Access control management subsystem program

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Access control management subsystem program

1 Access control system requirements

According to the requirements, the areas controlled by the project include: important entrances and exits of the building, elevator forecourt doors, various communication rooms, various equipment rooms, leadership offices, financial rooms, confidential confidential rooms of various departments, personnel archives, important warehouses, and central control rooms , Security center, etc., and cooperate with the linkage function of the fire protection system, TV monitoring system, and intrusion alarm system to achieve the greatest sense of machine defense protection.

1.1 Distribution of access control points

For specific points, please refer to the system point table.

3.2 Introduction to the functions of the access control system

The entrance and exit access control management system refers to the management of the entry and exit points in the building to reduce risks and improve the level of safety, especially during working hours (daytime) and holidays. It not only replaces the mechanical lock opening/closing action in the traditional sense, but also increases the recording function. It is also a diversified management tool. A large number of access control operations can be managed through convenient and quick operating procedures.

The access control system is an important part of the all-in-one card system, and it is also a core subsystem of the integrated defense system for intelligent buildings. Therefore, in addition to exchanging information with the card issuing center, the access control system must be integrated with the TV monitoring system, access control system, intrusion alarm system, patrol system, and intelligent management (BMS) system, interactive linkage and organic coordination, forming a deep A multi-level and omni-directional security protection system, so that the centralized management and monitoring of the surrounding and internal order and safety of the building can become a unified command, unified dispatch, and unified police handling.

Its main functions include:

Area management

According to the requirements of building security technology, the access methods in restricted areas can be designed such as: single card, dual card, card + password, card + fingerprint (palm print, iris, etc.), and the opening/closing characteristics of the door lock.

Special function

The system can be equipped with advanced functions such as anti-passback, interlock, duress code, limit the maximum and minimum people, and selectively view the distribution of people in the building according to needs.
Time zone management

With multiple programmable time zones, each time zone can define “start time”, “end time” and valid days of the week.

Holiday arrangement

Holidays throughout the year can be pre-programmed, all usual functions are automatically blocked during holidays, and holiday procedures are automatically executed. Cardholders can only enter and exit the protected area through specific channels and within specific time zones.

Card authorization management

Through the pre-programmed settings of the card type, area and time zone of the card issuing center, the system can authorize the cardholder’s pass card (access/exit level setting), and set the valid use time and range of the card (allowed entry area).

Central monitoring

The management host can monitor the on/off of the electric locks of all access control points in real time, and display the switch status of all access control points in real time with multi-level electronic maps and tables, and can view the time, date, card number and name of the person entering and exiting each time the door is opened in detail , Affiliated department, position, personal portrait and other information. Central on/off control of single door, part or all door locks can be carried out.

digital map

The management workstation software has a map generation tool module, and users can easily generate and edit electronic maps. Maps can also be made from AutoDesk® AUTOCAD (R14/2000) engineering drawing files (*.dwg, *.dxf, *.dwz) or other graphic files (*.jpeg, *.jpg, *.bmp, *.wmf, *. pcx, etc.) are automatically converted, and graphical editing tools are provided to adjust the map.

Operational objects such as controlled doors and alarm buttons are shown in the form of icons in the corresponding positions on the map. The static properties of various objects should be automatically displayed when selected in the form of electronic tags. These static properties should at least include the position of the object , Label number, status, etc.

The control, pattern, command button or floor plan zoom button provided by the icon can be connected to execute unlimited floor plans and arbitrary zoom. The color of the icon changes and flashes according to the real-time situation.

Alarm function

When there is an unregistered card in the system, the authority does not match, the door is not closed, the power supply and the communication line are faulty or damaged, the monitoring center will receive an alarm signal. The personnel on duty can find out the cause and location of the alarm through the monitoring terminal or the management host, and can take corresponding measures immediately.

When an alarm occurs, the map area centered on the alarm point is displayed at a specified scale, and information related to operations and alarms and the image of the licensee are popped up. The operator fills in the treatment measures and treatment results, and closes the window. The system should be able to automatically record the processing measures and processing results entered by the operator on the workstation in the file server.
Record and query

Every event in the system is recorded in detail, such as the time when the door lock is opened and closed, the number of the door open card, the reason and location of the alarm input, etc. These recorded information can be shared under certain conditions and provided as raw data to other related systems with good compatibility.

Report management

The system can record all incoming and outgoing events, alarms, and faults, and classify them as needed to form annual, monthly, and daily reports.

Linkage control

Linkage with CCTV television monitoring subsystem
Linkage with intrusion alarm system
Linkage with fire alarm, bandit police automatic alarm system
Linkage with the lighting of the building equipment monitoring system
Linkage with elevator management
Linkage with Intelligent Management (BMS)

Safety management

The system has strict login management for administrators and operators, and has complete log, data backup, anti-tampering and anti-destroy measures.
Network connection
The system is connected to the card issuing center in real time, supports the TCP/IP protocol, has an open structure, is convenient for expansion and networking, and can optionally be equipped with a WEB query module.

1.3 Schematic diagram of access control system

The access control system is composed of a control host, an inductive card reader and an electric lock (plus a computer and a communication converter when connected to the network). The card reading method is a non-contact card reading method. The cardholder only needs to place the card near the card reader (10 cm) Shake once, the card reader can sense that there is a card and send the information (card number) in the card to the host. The host checks the legitimacy of the card, and then decides whether to open the door. The access control management function can be realized in the whole process as long as it is within the effective credit card range. The card reader is installed inside and outside the side wall of the door without affecting its work. The induction card is not easy to be copied, is safe and reliable, and has a long life (non-contact card reading method reduces the mechanical wear of the card to zero). And through the communication adapter (RS485) and the computer for real-time monitoring (all doors can be opened/closed by the computer, and the status of all doors can be viewed in real time), data processing, query, report output, etc. All data of the access control system are stored in the central server.

2 Access control product selection and configuration

2.1 Access control system configuration

In response to engineering requirements and actual access control system requirements, this set of access control systems was designed.
Communication and interface between host and controller
The communication between the computer and the controller uses DES64-bit encryption.
Use RS485 interface, transmission 1200m, longer distance can use communication splitter/amplifier (I-6510).
The communication cable between the host and the controller uses twisted-pair shielded wire RVVPS 4*0.5, and communicates via RS485.
This system is equipped with a communication converter to communicate with the access control management PC.

Access control card reader

The access control card reader adopts UNIO607, which adopts PHILIPS non-contact IC card technology.

The system is equipped with a UNIO607.

2.2 Access control system selection

2.2.1 Controller

There are 2 basic types of access control controllers: access control 2 doors (INTCARD M2N-SMT-L4) and 4 doors (INTCARD M4N-SMT-L4); there are 2 basic types of access control controllers: access control 2 doors (INTCARD M2N-SMT-L4) and 4 doors (INTCARD M4N-SMT-L4); M2N-SMT-L4 two-door controller (professional version)

M2N-SMT-L4 Double Door Controller (Professional Edition))

use:

● Control two one-way doors or one two-way door.One-way door fingers enter the door and swipe the card, and use the exit button to go out; two-way door fingers need to swipe the card in and out, and there are card readers inside and outside.

● The distance between the installation location of the controller and the two doors should be less than 100m

● The controller is equipped with a Wiegand card reader interface, two inputs (button, door sensor), and two passive relay outputs (door lock, linkage) for each door.

● There can be two state expansion inputs and two relay expansion outputs in the controller board

● When using the RS485 bus mode, each loop can be connected to 64 controllers, the built-in driver can be directly connected to the MODEM to achieve remote monitoring, and it can also be connected to the local area network through the TCP/IP network interface unit.

characteristic:
●Stable and reliable: M2N-SMT-L4 two-door controller (professional version) is designed and manufactured with the world’s leading high-speed CPU industrial real-time control technology, four-layer PCB, and SMT surface mount technology.
● Direct connection: No other intermediate interface board is required, and the two card reader interfaces that follow the Wiegand protocol can be compatible with various brands of proximity card readers, keyboard readers, fingerprint machines, handheld devices, etc. on the market.
●A large number of people: up to 12,000 cardholders, expandable.
●Large capacity: Event storage up to 12000 records, expandable.
● Flexible control: It supports various control modes of secret-level areas, and multiple conditions are convenient for combination.
● Fault tolerance: Support offline work or real-time online work.
● Self-diagnosis: Warning of abnormal control panel. The cabinet has an anti-disassembly safety lock.
● Linkage: Alarm and CCTV linkage can be realized.
● Expansion: The alarm controller and elevator controller can be connected externally for expansion.
● Convenient installation: The mechanical and electrical characteristics of the terminal are designed to facilitate workers’ installation.
● Convenient debugging: special debugging mode, convenient for engineers on-site debugging.
● Convenient networking: the controller supports multiple communication interfaces of RS232, RS485, MODEM, and TCP/IP.
● Support software: A-SOFT3.0 access control management software, IMMS ACCESS 3.0 integrated security management software.

Performance:

● Control mode: card, password, card + password, dual card, dual card + dual password, always open during working hours, management card, etc.
● The number of card readers that can be connected 2
● Number of relays 4
● Number of input points 6
● Card capacity 5000 can be expanded
● It can store 12,000 entry and exit records and alarm records, automatically scrolling
● Number of time zones 36
● On holidays
● Card valid time setting
● Limitation on the number of card swipes
● Manager card
● Anti-anti-passback Yes (optional)
● Double door interlocking
● Linkage
● Programmable alarm 2
● Door alarm
● Card invalid alarm
● Duress Code Yes
● Password digits 0-6 digits optional
● Unlocking time 0.1-25.5 seconds
● Power failure protection Built-in battery to protect the clock and data area
● Power supply DC12V/1A
● Working temperature 0-70℃
● Working humidity 0%~95%RH,
● Size 183mm×142mm×20mm
M4N-SMT-L4 four-door controller (professional version)
use:
● Control four one-way doors or two two-way doors.One-way door fingers enter the door and swipe the card, and use the exit button to go out; two-way door fingers need to swipe the card in and out, and there are card readers inside and outside.
● The distance between the installation location of the controller and the four doors should be less than 100m
● The controller is equipped with a Wiegand card reader interface, two inputs (button, door sensor), and two passive relay outputs (door lock, linkage) for each door.
● When using the RS485 bus mode, each loop can be connected to 64 controllers, the built-in driver can be directly connected to the MODEM to achieve remote monitoring, and it can also be connected to the local area network through the TCP/IP network interface unit.
characteristic:
● Stable and reliable: M4N-SMT-L4 four-door controller (professional version) is designed and manufactured using the world’s leading high-speed CPU industrial real-time control technology, four-layer PCB, and SMT surface mount technology.
● Fast response speed: 3 CPUs are used for distributed control, and event response speed is fast
● Direct connection: No other intermediate interface board is required, and the two card reader interfaces that follow the Wiegand protocol can be compatible with various brands of proximity card readers, keyboard readers, fingerprint machines, handheld devices, etc. on the market.
● Large number of people: up to 10,000 cardholders, expandable.
● Large capacity: Event storage up to 12000 records, expandable.
● Flexible control: It supports various control modes of secret-level areas, and multiple conditions are convenient for combination.
● Fault tolerance: Support offline work or real-time online work.
● Self-diagnosis: Warning of abnormal control panel. The cabinet has an anti-disassembly safety lock.
● Linkage: Alarm and CCTV linkage can be realized.
● Expansion: The alarm controller and elevator controller can be connected externally for expansion.
● Convenient installation: The mechanical and electrical characteristics of the terminal are designed to facilitate workers’ installation.
● Convenient debugging: special debugging mode, convenient for engineers on-site debugging.
● Convenient networking: the controller supports multiple communication interfaces of RS232, RS485, MODEM, and TCP/IP.
● Support software: A-SOFT3.0 access control management software, ICMS ACCESS 3.0 integrated security management software.
Performance:
● Control mode: card, password, card + password, dual card, dual card + dual password, always open during working hours, management card, etc.
● The number of card readers that can be connected 4
● Number of relays 4
● Number of input points 8
● Card capacity can be expanded by 10,000 people
● It can store 12,000 entry and exit records and alarm records, automatically scrolling
● Number of time zones 36
● On holidays
● Card valid time setting
● Manager card
● Anti-anti-passback Yes (optional)
● Double door interlocking
● Linkage
● Programmable alarm
● Door alarm
● Card invalid alarm
● Duress Code Yes
● Number of passwords: 0-6 passwords are optional
● Unlocking time: 0.1-25.5 seconds
● Power failure protection: Built-in battery to protect the clock and data area
● Power supply DC12V/1A
● Working temperature 0-70℃
● Working humidity 0%~95%RH,
● Dimensions 193mm×193mm×20mm

3.4.2.2 Card Reader
The controller can now be connected to all the following card readers at the same time: magnetic card, Wiegand card, proximity card, bar code card, iron code card, biological characteristics-cornea, palm, fingerprint, radio frequency. The card reader can be used for access control, alarm management, and relay control. And it can be used independently (keyboard or card only) or combination of out-of-order keyboard and any other card reader technology to form a dual technology card reader, which requires two valid codes (password and card) to be entered.
In this system, we chose the Unio607 card reader for the owner, which has the following main features:
Product Features
w Sealed card reader
w Wiegand interface
w The card read and write operation distance can reach 50mm
w 32-bit device unique identification serial number
technical parameter
w Induction frequency: 13.56MHZ
w Working voltage: DC12V
w Working temperature: -20~70℃
w Induction speed: 0.1 seconds
w Working current: 45 mA
w Dimensions: 88×120×18mm
3.4.2.3 Electric control lock
1. It is suitable for all kinds of doors that open at 90 degrees in one direction and has a delay function of 2 to 30 seconds.
2. Operate with DC 12V power supply
3. In response to the requirements of fire protection, the electromagnetic lock should be a combination of power-off door opening type and “broken glass door opening button”. When an emergency occurs, the “broken glass door opening button” can be broken to open the door immediately and send an alarm signal to the security control room.
4. This system recommends the use of German RAINENCE series locks, which have good moisture-proof and anti-corrosion performance, and have sufficient mechanical strength
3.4.2.4 Door sensor
1. Suitable for all kinds of doors, such as fire doors, ordinary wooden doors, etc.
2. For double-opening doors, it can reflect the position of the two door leaves
3. Suitable for installation in the door frame, with certain measures to prevent mechanical trauma
4. Size: 5.5CM *1.5CM * 1.8CM
3.4.2.5 Central control computer
Configuration: P4 2.4G or more, 256M memory, 80G hard disk, and redundant measures to improve the reliability of the host.
1. It can hold at least 200 card readers
2. It can receive at least 500 alarm/patrol inputs
3. At least 100 linkage outputs can be issued
4. At least 65535 key card data can be stored
5. The system history data can be stored for at least one year
6. The alarm response time of the workstation CRT to the alarm point is less than 1 second
7. The response time of the card reading cycle (from swiping the card to opening the door) is less than 0.1 seconds
8. The system provides complete hardware, software, and various auxiliary facilities

3.4.2.6 Maximum system capacity
1. Number of control doors-unlimited
2. The number of controllers-unlimited
3. Number of card readers-unlimited
4. The number of detection alarm inputs-unlimited
5. The number of control relay outputs (linkage output)-unlimited
3.4.2.7 Emergency measures for system failures
1. The INTCARD access controller has a CCM control module, which will not affect the access of personnel and the linkage function of the system when the computer host fails or the system is working offline.
2. When the card reader has a communication failure, the system can open the door manually through the software.
In order to meet the requirements of fire protection, the electric lock is a lock that can be opened when the power is turned off. When a mechanical failure occurs, the power of the lock can be turned off to open the door.Because the system structure adopts the 485 bus mode, when a controller fails, it will not affect the communication and work of other controllers.
Interface Description
Interface relationship with CCTV system

When an event occurs, the access control system can issue instructions to the CCTV system to respond in three ways, display the on-site situation on a specific monitor, and record the on-site situation as needed.
The first method is to use the TCP/IP protocol to send instructions to the CCTV system through the computer network to achieve linkage;
The second way is to send commands to the CCTV system matrix through TCP/IP to achieve linkage;
The third way is to send a signal to the main access controller or sub-controller of the CCTV system through multiple output ports of the access control device to achieve linkage. At the same time, the access control system provides the address to the CCTV system, and the CCTV system can display the alarm point on its multimedia computer screen. The access control system can also display and monitor by importing the CCTV system picture into the management host. The access control system can be connected with multiple CCTV systems, and can be linked according to the reserved interface provided by the CCTV manufacturer.

Disaster prevention alarm interface
There are two ways to link the fire protection system and the access control system:
Dry contact opening method: The fire system will send an alarm signal to the on-site access controller of the access control system in the form of a dry node. When the on-site access controller receives the signal, it unlocks the controlled door lock. Because the access control system has a fire-fighting linkage function. Therefore, the doors can be opened in time after receiving the signal.
Dry contact linkage method 1:

Dry contact linkage mode two:
Command opening method: After the access control system management software receives the fire protection protocol signal of the fire alarm access controller of the fire protection system, it will open the corresponding door lock according to the pre-planned escape route.

Protocol instruction linkage mode:
The system has a professional interface with disaster prevention and alarm, which is used to receive the alarm information sent by the FAS system and perform corresponding linkage. The interface adopts the form of software, seamlessly connects with FAS system software, and directly receives various related alarm information.

When a fire alarm occurs, the above three linkage modes can be carried out at the same time to ensure that all access doors are opened quickly in the event of a fire alarm to ensure the safe evacuation of personnel.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare