Prison Access Control System Solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Chapter 1: System Overview

At present, the access control system has become an extremely important part of the security system. In some developed countries, the control of the access control system has replaced the passive monitoring method, and the control of the main channel has greatly prevented criminals from intruding from the normal channel, and It is possible to restrict the scope of activities of criminals through the control of access doors when a case occurs to prevent crime or reduce losses.

Inductive access control systems have more advantages than traditional contact access control systems (such as IC cards, magnetic cards, barcode cards, TM cards and other access control systems). Through this system, the authority of personnel can be clearly defined. Both internal and external personnel can clearly define the scope of free entry and exit through the setting of authority, and record the entry and exit of personnel for inquiries. , Which greatly relieves the pressure of personnel management, and can achieve the effect of saving manpower while improving safety. We can combine functions such as anti-theft alarm, attendance, patrol, etc., and realize the control of other equipment through linkage, such as fire linkage, lighting and air conditioning control. This system has the characteristics of stable performance and powerful functions, which has been reflected in many engineering projects in the past.


The design standards and specifications involved in the system design mainly include:

“Smart Building Design Standard” (DBJ08-47-95)

“Code for Electrical Design of Civil Buildings” (JGJ/T16-92)

“Safety Protection Engineering Procedures and Requirements” (GA/T75)

“Commercial Building Cable Standard” (EIA/TIA-569)

“Quality Inspection and Evaluation Standard for Building Electrical Installation Engineering” (GBJ253-88)


System Configuration

This program is designed based on the principles of practicability, advancement, openness, and economy. This solution is based on the building automation control system, which can easily achieve functional expansion and quantitative expansion. All functions are realized by the central controller software in the control room, that is, on a single system platform, it can realize access control functions and anti-theft at the same time. Alarm function, online patrol function.

In this program, we mainly adopt the following products:

• (1) Access control subsystem;

• Access Controller;

The proximity card access controller is the most widely used and cost-effective professional product for access control applications in the domestic market. It fully considers the current situation of domestic smart card applications and the individual needs of users, and integrates: multi-channel information input, multi-channel alarm information Output, compatible with multiple card types and personalized software modification functions.

• Card reader

Due to the particularity of the prison, the personnel in the security room are not allowed to go out at will. Therefore, in the system design, we all adopt a card reader for entering and exiting, and a card reader with a password keyboard is configured to realize the verification by entering the password after the card is swiped and judging the card holder Whether it is legal to pass.

• Inductive ID card:

The only 4-byte card serial number in the world to ensure that the card is not repeated. Due to its low cost, fast use, and convenient card preparation, the inductive ID card should be the main card type used in the current smart card all-in-one card system.

• Electric lock:

For this system, we use the most stable and cost-effective electric control lock series. According to the prison’s special attention to the safety of personnel entering and exiting, we select for users the electric mortise lock provided by the best electric control lock manufacturer in the country (Foshan Luxjian).

Electric bolt lock: suitable for any framed glass door, frameless glass door can choose accessories (upper and lower door clips); electric bolt lock can also be installed on wooden doors, iron doors and other framed doors. The bearing force is 1500kg.

Magnetic lock: suitable for any framed iron door, channel iron door, channel glass door, and optional accessories for frameless glass door. Users of magnetic locks can choose different tensile strengths according to their needs. There are 250 kg, 270 kg, 300 kg, 500 kg, 600 kg and other models.

Cathode lock: suitable for wooden doors, stainless steel doors and building intercom systems. It is matched with the square tongue mechanical lock and can withstand a gripping force of 400 kg.

Anode lock: suitable for anti-theft doors and building intercom systems. Withstand the gripping force of 1000 kg, unlocking for pulse. The anode lock can be optionally equipped with a mechanical key to prevent the lock from being opened due to power failure.

Due to the particularity of the prison application, the electric control lock must have greater endurance. We recommend using the normally closed electric mortise lock and use it with a mechanical key.

This system supports a truly scalable all-in-one card system and integrates the following functional subsystems:


(2) Attendance subsystem:

In order to meet the needs of different users, we provide matching attendance management systems, including the standard version of the attendance management system and the personalized attendance management system.

• Standard version attendance management system:

Provides attendance management for most unit users, can set fixed shifts, can calculate attendance, leave, business trip, late, early leave, abnormal and other attendance results.

• Personalized attendance management system:

Provides full personalized attendance management for some special users, can customize shifts, and can realize powerful functions including: shift, shift, span 24 hours, and overtime.

At the same time, Yiyuan Technology can carry out personalized modification and development according to the actual personalized needs of users. In order to adapt to the actual management needs of users to the greatest extent.

• (three)
Security inspection subsystem

Due to the special security requirements of the prison area, it is necessary to strictly ensure that personnel arrive and leave their posts on time. There are some hidden dangers in traditional registration methods. We provide CAS all-in-one card system that can be expanded to include: access control, channel, attendance, inspection, consumption, query and other subsystems. Only need to add equipment and related management software, that can achieve more comprehensive and scientific management functions and improve supervision. District soft environment and information level.

• (Four)
Channel subsystem

The so-called channel subsystem means that when inmates enter and exit the prisons to participate in labor and activities, they need to swipe their cards on a dedicated card swiping device to register entry and exit records for monitoring and inquiries by the prison investigation department. At the same time, the channel subsystem can remotely set the permissions of which channels can enter and exit the credit card devices of prisoners in each prison.

In addition, the channel subsystem can also realize the real-time monitoring function with the supporting monitoring computer. When the cardholder swipes the card, the monitor computer screen will display the cardholder’s photo, information, number, the prison area and whether it can enter or exit the channel. details.


(5) Consumption subsystem

Prison areas include: police canteens, commissaries, and restaurants for inmates. The realization of the card consumption card can fully improve the efficiency of logistics management in the prison area and reflect the full respect of the life rights and interests of inmates in modern informatization prisons.

At the same time, it can be very convenient and effective to control the circulation of cash in the prison area, reducing the mentality of prisoners to jump into prison.


(6) Leadership query subsystem

Since the one-card system we are currently building completely adopts a unified central SQL2000 database and adopts a full C/S structure, it can provide remote query functions very conveniently.

As the main leader who is fully responsible for the prison area, he must understand relevant information comprehensively, accurately and quickly. We recommend that the leader query subsystem can be expanded. Relevant leaders can enter the authorized query function interface through the office computer to learn relevant information remotely and improve management efficiency.

• (seven)
Touch screen multimedia query subsystem

The touch screen multimedia query subsystem can be integrated including:

• Attendance inquiries, salary inquiries, and notification to secretaries for police officers;

• Prison district policy publicity information inquiry, prison district construction/publicity information for the families of prisoners;

• Public-oriented prison district informatization, planning and construction information inquiry, etc.

As a window for internal and external publicity of the prison, the touch screen multimedia query can greatly enhance the image and management effect of the prison.

Yiyuan Technology has implemented in many prison units including the Tibet Autonomous Region Prison, Chengdu Junior Education Center, Mianyang Xinhua Labor Camp, Lhasa City Prison, Nanchong North Sichuan First Prison, etc. including: consumption, access, attendance, inspection, touch screen propaganda and inquiries, etc. The one-card system with multiple subsystems is very effective.

Schematic diagram of part of the model project:

Chapter 2: System Introduction

The following specifically introduces the specific functions of the access control management subsystem.

Section 1: Access Control Management Subsystem

The access control subsystem is the main component of the CAS one-card system. The main operation interface is as follows:

620)this.style.width=620;” border=0>

The CAS access control management subsystem is designed and developed on the CP200D series of access controllers independently developed by our company. It supports RS232 and RS485 communication protocols, and realizes: permissions, time periods, passwords, anti-passback, multi-door interlocking, multi-card opening , Alarm, real-time monitoring, real-time upload, task setting and many other functional requirements of access control applications, of which quite a few are not available in similar products on the market, and quite a few of the functions are comparable to imported high-end brands.

• (1) The physical structure of the system:

• (2) Hardware introduction:


1) Access controller

• Multiple input signals can be connected, such as magnetic reed switch, glass break sensor, infrared sensor, etc.

• Multiple relay outputs to control electric locks, alarms, automatic dialers, surveillance system cameras and other equipment

• Support 20,000 users

• TCP/IP communication (support RS232 communication at the same time)

• Independent access control logic

• Network real-time online control, support remote opening of the door, setting the door normally open / normally closed;

• Real-time monitoring of the status of the door;

• Can be used as a building automation and security platform

• Memory: 32K EPROM, 128K SRAM

• Buffer: 100 messages normally

• RAM backup battery: on-board rechargeable lithium-ion button battery can maintain RAM for 30 days

• Card reader interface: 2 ports, TTL level signal, including 12V power supply (line regulated)

• Support cable: shielded twisted pair, 220AWG (low capacitance, such as Belden9184AK 9855)


2) Chassis power supply

• 30-50W high-power transformer with high utilization efficiency,
High output power
, Can satisfy 2-4 card readers 1 controller, 4-8 electric bolt locks work normally at the same time.

• Standard
Cooling and exhaust design
. All metal design, good heat dissipation and shielding anti-interference characteristics.

• The lid can be removed and
Can be buckled
, Suitable for occasions with small installation space. There are standard 6-point PVC pipes on the top and bottom.There are 5 gourd-shaped hanging holes in the box

• Both the front and back ends of the power supply have 5A
fuse
, Protect the circuit to prevent short-circuit damage, and it is convenient to replace the fuse. The corresponding fuse has indicator lights.

• Inside the box
Design ground connection point
, It is convenient to implement the functions of lightning protection, static electricity protection and surge protection.

• Good waveform quality,
No high frequency ripple interference
. The output voltage is 12VDC,
Can be fine-tuned locally
To 14VDC.

• have
Install the fixed position of the binding wire
, So that the line is neat, standardized and safe. Yes, the wiring inside the box is neat and safe.

• Reserved
enough space
It is convenient for wiring and plugging and unplugging terminal blocks.

• belt
Battery drain protection function
, If the rechargeable battery is discharged, the rechargeable battery will be damaged and scrapped. Without the depletion protection, a critical state will occur, the card swiping is invalid, the electric lock is locked, and the user will be locked in the house until the power is exhausted or a call comes in.

• With charging and discharging function,
Can be connected
7AH 12VDC
Accumulator
(Optional) One, which can meet the requirements of an electric bolt lock, a card reader, and a controller to continue working for 3-5 hours after a power failure.


3) Card reader

• Strong ability to resist mutual interference between metal shield and card reader.

• Stable performance, advanced anti-crash circuit design, anti-surge protection, anti-misconnection protection.

• Use pure digital imported radio frequency base station chip, error-free design.

• Intelligent sound and light control mode

• Wiring method that complies with international standards

• The buzzer sound is clear and loud, and will not be disturbed to change the tone.

• The transmission distance can be up to 120 meters.

• A variety of styles and colors for fashionable appearance design.

• No epoxy resin encapsulation, easy to dissipate heat and high temperature resistance.

• 4)
Normally closed electric mortise lock
(Suitable for metal doors, equipped with mechanical keys)

technical parameter:

• Locking method: magnetic induction

• Standard voltage: 12VDC

• Working current: 1.2A in starting state, 250mA in continuous state

• Start-up delay: about 9 seconds

• Sensor: detect the state of the door switch

• Security type: power-on unlock; emergency key, manual unlock

• Working temperature: less than (normal temperature +5) ℃

• Lock body size: 228mm × 28mm × 33mm

Features:

• Magnetic induction to open the electric lock, stable performance.

• Low current and low temperature.

• The current status can be clearly detected through the door lock detection.

• With a key, it can be unlocked manually.

(3) Software introduction

The following introduces the main functions of the access control system.

• 1)
Permission settings

Authority setting is the core function of the CAS access control subsystem, and it is also one of the functions that must be implemented by the general access control management system. The specific operation interface is as follows:

620)this.style.width=620;” border=0>

The so-called “authority setting” refers to the setting of “who can pass which door”, or “which door can allow which person to pass”. Based on these two understandings, the permission setting form is divided into two operation pages:

•I. Set by door: select a door first, and then click the[Add User]button to select all persons allowed to pass, you can select multiple records at once; click[Delete User]to delete the currently selected user allowed to pass Information, thereby making it impossible to pass;

•Ii. Set by user: select one (or more) users first, and then check the doors that they can pass through in the list box.

Although the operations of the two pages are different, the meaning is the same. Operators can choose which way to define user access rights according to their own habits.

• 2)
Alarm and fire linkage

Alarm and fire-fighting linkage is also one of the extended functions of the CAS access control subsystem. In order to better realize the intelligence and strengthen security of units, enterprises and communities, the alarm and fire-fighting linkage has been paid more and more attention by users. Applicability: SP200D series access controller supports access to alarm and fire linkage signals, and an electric lock access terminal of the access controller is designated as the alarm linkage signal output terminal.

Therefore, only SP200D2 and SP200D4 can realize the linkage function. At the same time, it will occupy one electric lock access terminal, so it will control one door less, that is, SP200D2 can only control one door, and SP200D4 can only control three doors.

• 3)
Password management

The password management realizes two functions: ①Enable/disable the password input of a card reader connected to the controller; ②Set the super open password. If a card reader is set to enable the password input function, the system will continue to wait for the user password after the cardholder swipes the card, and the system will stop for a maximum of 5 seconds. If the password is not entered for more than 5 banknotes, the door cannot be opened and waited for the next time. Swipe the card once; the password length is 1-6 digits. If the password length is not enough, press the “#” (or “confirm”) key after inputting, otherwise the controller will wait for 5 seconds and judge whether the password input is correct. The personal password, card number, time period number, and start and end valid dates are all downloaded to the controller as authorization record information and saved. The modification of the personal password cannot be done on the access control card reader with a password keyboard. It must be modified through the software on the management computer. After the personal password is modified, the system will automatically or manually download to the controller.

• 4)
Anti-passback

Anti-passback refers to restricting cardholders to only enter the door to swipe their card, and not to swipe their card when they go out; or not to swipe their card when they enter the door, but to swipe their card when they go out. This functional requirement is mainly applicable to some high-security units, such as: vaults, secret rooms, prisons, etc., requiring personnel not to enter or leave directly with others, and must swipe their cards to enter and exit one by one.

Anti-passback is only applicable to application places that require a card (or password) to open the door for both entry and exit.

• 5)
Multi-door interlock

Multi-door interlocking is also suitable for some high-security units, such as bank business halls, telecommunications equipment rooms, etc. When two doors are interlocked, only one door can be closed before the other door can be opened.

620)this.style.width=620;” border=0>

• 6)
Master console

The master console is the core function of the CAS access control subsystem and the most important part of the access control subsystem. The operation interface is as follows:

The master console provides almost all functions for remote operation of the access controller, including:

• Download: download authority, time period and access control parameter information;

• Open the door: remotely realize the software to open the door;

• Detection: detect the status of the access controller, including: whether there is alarm information, lock (door) status, log count statistics, authority statistics, day clock, etc.;

• Time calibration: modify the clock on the access controller to be the same as the clock on the local computer;

• Extract: extract the log records saved on the access controller;

• Real mention: real-time monitoring and providing access controller status and log records;

Operators can retrieve the door to which they belong through the “tree-shaped community and building” in the upper left corner, and perform corresponding remote operations accurately for the desired door (this is because there are a large number of doors in a large-scale access control application system, the distribution is complex, and it cannot be quickly located. Solution).

“Real-time” function can realize real-time monitoring, real-time detection of door open/close status, and upload new card swiping log records. When an alarm occurs, the system will display the corresponding alarm information in the form of pictures and text, so that the operator can find the location and cause of the fault in time, and solve the problem as soon as possible.

7) Log query

Like statistical query functions in other subsystems, log query provides functions such as query, print, export, and data filtering. Operators can customize and filter the searched log records and then print out reports or export standard Excel files for other systems to use or archive.

Basic log types include: normal log, exit button log, alarm log, remote door opening log, error log, etc.

A number of advanced algorithms and technologies are integrated in the overall CAS one-card solution regarding the statistical query function. The following is a specific description:

7. 1 Dynamically load records

After entering the operation interface, the operator can dynamically load the records through the set time range; some original systems load all the records as soon as the interface is started. If the number of records is large, it will take a longer time to make it easier for the operator The illusion of a crash occurs. At this time, if the operator performs operations such as shutting down or terminating the process, it may cause the database to be damaged, resulting in irreparable consequences.

7. 2 Quick screening by department

Through the department information tree structure control on the left side of the interface, you can quickly locate all or part of a department’s records. This kind of tree structure control effect is very intuitive, and the operator can easily complete the daily heavy statistical query work.

7. 3 Multiple combination condition query analyzer

This query analyzer is similar to allowing operators to write SQL query statements by themselves, which can theoretically query any desired record. And the operation is simple, the operator only needs to select “items”, “relationships”, “values” and “combination logic” and other content, through the generation of multiple query conditions for combined query.

7. 4 Export XLS file directly

The system can directly import the queried records into XLS files, and guarantees “what you see is what you get”.

Chapter 3: Specific Implementation Plan

The following focuses on the specific implementation plan of the access control system. Since the prison door and the access door are different, and the safety management requirements are also different, the following introduces the implementation plan of the prison door and the access door respectively.

Section 1: Prison Door

All prison doors use “single-door two-way access controller”, and you need to swipe card + password to enter and exit.

It is recommended that the electric lock of the prison door adopt a closed type electric bolt lock, and the supporting tensile force is: 1500kg. Since this electric mortise lock is normally closed, it can ensure that even if the power fails and the UPS power supply is insufficient, the lock body is still locked to ensure the safety of the prison.

The product pictures of normally closed electric mortise locks are as follows:

The control wire of the electric lock will be installed in the steel bar of the door (generally, there is a certain space in the middle of the steel bar). Since the prison door is an external anti-theft door, the electric lock can only be installed on the side and cut into the iron frame for installation. The electric lock is directly welded and fixed on the door frame.

Section 2: Access door:

The access door adopts the “double-door two-way access controller”, which requires swiping card + password to enter and exit, and supports double-door interlocking function.

The access door also uses a normally closed electric mortise lock. The lock body is embedded in the steel bar of the door frame.

Since all doors are iron doors, and according to the actual needs of users, normally closed electric bolt locks are used. The lock body must be fully embedded in the door frame. Therefore, the installation and construction of electric locks is quite difficult, which will also increase the overall project Project budget.

In this plan, we recommend that the electric lock adopts the products of the best quality electric lock manufacturer in China, “Lexida”. Its products have good performance and are widely used in public security bureaus, banks, postal institutions and other institutions.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare