Campus wireless networked electronic door lock management system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

The current status of school door locks

1. All-in-one card systems such as consumption, attendance, borrowing, and parking have been popularized in schools. The intelligent system has advantages in safety, convenience, and management, and has changed the traditional management method of the school and has become an indispensable management method for the school.

2. Many schools still use traditional methods in the student dormitories, offices, laboratories and other occasions that teachers and students must use every day, and lack effective management methods. This is the “dead corner” of the school’s information construction and has become the “last one” of the campus all-in-one card. kilometer”.

3. Traditional keys are easy to lose, and it is difficult to report the loss after being lost. There are hidden dangers in key handover. It is inconvenient to carry a large number of keys. It is also impossible to use keys to carry out effective retrospective management of “users” and “target doors”.

4. Every year when a large number of old students leave school, the influx of new students, and the change of dormitory are involved, the school needs to spend a lot of energy to collect and distribute the keys to the dormitory, or to replace the lock core, and spend a lot of manpower and material resources every year.

System Overview

The wireless networked door lock system is a new product developed by Guangzhou Zhenying Electronic Technology Co., Ltd. for the school. The wireless networked door lock can download the door lock data through the management computer, remotely control the opening of the door lock, monitor the status of the door lock in real time, and manage the computer when the door is opened. The door opening record is received immediately, and the wireless networked door lock system realizes wireless networking, so the door opening information, alarm information, system status, etc. can be obtained in real time from the management computer. It can also form an all-in-one card system with the school’s original attendance/access control, water and electricity control, consumption, library, parking lot and other systems to truly realize one card in hand and travel throughout the campus.

Zhenying campus wireless networked door lock system is the first to introduce the Internet of Things and wireless communication technology into the school information management system, so that the school management has added new concepts to meet the actual needs of the current school management development. The school will provide teachers and students with More convenient service.

System features

1. Advanced wireless networking technology: The wireless networking door lock adopts the international advanced new wireless networking technology at this stage to realize the wireless networking of the door lock and realize the wireless exchange of data between the door lock and the only wireless base station on each floor. The wireless base station Exchange data with the computer through the network cable to realize the two-way exchange of data between the door lock and the computer. Wireless communication technology overcomes the shortcomings of Bluetooth’s insufficient transmission capacity, anti-interference ability, and small number of networking, and has the advantages of low power consumption, safety, and large network capacity. Each floor only needs one wireless base station to communicate with the computer via TCP/IP protocol.

2. Low power consumption and easy installation: The door lock is powered by 4 alkaline dry batteries, and the alkaline high-energy battery can be used for about one year. The door lock does not need any connection lines with the outside world, and the installation is convenient, simple and fast.

3. The communication is safe and reliable: Carrier Sense Multiple Access/Conflict Prevention (CSMA/CA) technology is used to prevent multiple door locks from sending data at the same time to cause interference, or interference from other wireless devices. A security suite that supports international standards for wireless transmission. The data transmitted wirelessly uses advanced encryption algorithms to provide security for wireless communication.

4. Real-time and offline use do not affect each other: When the wireless network is interrupted, the basic function of the door lock is normal. When the network is normal, the door lock will report the door opening record during the interruption period.

5. Real-time data: The computer can wirelessly download the card, delete the card, update the time and other data operations on the door lock through the wireless base station (LA171). The computer can monitor the switch status of the door lock and the battery status of the door lock in real time, which is convenient for the management of the door lock.

6. Remote authorization to control the opening and closing of the door: remote authorization to open the door, in an emergency, the computer can also control the opening and closing of the door lock.

7. One card for multiple doors, one door for multiple cards: One card can open multiple door locks for easy management. Each door lock can use multiple cards to open the door. Using contactless card, and optional ISO 14443 TYPE B CPU card.

8. Strong scalability: In order to facilitate system integration, the wireless networked door lock provides a COM+ technology interface, and provides a test DEMO program, which is convenient for docking with other systems, realizing a card, and convenient management. Later products can be controlled and managed through the mobile phone APP, remotely unlocked by the mobile phone APP, or temporarily authorized to unlock and remotely maintain.

Features and advantages of ZigBee wireless communication

What technology did ZigBee originate from?

In the process of using Bluetooth technology, people found that although Bluetooth technology has many advantages, it still has many shortcomings. For the fields of industry, home automation control and industrial telemetry and remote control, Bluetooth technology appears to be too complicated, with large power consumption, short distances, and too small network scale. However, the demand for wireless data communication in industrial automation is becoming stronger and stronger. This kind of wireless data transmission in the field must be highly reliable and able to resist various electromagnetic interferences in the industrial field. Therefore, after long-term efforts, the ZigBee protocol officially came out in mid-2003. In addition, ZigBee uses Home RF Lite, a communication protocol for home networks that it has studied before.

What is ZigBee?

First of all, ZigBee is synonymous with the IEEE802.15.4 protocol. The technology specified in this agreement is a short-distance, low-complexity, low-power, low-data-rate, and low-cost two-way wireless communication technology. It is mainly suitable for automatic control and remote control and can be embedded in various devices. Support geolocation function. Because bees rely on the “dance” of flying and “zig” shaking their wings to communicate the location and distance information of pollen with their companions, that is to say, the bees rely on this method to form the communication in the group. “Network”, so the inventors of ZigBee vividly use this behavior of bees to vividly describe this wireless information transmission technology.

What are the characteristics of ZigBee technology?

(1) Low power consumption: In low power consumption standby mode, 2 AA dry batteries can support 1 node to work for 6-24 months, or even longer. This is the outstanding advantage of ZigBee. In contrast, Bluetooth can work for several weeks and WiFi can work for several hours;

(2) Low cost: By greatly simplifying the protocol, the cost is very low (less than 1/10 of Bluetooth), which reduces the requirements for the communication controller. According to predictive analysis, the 8051 8-bit microcontroller is used to calculate the full-featured master Nodes need 32KB code, sub-function nodes as little as 4KB code, and the ZigBee protocol patent is free;

(3) Low rate: ZigBee works at a communication rate of 250kbps to meet the application requirements of low rate data transmission;

(4) Short distance: The transmission range is generally between 10 and 100m. After increasing the RF transmission power, it can also be increased to 1-3km. This refers to the distance between adjacent nodes. If through the relay of routing and communication between nodes, the transmission distance will be farther;

(5) Short time delay: ZigBee’s response speed is relatively fast. Generally, it only takes 15ms to switch from sleep to working state, and it only takes 30ms for nodes to connect to the network, which further saves power. In comparison, Bluetooth needs 3-10s, and WiFi needs 3s;

(6) High capacity: ZigBee can adopt star-shaped, sheet-shaped and mesh network structure, a master node manages several sub-nodes, and at most one master node can manage 254 sub-nodes; at the same time, the master node can also be managed by the upper network node , Can form a large network of up to 65,000 nodes;

(7) High security: ZigBee provides a * security mode, including no security settings, the use of access control lists (ACL) to prevent illegal access to data, and the use of symmetric passwords with advanced encryption standards (AES128) to flexibly determine its security attributes;

(8) License-free frequency band: Direct sequence spread spectrum is used in the industrial, scientific and medical 2.4GHz (global) frequency band.

What places can consider adopting ZigBee technology?

(1) There are many outlets that need data collection or monitoring;

(2) The amount of data required to be transmitted is not large, but the equipment cost is low;

(3) High reliability and high security of data transmission are required;

(4) The size of the equipment is required to be small, and it is inconvenient to place a large rechargeable battery or power module;

(5) It can be powered by batteries;

(6) The terrain is complex, there are many monitoring points, and larger network coverage is required;

(7) Cover the blind areas of existing mobile networks;

(8) The existing mobile network has been used for low data transmission telemetry and remote control system.

Product Specifications

Product model: WMS001 (wireless networking door lock)

Power supply: 4 AA 1.5V alkaline batteries

Working current<300mA

Standby average current<82uA

The maximum reading distance is 5CM

Door opening record capacity 250 (records are automatically uploaded when the network is connected, and long-term records will be overwritten when the records are full)

Communication frequency 2.4G

The maximum radius of the communication distance: 30m (8cm antenna), 50m (12cm antenna) (the communication distance varies according to the environment)

Communication power receiving 27mA, transmitting 25mA

Working temperature 0~60℃

Working humidity 15~85%RH

Storage temperature -20~85℃

Storage humidity 10~85%RH

Door lock features

1. Reasonable structure: The international standard five-bolt structure has good safety and easy operation.

2. Strong adaptability: waterproof, dustproof, antimagnetic and antistatic.

3. Complete functions: with card key and mechanical key dual control function, the card key function is generally used, and the mechanical key can be used in emergency. A variety of card key management, different personnel use no key, effectively improving the door lock management function.

4. Good intelligence: the microcomputer in the lock can identify the legality and level of the card, and deal with it accordingly. Every time the lock is unlocked, there is an unlock record.

5. Sophisticated production: the key parts of the structural parts are made of stainless steel and copper materials, which are formed by molding or die casting, which are durable and have a good hand feeling. All surface treatments adopt advanced technology, elegant and gorgeous, and not easy to wear.

6. Novel style: the appearance of the door lock is classic design, adapt to different architectural styles, beautiful and generous.

7. Fire performance: The lock body parts are made of zinc alloy and stainless steel materials, which meet the international safety and fire protection standards and meet the safety and fire protection requirements.

Structural features of door locks

1. Shell and handle:

High-quality stainless steel sheet is used for stamping and forming, and the surface is directly polished by stainless steel, which is durable.

2. Lock core:

The lock body is of European and American common standard structure, the door is automatically locked when the door is closed, and the combination of multiple lock tongues (combination of diagonal tongue, safety tongue, square tongue);

Built-in safety tongue anti-pry function;

Combined slanting tongue belt power-assisted tongue pushing structure, closing the door more lightly;

The indoor square tongue is locked, the door is opened by a mechanical key, and the combined diagonal tongue is telescopic, etc., all have real-time monitoring of the micro-contact switch.

3. Lock head: The mechanical key is a computer key, which uses a combination of a positive bead and a side bead, which is more secure, and the mutual opening rate is less than one in five thousand.

4. Lock head cover: To conceal the key hole, the hotel manager must use a special tool to remove it, which is beautiful and safe.

5. Motor: adopt Japanese imported motor

 Comparison of wireless networked electronic door locks and traditional wired access control

Comparison content Traditional access control Zhenying wireless networked electronic door lock

A large number of pipelines are installed, and the wiring is complicated; all pipelines need to be pulled to the weak current well; the inner wall of the door, the outer wall of the door, and the door frame all need to install equipment.There is almost no pipeline, the lock body is directly installed on the door, which is as difficult and easy to install as traditional mechanical locks

Beautiful door inner wall, door outer wall, door frame all have prominent equipment, the door lock shape is ugly, traditional high-grade mechanical lock shape, no other protrusions

Security is very good very good

The power requirements must ensure that the 24-hour power supply is the same as the traditional mechanical lock

Open the door by swiping card, remote swiping, remote, traditional key

Overhaul and maintenance are cumbersome and very simple due to the large number of pipelines

Electricity consumption Each door consumes 87 kilowatt-hours of electricity per year, calculated as 4 batteries a year, which is equivalent to 6 yuan

Construction duration

Because of the high construction cost, the overall cost is high and low

The effect of using wireless networked electronic door locks in schools

Freely make changes to the dormitory and students

1. Reduced management expenses: Abandon the traditional key, the tedious work in the past now only needs to set the authority through the wireless networked electronic door lock to achieve the goal, reduce the school’s management access, and reduce the personnel expenditure.

2. Provide powerful clues for disputes: uploading of real-time credit card records can provide data support for headaches such as case handling and disputes, reflecting the advantages of informatization, and contributing to the creation of a harmonious campus.

3. The dormitory door switch status is displayed, and the battery power status is warned. Early warning of illegal entry. Real-time upload of credit card records. If the card is lost, the real-time logout takes effect in real-time. One card with multiple openings is convenient for check-up by the dormitory. Analyze the card data, assist in going to bed and waiting for attendance. Support remote opening, no need to run up and down. The permissions are divided into time periods to prevent students from sneaking back to the dormitory. You can choose non-reversible locks to understand the situation in the dormitory.

4. According to the teaching schedule, synchronize the permissions of the teacher card, synchronize the opening time according to the appointment of the laboratory, and manage the timing unlocking and timing closing functions of the temporary card of the maintenance staff in the computer room.

System composition

One wireless door lock for each door

A card issuer

The wireless base station depends on the current environment, one or more.

The wireless bridge is determined according to the current environment, and there are several on each floor.

Bring your own IC card

The network switch depends on the situation, one or more.

A set of door lock software

Management computer (server) provided by yourself

After-sales service

Quality Assurance: Zhenying Technology has always adhered to the principle of “empathy and service”, providing customers with high-quality products and services is our long-term goal. We have established a complete quality control system and comprehensive evaluation system. To prevent any defective products from flowing into the market, effective quality control is implemented in every link of R&D, sales and service. The company provides 12 months of free product warranty service and lifetime maintenance.

Service Assurance: Zhenying Technology has established a complete quality assurance system and after-sales service system, and has always put product quality and service in the first place, monitoring the entire process from product design to after-sales service, and truly providing customers with manufacturer-level services.

Pre-sale

Our professional marketing consultants and technicians plan the most reasonable configuration for you: provide professional solutions according to your needs. We sincerely provide you with practical products with professional knowledge and skills.

On sale

Our after-sales engineering and technical personnel conduct systematic and scientific training for your staff, so that your staff can quickly become familiar with the operation methods of the product, and can solve problems by themselves, so as to avoid unnecessary troubles or troubles caused by operating errors. Economic losses.

 After sale:

If you encounter technical problems during normal use, please contact our company’s after-sales service department as soon as possible. Our company will serve you in a timely and enthusiastic manner.

Service Hotline: 020-22307647

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare