Remote credential library, self-service bank cash replenishment room access control system solution (take the remote network access control system of Shenzhen Agricultural Bank branch as an example)
[ad_1]
1. Introduction
For large cross-regional and multinational corporate organizations such as banks and insurance companies, the headquarters needs to coordinate and coordinate the control and management of the entrances and exits and personnel of various branches and offices throughout the country or the world.
The core members of Digitalor have more than 30 years of professional experience in the electronic security industry. The company has independently developed the Digitalor 2006e super organization network access control system through long-term cooperation with domestic and international first-class enterprises and customers. The system effectively solves the needs of cross-regional, cross-international corporate organizations, and access control and management for collaborative control and management of entrances and exits.
2. Features of Digitalor2006e system
Digitalor 2006e is a professional-grade super network access control system, which is a perfect fusion with embedded linux system and 32-bit embedded system platform on the basis of high reliability and high security technology inherited from Digitalor2000ACS and DCU9X platform.
Digitalor 2006e software adopts C/S network structure and supports SQL-SERVER or ORCAL database.
The DCU32X series controller supports a large-capacity personnel database, high-speed encrypted 100M TCP/IP communication, local and wide area networks, support for comprehensive security such as access control, alarm, monitoring, and coordinated management and control of various branches and headquarters. It is especially suitable for large and medium-sized and Used by huge organizations and enterprises.
The Cyberman Super Network Access Control System will bring enterprise-level customers an advanced management mode of safety management and efficiency optimization (abbreviated as “Safety Mode”). The Cyberman company has demonstrated the implementation of DIGITALOR access control in large enterprises through a large number of enterprise application cases in recent years. Collaborative control management technology will greatly improve the safety and efficiency of the enterprise, and will bring huge economic benefits to your enterprise.
The system features are:
1. The system is suitable for 10,000-200,000 managers;
2. Support LAN and WAN, the same network segment can manage more than 8,000 points;
3. All communication commands are communicated with encrypted TCP/IP protocol;
4. When DCU32X single controller has 500,000 cards, the verification and door opening time is ≤0.3 seconds;
5. Offline storage of 8 million events;
6. The whole system is designed according to 7X24 hours work;
7. Different door opening methods can be set: card opening, multi-card opening, card + personal password opening, card + duress code opening, etc.;
8. Realize the function of different personnel passing by time zone, and the system sets a combination of 15 access control time zones;
9. 3D permission mode of access control point + personnel + access control time period group;
10. Adopt multi-level authority authorization mode (public authority, department authority, personal authority), which can quickly realize the authorization of large quantities of personnel;
11. With real-time monitoring function, it can monitor all access control events at the same time;
12. With hardware fire protection linkage function;
13. With hardware and software alarm interfaces, it can be linked with other subsystems;
14. The main control platform of the access control area controller can be directly connected to 10M/100M Ethernet, and the wiring adopts star connection, which fully complies with the relevant regulations of integrated wiring;
15. The entire system has reached and surpassed the current international industry level in terms of real-time, efficiency, safety, reliability, capacity and other technologies.
Digitalor 2006e super network access control system is mainly used in the cross-regional collaborative access control security management of financial, securities, and insurance companies, and the entrance and exit control management of the outer and inner fields of large airports. Control and management of entrances and exits of urban subways, buses, ports, and other large-scale public transportation systems. Control and management of entrances and exits of large stadiums. Access control and management system for unmanned station of electric power and telecommunications. With national and global chain organizations and other cross-regional chain institutions entrance and exit control management, large-scale membership management, etc. Management of entrances and exits of large communities.
3. Schematic diagram of remote access control system for agricultural bank outlets
620)this.style.width=620;” border=0>
4. Collaborative safety control management of entrances and exits
Headquarters managers can remotely monitor the event server and the entry and exit status of each branch office or door point through the Digitalor 2006e management software client running on the headquarters server, and record and store the entry and exit personnel of remote branches in real time. Time, event, realize various management functions. View various event records, open/close doors and monitor the status of each door in real time. Door controller functions: receive and execute event server commands, execute card reading, control door opening and closing, and detect door status in real time.
Five, system advantages
1. This system is a multi-level modular structure composed of decentralized intelligent controllers. It uses field controllers and is close to the control point. All distributed controllers work autonomously on the same hierarchical bus. When a controller fails At that time, the entire system will not be affected. It fully embodies the design ideas of centralized management and distributed control, reduces risks and increases reliability. The system is based on the conceptual design of the community, which can fully meet the requirements for the number of access points and other control points. There are almost no restrictions on the controllers and access control points that can be controlled by an access control system based on a local area network.
2. The system has real-time “plug and play” and online self-checking functions. For typical failures in the system, the central workstation will prompt with sound signals and text warnings. When the communication between the system center and the controller is interrupted due to a fault, the controllers at each point can work independently, and a certain amount of information can be recorded in the controller.
3. The controller has powerful communication capabilities based on TCP/IP local area network, so that each independent controller can use the ready-made computer local area network for data communication, increasing the flexibility of system management.
4. The communication interface of the controller provides RJ45 standard interface, which can be connected with other systems to become a subsystem. In addition, the system can also open necessary communication protocols for higher level integration. The system considers leaving redundant input and output interfaces to facilitate future system expansion, and even if these reserved points are not enough, the modular structure of this system can easily add equipment to meet larger-scale expansion.
6. Super access control functions and features
1. No network topology limitation
Because this system adopts TCP/IP connection mode, it can carry out global data transmission and access control, and can run multiple communication servers and database servers at the same time for data synchronization and transmission, and balance the network load, thereby effectively avoiding This solves the problem of server paralysis due to the excessive number of connections to a single server.
2. Powerful and detailed authority management
Pyramid authority management method can delegate authority level by level and restrict level by level. Management can be refined from the department to the individual, from the controller to a door point, all can not be achieved, effectively solving the authority.
3. High confidentiality
The data transmission adopts SSL encryption, which can ensure that the transmitted information will not be tampered with or deciphered in the network, and the storage of important data is also encrypted. For example, the operator’s authority and password, controller authority and other information will not be stored in the database Display in clear text.
4. Fast transmission speed
Different from the traditional server polling controller, each controller in Digitalor Super Access Control communicates with the server in a threaded manner. The controller is in the mode of automatic spontaneous communication and actively uploads data to ensure real-time data. sex. The client side view data also adopts a sub-package reading method to avoid the problem of excessive query data and software suspended animation.
5. Perfect way to open the door
Digitalor 2006e uses a single card to open the door, any number of cards, designated multiple cards and department combinations, etc.
In the door way, 10 combinations can be set in the two ways of specifying multiple cards and department combinations, which can fully meet the needs of financial, telecommunications, military, government and other organizations.
6. Friendly operation interface
Digitalor 2006e software has beautiful interface, powerful functions and easy operation. With tree structure hierarchical management, users are clear at a glance, even for departments with thousands of people to assign permissions, tasks can be completed with a single click of the mouse.
Seven, server configuration reference
620)this.style.width=620;” border=0>
Note: Because the server hardware system provides data retrieval, broadcasting, and mass computing services for the entire distributed application system, and it takes a long time to work, it is recommended to use genuine software and make a safe backup of the hardware system. The communication server and the database server can be on the same server in the topology diagram.
Attachment: Reference configuration of some accessories for a server of IBM CPU: 2*dual-core XEON(7040) 3.0GHZ/2MB*2 L2 Xeon dual-core CPU 3.0 Level 2 cache 2M Memory: 2*1GB 2 1G memory power supply: 2*1300W HS POWER Two 1300W power supplies.
8. Other instructions
• In the network topology diagram, the communication server and the database server can be on the same server
• In a cross-WAN structure, the server must have a fixed Internet IP. All controller settings must be completed at one time, with as little modification as possible. Clients and controllers only need to be able to connect to the Internet, and the IP and LAN IP must be provided. Gateway
• Data is encrypted by SSL data during transmission to ensure data security
Agricultural Bank of China’s remote network access control system hardware configuration
1. A set of DCU3219NB controller
2. 2 MF1000 card readers
3. MF3000 card reader 1
4. Magnetic lock 1
5. Bank exit button 1
6. Digitalor2006Super Group management software and a set of authorization
7. The communication transmission bandwidth is less than 16k
[ad_2]