Doao Technology IC Card Access Control Intelligent Control System Solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

System requirements overview

In a community, the IC card access control management system is used to manage entrances and exits. The normal entry and exit of personnel with valid IC cards can effectively improve the property management level and reduce the pressure on security. The access control management system can control the main entrances and exits of buildings and communities, and use the access control machine to determine the legal identity of the IC card held by the personnel. The IC card information read by the access control machine is judged and analyzed by the controller: only when the access lock is opened, the personnel can pass by themselves.

The user can choose various ways to open the door: either by swiping a card or using a digital password keyboard to unlock, or both can be selected at the same time. The management software can not only specify each person’s door opening authority (which doors can be opened), but also set the opening time and access time of different entrance and exit access control machines. The use of the access control system is very simple. The card holder can complete the card reading and opening operation by simply shaking the card in the reading and writing area of ​​the IC card.

System Features

1. In the standard state, the sensing distance can reach 40-70mm; the RS485 communication interface can be equipped with TCP/IP.
2. An integrated product of two-in-one reader and controller.
3. It can upload the information of people entering and exiting each time by swiping the card to the access control management computer in real time. And the lost card can be reported in time to prevent others from opening the door with the card illegally.
4. When illegal entry, door locks are broken, etc., the system will send out real-time alarm information and transmit it to the management center computer.
5. Can flexibly set the cardholder’s door opening authority, door opening time, and the time zone within which the cardholder has the right to open the door.
6. Support various types of electric door locks.
7. Access control machine, attendance machine, and patrol machine are three-in-one.
8. The way of opening the door can be set by software: card opening, password opening mode.
9. The access control computer can remotely control the door lock switch.
10. Large amount of information storage. The access control function with LCD display can manage 1,000,000 cards with different card numbers, and can store 40,000 entry and exit records, and 20,000 blacklists for reporting loss. The stored records will not be lost within 10 years in the event of a power failure.
11. Optional image monitoring capture software, you can capture and save the image when you swipe the card, and the access control management computer can display the image of the card reader in time to prevent the phenomenon of swiping the card on behalf of the card or the illegal person.

System structure and description

This system consists of a computer, IC card reader, IC card, management software, access control machine, door opening button, electric lock, RS485 communication converter and other related cables and components.

Main functions of access control system

1. Authority management: set, change, cancel and restore personnel access authority.
2. Storage function: Store personnel’s entry and exit date, time, card number, illegality and other related information.
3. Centralized management function: The back-end access control management computer can establish a user database to collect the entry and exit data of each entrance and exit regularly or in real time. At the same time, it can summarize, query, classify, and print according to each user.
4. Abnormal alarm: the system will send out real-time alarm information and transmit it to the management center when illegal intrusion, door locks are broken, etc.
5. Linkage function: It can realize firefighting linkage. When a fire alarm occurs, the center will open access channels uniformly, and CCTV can be activated to realize linkage real-time monitoring.

System hardware parameters and functions

1. Product model: DAIC-MJ200B
2. Power supply voltage: use DC 12V±10%/2A single power supply to work, working current <100mA (not including power for driving external electric lock)
3. Working environment: temperature: -20~+60℃ relative humidity: ≤95%
4. Two-line Chinese LCD display, can display 16 Chinese characters, and display door opening prompt information
5. It can manage 100,000 user cards, can store 40,000 door opening records offline, and can store up to 2,000 blacklists. The stored records can be guaranteed not to be lost within 10 years in the event of a power failure.
6. Reading and writing time of non-contact IC card: ≤0.2S
7. Reading distance of non-contact IC card: 10~100mm
8. Network communication interface: RS485 (standard), optional TCP/IP
9. Communication transmission distance: 1.2Km (standard), long-distance communication network
10. Appearance size: L120*W88*H 18mm
11. LCD resolution is 122*32 DOTS
12. Scope of application: attendance, access control, patrol

System software function

Features:
1). System setting function: The system must be set before normal online operation of the networked access control, including communication port setting, snapshot directory setting, video setting, access control parameter setting, etc.
2). Password change function: the login password of the local operation card can be changed.
3), system backup function: used to back up the access control system user pass records and related setting parameters.
4) Data recovery function: used to restore the last backup data when the system data is damaged, mainly to restore user access records and general settings.
5) Access control operation function: including access control initialization, download/read system time, remote switch door lock, download blacklist, download password opening authority schedule, download open/control time zone, download display information, read access records, Online message broadcasting, download opening time, download opening password, download holiday groups, download authority schedule and other operations.
6) Dynamic video function: used to test whether the video switcher is connected correctly.
7), electronic map setting function: used to add and delete the background image displayed during real-time monitoring, add and delete information points, and set the location of information points.
8) Query management function: including access record query, user information query, IC card detection, system operation log query.
9), enable/disable the real-time monitoring function: the real-time monitoring interface allows users to browse the entry and exit records and the status of each information point, or the user to capture pictures and the status of each information point.

Access control system business process

Install smart card sensors, access controllers and electronic door locks at the main entrances and exits (such as offices, conference halls, computer rooms, access doors, etc.), and authorize the persons allowed to enter and exit each access control through the computer and access control management software, including each When an individual is allowed or forbidden to enter and exit and what door.

When the cardholder enters or exits the door, the smart card is approached to the smart card sensor, the identity information and access authority information in the smart card are passed into the access control controller, and the access control controller judges its legitimacy and validity. The device outputs the door opening signal to the electronic door lock, and the door is automatically opened. For illegal or invalid cards, the access controller refuses to open the door. For a one-way control door, just press the exit button when going out, and the access controller will automatically open the door.

When the door is opened abnormally or violently, the door sensor switch signal is input into the access controller, and the access controller outputs an alarm signal, which will alarm with sound and light signals. The access controller can also receive the fire alarm linkage signal. When an accident occurs, the access controller forcibly opens the access control, allowing people to evacuate quickly.

introduction

DUOAO Time Attendance Management System can realize the attendance of user staff on and off work, and realize the automatic management of staff attendance, information query and attendance statistics process, so that data processing is fast and efficient, report printing is clear and clear, and query statistics are fast and flexible, thereby improving personnel affairs Management level.

Design

According to the user’s actual situation, employee attendance is realized by using the access control system’s card swiping data, eliminating the need to install special attendance swiping equipment, reducing the user’s investment.

The main function

1) Basic parameter setting: Set various parameters of the system, such as leave type, overtime type, business trip type, etc.;
2) System initialization: issue system daughter cards, initialize attendance equipment, and download system keys.
3) Shift schedule setting: It is mainly related to the setting of schedule related parameters, and is also one of the most important parameters of attendance, including basic shifts, shift grouping, shift scheduling rules, establishment and maintenance of shift schedules, batch shifts, Overtime control and overtime rules, etc.;
4) Holiday setting: Mainly the setting of parameters related to holidays, such as weekly holidays, holidays, leave slips, business trips, etc.;
5) Daily management of attendance: input processing for employees’ daily leave and overtime, such as manual card signing, entry of leave slips, etc.;
6) Daily processing functions: card loss report, unlink, blacklist download;
7) Attendance data processing: According to the parameter settings of the system, analyze and process the card swiping data of each person, give the results of the attendance, and evaluate and adjust the results;
8) Report management: Reports can be printed according to a variety of conditions, such as individuals, departments, teams, different time periods, etc., such as summarizing attendance records by day and month, etc.;
9) Information query: you can query and print the information of a certain date and condition. For example, the query information report can be freely sorted by employee code, date, equipment, code, etc. The query conditions can choose company, department, attendance record time, etc. Printed reports include personnel information, change data, original information, shift data, attendance details, attendance summary query, etc.;
10) Unified operator management, which can establish different levels of system operators, set passwords, permissions, and issue operator cards to facilitate system management and maintenance.

The main function
1) Parameter setting: Set the basic parameters of the system, such as patrol location and time setting;
2) Patrol plan formulation: Design a patrol plan according to the bidding requirements, such as: patrol route, time to reach each patrol point, etc.;
3) Patrol management: It can monitor the security patrol swiping time of each patrol point.
4) Information query: You can query and print individual security guards, individual incidents (theft occurred in a certain period of time, etc.), a certain patrol group, a certain period of time or a certain day’s patrol record report.
5) System operator management: system operators of different levels can be established, and passwords and permissions can be set to facilitate system management and maintenance.

System Features

1) It is easy to operate, as long as the card is touched with the card reader during patrol, the location and time of the patrol at that time can be recorded.
2) Good security: It can prevent data and information from being destroyed or intentionally rewritten.
3) Quantitative standards can be formulated to achieve strict scientific management.
4) When formulating a patrol plan, the balance of workload can be fully considered to ensure the reasonable allocation of tasks and improve work efficiency.
5) All patrol records can be saved, individual security guards, individual incidents (theft occurred within a certain period of time, etc.), patrol record reports for a certain patrol group, a certain period of time or a certain day can be saved, and it is convenient for leaders to check and print Make accurate evaluations of subordinates’ work, and achieve a clear distinction between rewards and punishments.
6) The system has strong compatibility and expandability, which can facilitate system upgrades and function expansions.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare