Access Control System Types

access-control.jpg
Entrance access control security management system is a new modern safety management system, which combines computer automatic identification technology and modern safety measures as a whole, it involves a lot of new technologies in electronics, machinery, optics, computerte chnology, communications technology, biotechnology and so on. It is aneffective measure to solve the entrance implement security management for importantsectors. For a variety of confidential sectors, such as banks, hotels, parkinglots management, computer room, armory, confidential room, office, intelligence community, factories and so on.
Access control system goes beyond the meredoorway and key management, it has evolved into a complete access controlsystem. It plays a larger role in a safe working environment, personnelattendance management and other administrative work.

 

Access control system categories

There are different types of access controlsystems according to different classifications

a. According to the designprinciple

1, the controller comes with a card reader (identification device)
This design flaw is the controls shall beinstalled outside at the door, some of the control lines must be exposed to the outside, insiders do not need cards or password can easily open the door.
2, controller and card reader (identification device) Split
Such a system controller installed in the room, only a card reader input lines exposed outdoors, and all other controllines are in the room, and the card reader is transmitted digital signal,therefore, If no effective valid card or password no one can enter. Such systems should be the user’s choice.

b. Classification of communication way

1. Stand-alone control type:
These products are the most common for small system or the centralized installation location unit. Usually use RS485 communication. The advantage is that small investment, dedicated communication lines. The disadvantage is that once installed, it can not easily change the position of the center of management, not easy to achieve network control andremote control.
2. Network type:
Such high-tech products, but also rare,only a few companies molding. It uses a commonly network communication TCP / IP protocol. Advantages of such a system is the controller and the management center via LAN to transfer the data, the management center position can be changed at any time, without re-wiring, easy to implement network control orremote control. Suitable for large system or geographically dispersed units. Disadvantages of such systems are part of the communications system stability rely on the stability of the local area network.
C.  By means of identification
1. Password identification
Password verification: identified outprivileges by checking a password.
Password keyboard – These products are divided into two categories: one is ordinary type, one is out of order Keypad(numbers on the keypad is not fixed, from time to time changes automatically).
Normal type – Advantages: easy to operate,no need to carry a card; low cost. Disadvantages: only accommodate three passwordswhile easily leak, security is poor; no access to records; only one-waycontrol.
Shuffle Keypad (numbers on the keypad isnot fixed, from time to time changes automatically) – Advantages: easy to operate, no need to carry the card, the safety factor is slightly higher. Disadvantages: easy password leak, security is not high; no access to records; only one-way control. high cost.
2. Card identification
Card identification: to identify the access privileges by reading the card or card with a password mode, according to thetype of cards is divided into magnetic card and RF card.
Magnetic card – Advantages: low cost; oneperson one card (+ PIN), security in general, could be linked computer, thereare open records. Disadvantages: cards, equipment wear and tear, shorter life expectancy; card easily copied; not easy bi-directional control. Card information vulnerable to external magnetic field, so that the card is invalid.
RF card – Advantages: cards, contactless device, convenient and safe to open the door; long life, the oretical data atleast ten years; safe, could be linked computer, there are open records; can achieve bi-directional control. Card difficult to be copied. Disadvantages:high cost.
3. Biometrics identification
Biometrics: Biometric by inspectors and other ways to identify entry and exit. Such as fingerprint, hand geometry type,iris pattern, facial recognition type, as well as finger vein recognition type. Pros: From the perspective of identifying excellent safety; no need to bring the card. Disadvantages: high cost. Recognition rate is not high, high environmental requirements, for users requiring high (such as a fingerprint cannot be scratched, swollen eyes are not bleeding, his face can not have hurt, or how much beard), inconvenient to use (such as facial recognition and iris type, installed certain height, but the user’s height different).

 

Access control components

a. Access Controller

The core of the access control system, the equivalent of a computer CPU, which is responsible for the entire system input,output and storage of information processing, control, etc.
Card reader (identification device) – Such as (Kiosk card reader SYNCOTEK SK-288-K001)
Reading card data (biometric information) devices.
card-reader-sk_288_k001-access-control

b. Electric Lock

Lock the door – the execution unit of access control system. Users should be based on the material of the door, out requirements needs to select different locks. There are the following types:
(1) Electromagnetic lock: electromagnetic lock is to open the door after power off, meet fire safety requirements. And equipped with a variety of mounts for customers to use. This lock is suitable for one-way doors, glass doors, fire doors, folio electric door.
(2) Anode lock: anode is to open the door afterpower off, meet fire safety requirements. It is installed in the upper door frame. The difference from the electromagnetic lock is that anode lock issuitable for two-way doors, glass doors, fire doors, and it itself has magnetic door detector can detect the security status of the door at any time.
(3) Cathode lock: Usually cathode lock is to open the door when energized. Applicable one-way doors. Cathode lock installation must be equipped with UPS. Because when power off the cathode lockis to lock the door.

c. Card
The key to the door. You can print the cardholder’s personal photos on the card, combine the door card and badge.
Other equipments
Exit button: Click to open the door appliance, suitable for the situation to go out unlimited.
Magnetic: Used to detect the door safety/switch state, etc.
Power: the entire system power supply equipment, divided into ordinary type and backup (with battery).

 

Working Principles

Card reader reading a smart card information(card number) of a cardholder, and then convert to an electrical signal to the access controller, the controller according to the received card number, the cardholder is determined by whether the software over this period can beauthorized to enter the door, according to the result of the determination tocomplete the unlock, remain blocked, etc. . For networked access control system, controller also accepts personnel information transmitted from the management computer, and corresponding authorization information while transmitting card recording information to your computer. A single controller can be composed of a simple access control system, used to manage one or two doors. A plurality of controllers are connected to form the entire building access control system via a communication network with computers. Computer with access control systems management software, which manages all system information analysis and processing.

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s