Qingdao Jiashun Electronic Prison Special Access Control System
[ad_1]
System Requirements
Reliability. The design of the system should have high reliability. After a system failure or accident causes an interruption, it can ensure the accuracy, integrity and consistency of the data, and have the function of rapid recovery.
Security, take necessary measures to ensure the security of each system data.
Applicability. Today’s science and technology are developing rapidly. There are many technologies and products that can be applied to the all-in-one card system. The systems and products selected in the project should be able to meet the needs of customers.
Pertinence, the settings of each project are not the same, but should be designed according to the actual situation of the project, such as project scale, supporting facilities, market positioning, user objects, management requirements, planning and layout, etc. .
Advancement. The design and product selection of the system should have certain technological advancement when it is put into use, but not blindly pursue immature new technologies or impractical new functions in order to fully protect the user’s investment.
Scalability, the system design takes into account the needs of future technology development and use, and has the possibility of updating, expanding and upgrading.
Security of Prison Special Access Control System
The non-contact IC card system is adopted, the card reader has no direct electrical contact with the outside world, and can be installed in a variety of concealed ways to avoid man-made damage. When reading the card, the card can be combined with password or fingerprint verification to achieve multiple management and multiple verification.
The equipment case itself has the function of disassembly and cover opening monitoring. When the equipment is removed from the installation position or the cover is opened, the equipment will automatically report alarm information.
With independent power management function, it can cope with all kinds of harsh environments. It has a high-capacity backup battery. When the AC power fails, the backup battery will automatically provide up to 30 hours of power supply, and automatically report the power failure information, and notify the maintenance personnel to repair in time.
There are a variety of unlocking methods, usually using a card reader to unlock, or according to the management and security level, a combination of card reader and password, or a fingerprint identification system, double verification, multiple management. When the maintenance personnel find that the card is lost or damaged or the access control system malfunctions on the spot, they can use remote unlocking or mechanical unlocking.
Composition of special access control system (two different system structures)
System structure 1: The system consists of a computer, a card reader, a radio frequency card, a protocol converter, an interface device, an electronic door lock, a door sensor, and access control software. The card reader is connected to the computer through the protocol converter to directly read the card swiping information; the computer reads the status of each door through the interface device at the same time, and can send the door open and close signal to the electronic door lock through the interface device.
System structure 2: The system consists of a computer, protocol converter, card reader, access controller, radio frequency card, electric lock, door sensor and access control software. The access controller in the system is the central processing unit, access controller, and card reader. And electric locks can form a set of systems independently, that is to say, the access control system can continue to operate independently when the computer is shut down or the computer fails. The computer only plays a management role and does not require computer intervention during normal work.
Features of the two structures
The characteristic of system structure 1: It can realize the system function conveniently. The reader and the lock are directly connected to the computer through the protocol converter, and the functions required by the entire system can be directly programmed on the computer.
Expansion is simple. The management host and front-end equipment are connected through the 485 bus structure, and the added equipment can be directly hung on the 485 bus without adding other equipment.
Poor reliability. The management host and the reading head are connected through the 485 bus. If there is a problem with the bus, the devices on the bus will not work. The management host in system structure 1 is a computer, and many factors such as the computer’s operating system, program errors, virus interference, etc., can easily cause the computer system to crash, and the computer crash will lead to the paralysis of the entire access control system.
Too many equipment combination links. We know that the more links the device is connected to, the lower the system reliability. The reading head and door sensor in the system structure 1 communicate directly with the management host, and the equipment is not modularized. The equipment changes or function changes in the system may cause the instability of the entire system.
The characteristics of system structure 2: good scalability. In the access control system, the controller and the controller are connected through the bus structure or the network structure, and the controller and the management host are also communicated through the bus structure or the network. It is very convenient to add or remove the front-end equipment or the controller in the system.
High reliability. The access control controller is a product specially developed for the access control system. A series of measures such as embedded operating system, anti-crash watchdog, power monitoring and so on are not realized by ordinary computers. Therefore, the stability and reliability of the product are far better than computers. To be higher. The controller stores all the data of the database. Whether the identification card is valid and opening the door are determined by the controller on the spot, without computer intervention, even if the communication between the controller and the computer is interrupted, the system will not be affected.
Poor versatility. Because it is a special product, the versatility of the system is not as good as system structure one, but the stability is stronger than system one.
Function of special access control system
The special access control management system has functions such as “query”, “statistics”, “remote control”, “monitoring”, “attendance”, “card and user management”, and “system maintenance” necessary for ordinary access control management systems. In addition, it also has the following special functions:
Second door control function
Double door interlock, if two of the doors are set to double door interlock, that is, only one door can be opened at most.
The double-door interlocking way to open the door, the way to open the door through the first door (either in or out) can be swiping card or swiping card + password, the same is true for going out, the way to open the second door can be combined at will.
Anti-latency function
Only one card can be used when crossing the second door, that is, one card must have an entry record before swiping the card to open the second door.
Real-time monitoring and control of personnel entry and exit status can effectively prevent personnel from lurking. The anti-latency function can reflect to the control center whether someone has not exited the supervision area within the specified time, staying in violation of regulations, and issued a warning to prompt the monitoring center to deal with it in time to avoid potential safety hazards and cause severe consequences.
Display function
The master computer can display the specific information of the person who swipes the card, such as name, gender, position, photo and other information. The system can realize total or group statistics, query access records at any time, and print the above records into files for record.
Illegal break-in alarm
Or it is called a forced door opening alarm, that is, you do not open the door forcibly or break the door through legal means (swiping the card button, etc.). The system software monitoring interface will prompt the time and location of the alarm information in red, and drive the sound and light alarm to remind the duty personnel to pay attention, or drive the alarm installed on the scene to sound. This function needs to be equipped with a door sensor or an electric lock with a door sensor feedback signal output and connected to the controller.
Alarm if the door is not closed for a long time
If the door is opened legally and forgets to close the door after the set time, the system software monitoring interface will prompt the time and location of the alarm information in red, and drive the computer speakers to remind the staff on duty to pay attention. If you need to drive the alarm to sound on site, you need to use the two-door controller for single-door use, and the No. 2 relay is used to drive the alarm. This function needs to be equipped with a door sensor or an electric lock with a door sensor feedback signal output and connected to the controller.
Duress alarm
When the staff is forced to open the door, the staff can enter the duress password on the password keyboard, the door is opened, the staff will not be hurt by the shameful gangsters, and the software monitoring interface of the main control center has been It shows that there is an alarm message of being forced to open the door at this location, and measures are taken. At the same time, the computer speakers in the control center will sound an alarm to remind the staff on duty to pay attention in time.
Card and user management functions
This is one of the basic functions of the access control system, but its application in prisons makes it more specific and necessary. By setting the permissions of the card and users, all types of personnel cannot enter and exit with “one pass Belden”, and they will act within the specified time and scope in full accordance with the authority regulations, and keep detailed records. At the same time, the time and field of activities can be adjusted at any time according to the changes of the personnel’s authority, so as to avoid the keys of the old mechanical locks being trapped by the detainees, or the supervisors entering the supervision area during non-working hours, and working duties , After the authority changes, some personnel can still freely enter and exit the original working area.
Linkage function
The access control system can fully integrate with various existing monitoring systems in prisons. The access control module can link sound and light alarms, lighting systems, various detectors, alarm hosts or modules, hard disk video recorders and other equipment to form a strict integrated security system.
[ad_2]