A well-known wafer factory security access control system application case

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]


concept of design

This system is responsible for personnel access control and anti-theft surveillance in security areas such as administrative areas, production areas, and R&D areas. It requires high-speed scanning and supervision of card readers and anti-theft detectors in various areas, and the operation of the central control room The personnel provide centralized security access control management services.

1. When the anti-theft detector detects an abnormal situation, the system will immediately generate an alarm to notify the operator, and display the location of the alarm on the monitoring workstation and record the situation;

2. When the card reader reads the card, the system immediately checks the card number and judges whether the user is legal. If it is illegal, an alarm will be generated to notify the operator and record the situation;

3. The operator can query the status of the field detector or card reader on the monitoring workstation in the central control room, and can set and control it. The system will record the commands issued by the operator for future inquiries.

Hardware architecture

This system is a hierarchical decentralized network architecture. The upper network is the system hub. The operation settings, data establishment, security management, alarm display, event records and query of the system are all executed on this layer; in addition, use People can also inquire system related information via the Internet through a standard web browser (Browser). The lower layer of the system is a network connected by a certain number of data collectors (Burglary Controller-DGP, Access Controller-ACP).

1. Sensing components (SENSOR/READER): including fire-proof sensors, anti-theft sensors and card readers, etc., used to sense the conditions occurring in various areas, connected to DGP or ACP.

2. Network communication line: The upper network can be Gigabit Ethernet or 100Mbps Ethernet; the lower network is 100Mbps Ethernet. There is RS-422/485 serial communication between the access controller and the card reader.

3. Data collector (ACP/DGP): ACP/DGP is a Microprocessor or PC-based controller with independent central processing unit (CPU), random access memory (RAM), power supply, and uninterruptible power system ( UPS) and monitored monitoring points (Supervised I/O). When connected, the ACP/DGP pair can accept download commands and data settings, and then control the on-site card reader and equipment and report relevant information, such as: operation mode change, door opening, closing, personnel time zone data update, etc.; When offline, ACP/DGP must be able to perform stand-alone access control and burglary monitoring operations based on the database stored in it. All access control events and alarms must be stored in the buffer and wait for reconnection. When online, report relevant information.

4. DATABASE SERVER: Provides settings and access to the operating data of the entire system. Depending on the needs of different levels, Redundancy server or general server can be selected.

5. Monitoring workstation: Provides a browser base graphical human-machine interface, and provides functions such as information services required by operators, issuing commands, and system settings based on the security level.

6. List machine: Provide immediate printing of information and alarms required by the operator for printing.

Software architecture

This system is an open architecture design, implemented on a multi-work industry system, and supports industry standards such as databases, networks, card printers, and cameras in the industry. The system has both scalability and portability, allowing customers to choose a suitable system according to their own needs.

1. Open database: supports Microsoft SQL server and other relational database (RDBMS) systems; also supports open database link (ODBC) standard interface, users can access the data in the database according to this, to achieve data transparency The purpose of transformation.

2. Scalability: The system can support a symmetrical multi-threaded architecture to effectively utilize system resources.

3. Browser-base’s software architecture monitoring workstation adopts: Browser-base’s man-machine interface, which is a thin client architecture, which cooperates with the user’s original accustomed Internet operation mode and provides a consistent interface for operators.

4. Portability: The system programming adopts object-oriented technology, and the system is easy to maintain through modular design, and it is easy to expand, modify and upgrade according to customer needs.

5. Network support: It can support advanced distributed network architecture and the following industry standard network protocols: TCP/IP, Microsoft LAN Manager (NetBEUI), Novell Netware (IPX/SPX).

Software function

This system includes the following functional modules:

1. Access control module

1. You can set the security level of the area, control door, control time zone, work calendar/holiday/overtime (schedule) and other information, and use this as the basis for judging whether to open the door legally.

2. Support operation modes such as swiping, password, swiping and password, and also provide the function of image discrimination.

3. Provide hard/soft/time anti-passback control functions:

a. Hard to prevent recurrence: The card is recognized, but it will be refused entry and exit.

b. Softness to prevent recursion: valid access to the card is permitted, but this message will be recorded.

c. Prevent recurrence regularly: The card is recognized, but it will be refused entry and exit; after the end of the period, the card can be used again.

2. Real-time alarm monitoring processing module

1. Provide a graphical interface to display equipment status and alarms in each area.

2. The user can define 12 alarm groups and 99 alarm levels.

3. It can detect the status of normal equipment, alarm occurrence, disconnection, and deactivation, and generate an alarm.

4. The confirmation of the alarm should be controlled by the operator’s authority, and only necessary personnel can handle the alarm condition.

5. Alarms can be designated to be sent to: historical data log files, alarm/event printers and monitoring workstations.

3. System status query module

Including: personnel area, burglary equipment status, card reader equipment status query, and can print reports.

4. Cardholder Management Module

The cardholder management module must be integrated with the identification card production module. The system data input must provide two methods of “data loading” or “real-time input”, and can be used with digital photo data or registered personal images with a camera, compressed After that, it is stored in the system database; the card can be issued instantly and personal data and photo data can be printed. Its functions should include:

1. Add/delete/modify/query cardholder and card related information.

2. It can hold 100,000 cards. The name, gender, unit, photo, date of birth, card number, ID number, validity period, and photos of all card holders can be listed in the database.

3. At least 32 (including 32) different access levels can be provided.

4. Support the cardholder data import/export function, which is convenient for conversion and combination with personnel or other data.

Five, identification card production module

Identification card production module, including issuance/card making software and thermal transfer image printer. When the card is issued, in addition to printing the cardholder’s name, unit, photo, and burning card number on the card, the above information is also included Write to the card and server database at the same time.

6. Historical event query module

1. Historical event query/printing: query conditions that can be entered, such as: event category (abnormal condition, card reader event, burglary event… etc.), time range, personnel/location, etc., and select the eligible conditions data of.

2. Save/recover/clear historical data.

Seven, system management module

1. System operation management and control: The system provides a password management function to limit the rights and responsibilities of each operator and prevent outsiders from improperly operating and destroying the system.

2. System time setting: Each ACP/DGP and monitoring workstation will check the time with the data server within a certain period of time to ensure the consistency of the system time.

3. Download management: The operator can download the system parameters, cardholder data, and time zone setting data from the database to each access control controller.

4. Field device control function: including working time zone, burglary mode, card reader mode and other settings.

8. Report printing module

Can provide cardholders, access control, time zone planning, alarm points, output points, operation records, etc. real-time/historical information report templates. Operators can also access the data in the database and make customized reports through the open database connection (ODBC) standard interface supported by the database system.

Nine, meal attendance billing module

The catering management system can also be incorporated into the access control management system. When a person wants to enter the restaurant for a meal, he can record his meal once after using the same card reader with the same access control system. At this time, the meal frequency data of the personnel is uploaded to the human resource system through the access control system to count the number of meals per person.

System integration function

Based on customer needs and system integration considerations, in order to achieve cost saving and overall security, this system can provide software and hardware interfaces to integrate with the following systems:

1. Fire alarm system

The relationship between the safety protection area and the fire protection zone can be planned, and the escape route can be set accordingly when a fire occurs. This system maintains a connection with the fire alarm system (software communication method). When a fire alarm system detects a fire alarm, relevant information (such as: fire alarm number, circuit number, fire protection zone code, etc.) must be sent to this System, this system displays the message on the monitoring workstation, requires the operator to confirm, and releases the access control according to the established procedures and records relevant information. According to the security level of the protection area, the unlocking procedure can be divided into:

1. Directly release the access control without the operator’s confirmation; it is suitable for areas with lower security levels.

2. It must be confirmed by the operator. If the operator fails to confirm within a certain period of time, the access control will be automatically released; it is suitable for areas with intermediate security levels.

3. The access control can be lifted only after confirmation by the operator; it is suitable for the area with the highest security level. However, these areas must be equipped with other auxiliary systems, such as: intercom system, key system, emergency exit button device, etc. to ensure personal safety.

2. Emergency notification system

This system can be connected to the emergency notification system. When a security problem occurs during the security period, the security access control system will notify the emergency notification system to automatically dial the highest priority notification according to the set notification list sequence. The notified person can turn on the computer to log in to the security access control system from the Internet, check the alarm status, and take appropriate actions. If the highest priority notifier does not respond within the set time, it will automatically dial to the second priority notifier.

3. Digital recording system

1. For areas with higher security levels, cameras can be installed at appropriate locations near the access passages of controlled doors. This system can be hardware-connected by card readers or access controllers when the door is opened or an alarm occurs (based on response). Speed ​​considerations), drive the digital recording system to record and record the image data during the incident to facilitate subsequent verification. For example:

a. If the door should be closed for a certain period of time without closing, the system will immediately activate the digital imaging system to strengthen the monitoring of the corresponding camera screen.

b. You can set the screen to not record when it is still, if someone enters the screen, it will start immediately (motion detection).

c. When detecting the image displacement, the preset alarm output point is activated, an alarm is issued or the access control security device is linked.

d. When detecting the image displacement, start the default command module.

2. The correlation between access control events and alarm records and the video files recorded by the digital recording system can be set in this system, with the integration of on-site hardware circuits. Operators can look up related video data at the same time when inquiring historical data at the security access control system monitoring workstation.

Fourth, the elevator system

The integration between this system and the elevator system is recommended to be based on the hardware connection between the access controller and the elevator system controller (based on the consideration of response speed), with the programming of the access controller to achieve functional integration between systems . Its functions should include:

1. Certain cardholders can enter and exit certain floors within a certain period of time.

2. Control the number of elevators used during off-duty hours.

3. When a fire alarm occurs, the elevator can be lowered to the first floor and stop using it.

Benefit evaluation

In this case, through the integration of the security access control system with fire alarm, emergency notification, digital video and elevator systems, as well as its own attendance management, meal billing and other functions, the fab has greatly reduced labor costs and achieved overall monitoring, The purpose of ensuring the safety of the plant. In addition, a good security protection system plan also establishes a good and advanced management image for the manufacturer, which not only enhances the customer’s trust in the manufacturer, but also obtains more business opportunities for the manufacturer.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare