, fire doors, and anti-theft doors of units, which can effectively prevent idlers from entering the community, and effectively conduct closed management of the community to change the community. The security guard relies on memory to judge whether it is an outsider. This is an inaccurate and lax management method. If he is the owner of the community, blocking the new security guard will arouse the resentment of the owner. If the outsider is well-dressed, the security guard may think he is the owner and will not intervene. Interrogation, this will also bring security risks. A safe and scientific access control system can improve the quality of the property and is more conducive to developers' promotion. Property owners will also benefit from scientific and effective access management. Networked access control is conducive to security guards monitoring all doors at any time. If there is an accident or case, you can check the entry and exit records afterwards to provide evidence
It can be used in conjunction with the building intercom system and the video intercom system
It can be used with the internal consumption parking lot management of the community to achieve a one-stop card< br/> The application of access control in government offices
It can effectively regulate office order, prevent illegal personnel from attacking government offices, and protect the personal safety of leaders
The application of access control in medical hospital systems
It can prevent outsiders from entering infectious areas and precision instrument rooms
It can prevent people from bringing bacteria into sterile places such as operating rooms due to emotion
It can prevent illegal groups from attacking the hospital management department to avoid damage caused by emotion. Public property and injuries, medical workers and hospital leaders
Forbidden applications in telecommunications base stations and power supply bureau substations
Typical base stations and power supply bureau substations have such characteristics. There are many base stations, requiring large system capacity and wide distribution range, even Hundreds of square kilometers have their own network for networking, and some places are unattended, requiring the central dispatching room to flexibly dispatch on-site staff at any time
The implementation plan is to use a network-based access control controller, through a LAN or the Internet Remote management
Forbidden applications in smart elevator control
Also known as access control elevators, swipe card elevators, and card elevators, only authorized users can call for elevators and press floors. There are more and more intelligent communities related to Using relevant equipment, Shenzhen Maxima Intelligent Control System specially designed control circuits for elevator control to form a proprietary elevator access control system.
With the development of the national economy and the acceleration of economic globalization, China's security industry has developed rapidly. With the continuous advancement of science and technology, the field of the security industry continues to expand. Professional services such as alarm operation intermediary information have begun to take off, and product types have been continuously enriched
As security systems and monitoring systems, alarm systems are the three most important components. In terms of popularity, control and alarm systems have long been deeply rooted in the hearts of the people. Yes, the monitoring and alarm systems are both passive security systems. The access control system is a remedial system that actively defends against all unsafe factors and fundamentally solves the security problem. When combined with the monitoring and alarm system, it becomes a perfect security iron. Triangle
The electric mortise lock (see the picture on the right) is an electronically controlled lock that drives the lock tongue to extend or retract through the switching of current to achieve the function of locking or opening the door. Of course, the door-closing and door-closing functions require cooperation with the magnetic sheet.
Usually electric mortise locks consist of two main parts: the lock body and the keyhole. The key component in the lock body is the lock tongue, which cooperates with the lock hole to achieve two states: closing the door and opening the door. That is, the lock tongue is inserted into the lock hole to close the door, and the lock tongue leaves the lock hole to open the door. It is precisely because of the retractable function of the lock tongue that it is named the electric bolt lock. It is precisely because of this feature that electric mortise locks are often used on various swing doors (two-way opening). At the same time, its concealed installation feature is more suitable for places that require high confidentiality of the lock body.
Currently, there are two types of electric locks: unlocking with power on and unlocking with power off. That is, when the former is powered on, the door is open when the lock tongue is inside, and vice versa for the latter. However, under normal circumstances, fire protection requires the door to be opened after the power is cut off, so that it can be opened automatically in case of fire!
Disclaimer
The information/pictures/parameters, etc. displayed on this webpage about【Wuhan access control machine/Wuhan induction access control machine/Wuhan access control system】are provided by member【Wuhan Central European Electronics Co
】,By Titker Trade Network members 【Wuhan Central European Electronics Co
】is solely responsible for the authenticity, accuracy and legality of the information/pictures/parameters, etc.,Titker Trade Network only provides display services. For your safety, please choose Titker Trade Network for online trading, otherwise Titker Trade Network will not bear any responsibility for this.
If your legitimate rights and interests have been infringed, please contact Titker Trade Network customer service as soon as possible. We will serve you wholeheartedly. Thank you for your attention and support to Titker Trade Network!