Smartkey telephone access control system
[ad_1]
1. System overview
Connect the ordinary telephone line to the telephone access controller. When the visitor wants to enter the gate, he enters the household’s telephone number (fixed telephone or mobile phone number) or the household’s room number on the keypad of the telephone access control controller, or scrolls through the menu to select the room number and call the household. After the resident confirms the identity of the visitor on the phone, he enters a number on the phone to open the door remotely. After the resident hangs up the phone, the phone at the telephone access controller will also be automatically cut off.
Residents can open the door by swiping a card, swiping a card + password or entering a security code. Security control can be strengthened by setting the time zone and time zone.
The telephone access control management system solves the security control problem of residents and visitors entering the door. Its biggest feature is that it integrates the proximity card access control system and the telephone network, and uses ordinary household telephones or mobile phones as the visitor identity confirmation terminal. When the visitor arrives, whether the household is at home, office or on a business trip, they can use the telephone The door is opened by the remote control of the machine or mobile phone.
The telephone access control system is an upgrade to the traditional intercom access control system. It does not require wiring, saves a lot of pipeline and construction costs, and is convenient for installation and maintenance. It can use both local telephone lines and internal extension lines.
Through the computer control center, it is possible to monitor the entry and exit of personnel in real time, and to check when visitors have visited afterwards. In the event of an accident in a building or community, these records can be used as an important basis for follow-up investigations.
The telephone access control controller adopts a stainless steel shell, metal buttons, waterproof design, and has a tamper-proof alarm function, which is especially suitable for access control needs in public and open places. The telephone access controller can be connected to the computer through 485 or TCP/IP, which is suitable for security control in important occasions such as school dormitories, company apartments, ordnance warehouses, banks, prisons, and high-end communities.
2. System composition
The system consists of access control management software, telephone access controller, electric lock, door sensor, exit button and 485 converter.
1. Access control management software
It is used to add household information (including household floor number and telephone number), issue cards, centrally manage and monitor all telephone access controllers, set time zone and time zone, assign households access to each door, real-time monitoring and query of households and visitors Situation and so on.
2. Telephone access controller
It is the core of the entire telephone access control system. The telephone access controller integrates an inductive card reader module for residents to swipe their cards to open the door. There is a 128×64 dot matrix LCD display directly above, which can display Chinese and English prompt messages and system menus. A telephone expansion module is embedded in the telephone access control controller, which is used to dial the telephone number registered by the resident in the controller and use it to talk to the resident. Each access controller has a 485 interface for communication with a computer and a TCP/IP network interface, which can store 10,000 cards and 100,000 records.The telephone access controller has a door open relay and an alarm relay
3. Electric lock
An electric control lock is an electric control device used to lock or open a door. When the device is “activated”, the door will be opened, when it is not “activated”, the door will be locked. There are many electric locks to choose from, depending on the type of door to be controlled, such as: glass door, wooden door, etc. Generally speaking, electric locks are divided into three types: cathode locks, anode locks and magnetic locks.
4. Door sensor
A sensor used to monitor the opening/closing status of a door.
5. Exit button
When you go out, open the door by pressing the exit button.
6. 485 converter
The telephone access controller can be directly connected to the computer via TCP/IP. When the controller communicates with the computer via the 485 bus, a 485 converter must be added to the computer to convert the 485 signal to the 232 signal, and then enter the computer serial port.
Three, system network diagram
The system network diagram shows how the telephone access controller connects to the household’s fixed telephones and mobile phones through the telephone network, and connects to the computer through TCP/IP. The computer can manage 255 telephone access controllers at the same time.
620)this.style.width=620;” border=0>
Fourth, the implementation plan
The system is equipped with a management host and placed in the monitoring center; the access control management software is installed on the management host, which is responsible for the maintenance and management of the entire telephone access control system; the telephone access control controller is the core component of the system and is responsible for the processing of the input and output information of the entire system And storage, control, etc. Telephone access controllers are usually installed on both sides of the gate passage, so that residents can swipe their cards and visitors can dial the telephone numbers registered by the residents in the controller through the metal keyboard on the controller. The relay on the controller is used to drive the electric lock of the gate. All telephone access controllers can be directly connected to the local area network and connected to the computer. If you want to connect via RS485 bus, you need to add a 485 communication converter at one end of the computer.
After the visitor calls the resident and confirms his identity via the resident’s phone, the resident presses a number key on the phone to open the door remotely. Residents put down their phones, and the phone access controller automatically cuts off the phone at the gate.
An exit button is installed in the gate, and visitors and residents can go out by pressing the exit button; the door sensor is installed on the door frame to realize real-time monitoring of the door status; the system is coordinated and linked with other systems such as closed-circuit monitoring, anti-theft and fire alarm through linkage output points; issuance The smart card is printed with a photo, which can be used as a pass for residents to enter and exit the building.
When the controller communicates with the computer through 485, the 485 bus should use shielded twisted pair to ensure stable communication. Shielded wires are used to connect the access control controller and other equipment at the door.
Five, system function
1. Realize the classification of designated areas and time-based access authority management, restrict outsiders from entering the building at will, and determine the access level and allowable time period according to the nature of the residents, effectively preventing inside theft and outside theft.
2. Remote door opening by telephone and interference-free mode. Visitors can call the residents’ landlines or mobile phones through the telephone access controller to realize conversations with the residents. After confirming the identity of the visitor through the telephone of the resident, press the number key on the telephone to remotely open the door. Different talk periods can be set for each household to prevent human interference with the normal work and rest of households.
3. The telephone number dialed by the visitor must use the telephone number of the household registered in the telephone access control controller. Resident information (including room number and telephone number) can be downloaded through the computer, or can be entered offline. Visitors can also scroll through the menu on the controller to query the room number of the tenant to dial the corresponding phone number.
4. Real-time display and recording of all event data; real-time transmission of all entry and exit records to the computer, which can be displayed immediately in the management center computer; card holder (name, photo, etc.), event time, door address, event type (entry swiping record, exit Card swiping record, button to open the door, invalid card reading, door opening timeout, forced door opening, etc.) and record truthfully and the record cannot be changed. When an alarm event occurs, a striking alarm prompt box will pop up on the computer screen.
5. With the design of two-way card reading door point, the system can set some door points as anti-passback, restricting the staff who can enter and exit in this area must follow the cycle of’entry → exit → enter → exit’, otherwise they should hold the card People will be locked inside or outside the gate;
6. Support multi-card door opening mode; some important door points such as armory warehouse, prison, bank, etc. can be set, and only multiple people can read the card at the same time to open the door;
7. Support anti-duress password input function; when the user is hijacked by a gangster to enter the door, he can read the card and enter the agreed duress code to enter the door. Without the gangster’s knowledge, the center will receive the duress information in a timely manner and activate the emergency response mechanism to ensure that this The safety of users and working areas (need to cooperate with a card reader with a keyboard);
8. The system can collect all kinds of accident signals (fire alarm, bandit police, etc.), record and alarm in time;
9. The system can coordinate and link with other systems such as building automation, closed-circuit monitoring, anti-theft and fire alarm through linkage output points; when the access control system receives a fire alarm signal, the system can automatically open all doors in the control area, which is beneficial to the control area If there is a camera installed in an important part, the system can also automatically switch the camera screen, monitor the part that needs to be monitored, and record;
10. The controller can work offline (lost contact with the management host), and does not affect the entrance and exit; when the access control and the management center re-establish communication, the controller can upload event information in real time;
11. The electronic map opens the door remotely. In the control center, the authorized management personnel can directly control the opening/closing of each door on the electronic map. Through the electronic map, you can intuitively understand the switch status of each access control point in real time. When an alarm event such as door opening timeout or forced door opening occurs, the door icon will also change accordingly, and the computer will generate an alarm sound prompt at the same time.
12. The system fully considers security, and can set no less than 12 operators and set different passwords. The operators of the system can be divided into multiple levels. Operators with lower levels can only monitor information, while operators with the highest level Any authority in the system can be modified.
13. Equipment health monitoring. Through the communication server (CS), the management center can understand the operation of each device of the system in real time. When the communication of a certain telephone access controller is abnormal, a striking alarm will appear.
[ad_2]