Hunan Telecom Large-scale Access Control Project

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

According to the requirements of Party A, implement intelligent control of all doors in the building, hierarchical and sub-authorization control for key departments, and the system software is based on the secondary development of Chaolun 2610 access control software and adopts the C/S system architecture. Communication adopts TCP/IP network, all hardware adopts independent research and development of intelligent access control terminal CL-2610, with a terminal capacity of 86 units.


Large-scale access control project of Hunan Telecom

The host management software uses Chaolun access control software or Ascendas One V5.0, the functions are as follows

1) System management: Set system management personnel and operating personnel permissions.

2) Card issuance management and record cardholder’s personal information.

3) Set the main control module of the system, and manage the access control grouping and list management.

4) Monitor the opening and closing status of the door at each control point, and alarm for abnormal conditions (door opening overtime, forced door opening, door opening during unauthorized time, etc.).

5) Set the cardholder’s permission to enter and exit each door.

6) Set the valid time period for the cardholder to enter and exit each door (including holiday settings).

7) Set the card, card + password, or only the password to open the door (can be set according to the time period, such as certain/several doors remain open at a specific time, or certain/several doors are opened only by card during the day but at night Must use “card + password” to open the door, etc.).

8) Set or release the alarm state according to the area.

9) Make a schematic diagram of the floor structure and door control status of the management area, and you can directly control the opening and closing actions of the door lock with a mouse click.

10) Linked control with the signal output from the fire protection, alarm and other equipment (for example: open the doors of the system control in time in the event of a fire or emergency.

11) Record the data of each card reading and door opening, search and query by time, specific door, specific card holder, etc., and automatically generate entry record reports.

The system has been operating normally for 5 years.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare