Beijing Capital International Airport Terminal 1 Access Control System Case

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

The structure, system, service, and operation of Terminal 1 of Beijing Capital International Airport were fully optimized and integrated during construction. Access control and alarm systems have become an important part of this huge project. This article will focus on the characteristics of the design, combination and operation of the terminal 1 access control system.

Beijing Capital International Airport is one of the three largest airports in China. Its new terminal reconstruction project with a construction area of ​​336,000 square meters is listed as a key construction project of the country’s “Ninth Five-Year Plan”, with a total investment of 9.184 billion yuan. After completion, the new terminal will be four times that of the terminal currently in use, with an annual passenger throughput of 35 million passengers and an annual aircraft takeoff and landing of 190,000 sorties. At the same time, the terminal is currently the largest single building area in China.

In order to meet the needs of modern management and give full play to its comprehensive functions, the terminal building has fully optimized and integrated the structure, systems, services, operations and their interrelationships during construction, and strived to become a 5A integrated intelligent Airport. After various inspections and several rounds of bidding, MeLucky has become the terminal access control and alarm management system project with its advanced product technology, reliable quality, efficient service and rich experience in the construction of airport access control systems. The solution design and equipment provider.

System design requirements

High security: The entire system has stable performance, safety and reliability, and strong anti-counterfeiting. Through the access control management, the security protection of all management rooms and equipment rooms in the terminal building is realized, and the personnel entering and leaving the terminal building are effectively identified to prevent security incidents caused by random intrusion by non-staff occur.

Highly integrated: to achieve system integration with other systems, including: fire alarm system, CCTV system, elevator system, information communication system, and building control system, etc., and share a unified database platform. At the same time, it needs to be compatible with the access control card of Terminal 2, which is convenient for the staff to use.

Large redundancy rate: With large-capacity expandability, if you need to expand the equipment, you don’t need to increase the main control part, just add the front-end equipment and the field control unit.

In order to meet the above system design requirements, the system adopts APOLLO/MeLucky access control and alarm system. This system is a network access control system, which has the advantages of high integration, flexible equipment configuration, and Internet operation. After the system runs, it will focus on its rationality, reliability, technological advancement, compatibility, and large capacity. Expandability. In the system configuration, the redundancy rate of the controller can reach 30%.

Overall system composition

With access control server as the core, this system is mainly composed of proximity card, ML471-AIR access control card reader, AIM-4 four-door control unit, electromagnetic lock, door reset device, AAN-100 area controller, system server, workstation, card making System, and MACAS2000 access control management software and other components. In order to verify that the cardholders are consistent, the system is also equipped with image capture and comparison equipment such as cameras and LCD monitors.

System characteristics

·The system is a large-scale network access control system based on a client/server (C/S) structure. Through information sharing, information processing and control, the centralized control and management of the entire system is realized. The system adopts distributed control and centralized monitoring and management operation mode. When the network fails, the access controllers and access card readers distributed in various areas can still continue to monitor and manage the entrances and exits according to the preset procedures;

·The system adopts a three-layer network topology structure and TCP/IP protocol as the communication basis. Each regional control device can realize free topology according to user needs, and can be connected to the system through the serial port or network interface of the regional controller and managed Software to realize real-time collection and exchange of data between the server and the regional controller. Each client card reader and control unit can grant different permissions according to requirements, and complete the control and monitoring functions of remote equipment under the command of the programmed program;

·The access control/alarm management software adopts SQL Server2000 database, the area (main) controller comes with a 32-bit processor, and all the data of the card, time zone, relay control and alarm input monitoring are stored in the corresponding memory. The operation of the regional (main) controller is completely unaffected by the communication network and the upper server, and can operate independently, which makes the system highly reliable;

·The communication between the access control server and the area (main) controller is transmitted through the local area network, which provides 10M/100M Ethernet channels for the access control system. The area (main) controller and the four-door access control unit are connected by RS-485, and the connection distance can reach 1,200 meters. There is a star connection between the four-door access control unit and the card reader, door sensor, exit button, and door lock;

·The access control system is combined with the card system, which can edit or add cardholder information and automatically generate reports.

Overall system function

Each card holds an independent four-digit password, which can establish or cancel its use right through the software system, establish or cancel its use right through the software system, increase or decrease the use authority, and provide a guarantee for preventing intrusion from the normal channel.

At the same time, in order to verify the unity of the card and the person, an image comparison device was added to the staff passage. When the staff enters the passage to read the card, the LCD monitor installed next to the camera captures the image of the card reader and the original system. Store the photos for comparison. After confirmation by the on-site security personnel, if the person who swiped the card is the same as the card holder, it is proved to be a legal person, and the security person allows the person to enter, otherwise the card reader will be blocked outside the door. Calling image comparison by reading the card further guarantees the safe operation of the Capital Airport and at the same time improves the management level of the security department. Its specific functions include:

1. Personnel registration and issuance: card issuance, authorization, cancellation, card replacement, loss reporting, visiting card registration, blacklist management.

2. Real-time monitoring of equipment status: Automatically detect the working status and failure conditions of communication channels, controllers, card readers and other equipment, and remind the staff on duty through sound and light alarms and pop-up alarm interfaces on the access control workstation.

3. Automatic recovery: When the power supply is interrupted and recovered, all access control devices will automatically restart according to the set program immediately. When the communication channel fails, the data is temporarily stored locally. Once the communication channel returns to normal, the untransmitted data can be automatically uploaded.

4. Regional authorization: Divide different regions into levels, and control the cardholder’s access to the region by setting the card level.

5. Time zone and its control mode authorization: restrict the cardholder’s access time and the control mode within allowable time. 256 holidays can be defined, and the minimum period of time can be defined in 1 minute, and 128 time zones can be freely defined for each person.

6. Record storage: automatically store all modification operations, store operation logs, access records (time, area, personnel card number, access method), etc. within the time period set according to management requirements.

The system can manage up to 1,000,000 user cards and can be expanded as needed.

7. Intrusion detection and alarm: When illegal intrusion and door prying occurs, the door status sensor is triggered, and the controller will transmit the alarm information to the access control workstation to remind the personnel on duty; when the door is opened for a long time, it has not been closed normally or the door has not been opened. When entering, the access control workstation will also prompt an alarm. These alarm detections can be armed/disarmed through software.

8. Central control unlocking: When necessary, by operating the mouse of the access control workstation, remotely unlock the designated door lock.

9. Electronic map display: The system software can display real-time equipment status, door open/close status, personnel entry and exit, etc. in the system in 4W format (When, Where, Who, What) through multi-level dynamic electronic maps.

10. Information query and report printing: The system records abnormal event information in the server database, and managers can check and output reports from the historical records.

11. Attendance function: The system extracts the original data from the database, combines with flexible and convenient attendance rule settings, and provides detailed and accurate attendance summary and analysis.

12. Patrol function: use the access control card reader as an online patrol point (only verify the identity, do not open the electric lock), through the software setting, monitor the security personnel’s patrol route and time limit, once the patrol route does not match or patrol If the reader fails to read the card within the set patrol time, the system will generate an alarm.

13. Support multiple card formats: Two formats of cards can be used for users with different types of cards to use at the same time.

14. Support a variety of door control modes: only need to read the card to enter the door, only need the password to enter the door, read the card + password to enter the door, not passable and other modes.

15. Firefighting linkage: The system opens the firefighting linkage interface in the software data application layer. When a fire occurs, it communicates with the firefighting system through the TCP/IP protocol. The system will automatically receive the firefighting signal and unlock all door locks to facilitate evacuation. The system also reserves a hardware interface. When a fire occurs, the area (main) access control controller can open the corresponding door bolt according to the pre-defined route after receiving the fire signal.

16. Real-time remote monitoring: All management workstations in the system can be authorized to monitor equipment at any access point within the scope of authority.

17. Multi-level data security: The database adopts multi-level security protection. The main server database is SQL Sever2000, which saves all entry records in real time, and can perform dumping and dual-computer backup at the specified time; the database of each management workstation is saved in this site in real time The data of the equipment; the local access data and parameter settings are saved on the front-end access control controller.

When the system is operating normally, the data is backed up to each device. Once the server fails, the data is backed up to the workstation and the device. After the server is restored, the data is automatically synchronized and uploaded; when the network fails, the front-end devices of the entire system continue to work independently. The data is saved in the hardware memory of the machine.

18. Elevator control: According to the level of the cardholder, the floors that can be parked are restricted, and MeLucky and Apollo elevator control equipment are supported.

19. Self-defined user tasks: The computer can automatically perform tasks according to the user’s needs at a specified time by pre-booking various functions, reducing manual intervention.

20. Linkage function: Transmit information to other systems through software and hardware interfaces (RS232, USB, EXE, Winsock), such as CCTV (support Philips, Pelco, AD, Panasonic and other common matrix systems), fire protection, building automation, etc. seamless connection.

Main equipment features

Area access controller

·Based on advanced industrial-grade 32-bit processors;

·Can manage 1,000,000 cardholders/store 25,000 event records;

·Each card can store a changeable four-digit PIN code;

·Elevator control/anti-return control/patrol control/alarm fortification and disarming;

· 128 time zones, 256 holidays, and 256 card levels can be set to manage;

·Support RS-232 port/RS-485 port/Ethernet port;

·Can be connected to 96 card readers, 80 alarm panels (1280 alarm zones), 80 alarm output panels (640 relay outputs);

·With line detection function, when cutting, short circuit, open circuit, series connection, etc. occur, it will prompt an alarm;

·The system supports the online update of the database at any time, and the update does not affect the work of the area controller.

Four door access control unit

·Support 4 card reader input;

·Monitor 4 door open button inputs and 4 door status inputs;

·Control 4 electric lock relay outputs and 4 auxiliary relay outputs;

·When the communication with the upper access controller is interrupted, it supports three access control modes: locked, unlocked and pass code;

·With over-voltage, anti-static protection and isolation function;

·When the communication port fails, it can be isolated from the communication bus without causing the communication of the bus to be blocked. After the communication is restored, the fault information is instantly uploaded to the upper controller and monitoring center.

Card reader

·It has good airtightness and mechanical strength, 34bit Wiegand format output, card reading distance 10~18CM.

Concluding remarks

The access control system for Terminal 1 of Beijing Capital International Airport was fully put into use in September 2004. The operation is in good condition, which has greatly improved the management level of the terminal building’s intelligent security technology and effectively protected passengers, goods and staff. The safety of the airport has been unanimously praised by the airport security department and people from all walks of life.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare