Prison State Secret CPU Access Control System Solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Market positioning

Professional national secret access control solution product manufacturer

Complete qualifications (national secret sales designated unit, national secret production designated, national secret security access control product model, security license, type testing, software copyright, etc.)

Cost-effective, all equipment is guaranteed for 3 years

Pursue long-term value to integrator partners. For the judicial market, we will provide RFID prison personnel positioning system and community correction personnel positioning system to achieve continuous value realization.

Brand: Zokin

1 Overview

As a special area with high security, the prison adopts a management mode that combines human defense, technical defense, and physical defense, and uses smart card identification technology combined with biometric identification technology to manage access control. The prison/detention center unit is usually divided into two areas: the periphery and the prison area. The periphery is generally office buildings, armed police dormitories, etc. The prison area is a place where important suspects/prisoners are detained. According to the state’s management requirements and norms for the prison, it is necessary to adopt the AB door method for management. In recent years, as the M1 card technology has been cracked, in accordance with the requirements of the National Cryptographic Bureau document, a national secret CPU card access control system is required.

Guangzhou Zhuojin Communication Technology Co., Ltd. mainly aims at the high-end access control market, and provides high-quality and high-priced high-end access control system solutions and products for customers, integrators, and engineering companies. Combining the characteristics of the prison passage AB door and adopting the national secret CPU card certification and The palm vein authentication method meets the requirements of prison security.

The scheme design follows the following principles:

It adopts a CPU card that supports domestic cryptographic algorithms approved by the National Cryptographic Administration. This program uses Fudan Microelectronics CPU card supporting SM1 algorithm.

Adopt the domestically produced cryptographic algorithm approved by the National Cryptographic Administration. This solution supports SM1 algorithm.

In accordance with the prison AB door management process, the AB door access control management is realized.

According to the unified platform + hierarchical and sub-regional management method, the access control management of the prison passage/office area is realized.

2. The composition of the state secret access control system of the prison

The state secret access control system of Zhuojin Communication Prison includes the following parts:

Card: National Secret CPU card, supporting National Secret SM1 algorithm.

National secret access control sensor: support national secret CPU card, extended support for mobile phone card, NFC, RFID-SIM (mobile, telecommunications, China Unicom)

Access control controller: large capacity, rich functions, good stability, single door, two door, four door, eight door control can be selected.

The national secret key management system realizes perfect system key management and meets the requirements of the National Cryptographic Bureau.

Access control system platform: A true B/S architecture system that supports large-capacity, cross-regional, hierarchical and sub-regional access control management, complete functions, user management process-oriented design ideas, and easy integration with other systems.

AB door access control system: adopts a unified management platform with the access control system to realize AB door management, virtual card replacement, access verification, video linkage, police communication linkage, visitor management and other functions.

Prison area/channel access control: one-key opening and one-key closing of the duty room

Workshop access control: Comprehensive fire safety and prisoner safety management requirements, using infrared beams to realize invisible access control system, unified access to the access control system platform, swiping card in and out; unauthorized access warning.

3. AB door access control system

3.1. Features of prison AB gate

Prison AB access door Prison access is generally divided into three areas, A area, B area, and the transition area between AB and the supervision area (card change area), of which the access control of area A is by door A1 (the outside of group A is outside the prison) It is guarded by armed police. The entrance guard of area B is composed of gates B1, B2, and B3 (the prison inside gate B3). It is guarded by police officers. Personnel entering the prison must be in the supervision area in exchange for permission to enter Area B to enter, and personnel leave The prison needs to be replaced with a card with group A card permissions in the card replacement area to leave the prison.

Door A1 and door B1 realize double-door interlocking (three-door and four-door interlocking can also be realized). Only one door can be opened at a time (emergency door opening is a special function). A closed area is formed between A1 and B1 when people pass through. After passing through the first door, the door must be closed before the second door can be opened. This effectively isolates the space on both sides of the passage and prevents criminals from trailing into the safe area.

3.2. AB door access control system composition

The AB door access control system of Zhuojin Communication Prison is mainly composed of the following parts:

Card: Use CPU card/country secret CPU card.

Access sensor: Built-in national secret algorithm PSAM card, support national secret CPU card authentication, support card + password open door authentication

Palm vein authentication terminal: in vivo authentication, which uses internal characteristics of the human body, which cannot be obtained or copied.

Face recognition terminal (optional): adopts high-definition camera + efficient face recognition algorithm

Access control controller: large capacity, rich functions, good stability

AB door access control software: based on the prison access control system platform, realize AB door door authorization.

Virtual card replacement software: The virtual card replacement function can be used to change the physical authority without changing the card, so as to achieve the security requirements of the partition control. The virtual card replacement verification can be performed by the police officers to compare the personnel, and the personnel can also be compared through face recognition.

Access verification management software: real-time display of personnel entering and exiting information. When outsiders and police officers swipe their cards at their posts, they will display the information of the incoming and outgoing personnel, such as name, ID number, reason for entry, accompanying police officers, photos, etc., to facilitate identification by the armed police at the post.

Visitor management system: for outsiders, according to the prison management process, different types of visitor registration, credit card verification, and access authentication functions are realized.

3.3. Description of the entry and exit process

3.3.1. Entering the prison process

Enter the supervisory staff first swipe their card outside door A (card + password can be set), then open the door and let them enter the card exchange area;

In the virtual card exchange area, (the high-definition camera collects facial information and automatically recognizes the identity of the person entering the surveillance system, this function is optional), after the manager verifies the identity of the personnel, the card exchange software is used in the card exchange area to change the card authority to make the card authority Change from the original access control permission for group A doors to the access control permission for group B doors;

The entry personnel first swipe the card outside the door B1, the door B1 opens and releases, the entry personnel pass through the door B1;

The entry personnel swipe the card outside the B2 gate (three roller gates), B2 opens the door and let go, the entry personnel pass through B2;

Prisoners swipe their cards outside the door of B3 (high turnstile) (card + password can be set), B3 opens the door and releases, and the prisoners enter the prison area.

3.3.2. Leaving the prison process

The personnel leaving the prison first perform palm vein authentication in door B3 (high turnstile), and the door B3 is opened and released. The personnel leaving the prison pass through door B3;

Personnel leaving the prison swipe their card in gate B2 (three roller gates) (card + password can be set), door B2 opens and releases, and personnel leaving prison pass through gate B2;

Personnel leaving the prison swipe their card in gate B1, door B1 is opened and let go, and personnel leaving the prison pass through gate B1 and enter the card exchange area;

In the virtual card exchange area, (the high-definition camera collects facial information and automatically recognizes the identity of the person entering the surveillance system, this function is optional), after the manager verifies the identity of the personnel, the card exchange software is used in the card exchange area to change the card authority to make the card authority Change from having the door of Group B to having the permission to enter the door of Group A;

Personnel leaving the prison first swipe their card in door A (card + password can be set), door A is opened and the personnel leave the prison.

3.4. Application scenarios of virtual card replacement

The person’s physical card has two application ID numbers. One of the ID numbers has the authority of door group A, and the other application ID number has the authority of door group B. At the same time, only one application ID can exist in the physical card.

Before entering the prison, the physical card stores the application ID of the gate group A permission. The cardholder swipes the card reader on the gate of the group A, the gate of the group A is opened and released, and the personnel enter the supervised card replacement area.

Police officers in the supervision area use virtual card replacement software to manage the police officers and operators to read the card. The software displays the person’s photo and ID number and other information. After checking the ID card (which can be used with the second-generation ID card reader), click Virtual Exchange Card (automatic switching can also be used, the police information is automatically judged through face recognition, and the application ID is switched in an unattended manner), the card is converted into an application ID with group B door permissions.

Personnel holding a card with the permission of Group B gate, enter the prison through Group B gate.

When personnel leave the prison, when the card holder leaves the prison, the card holder will pass through the door of Group B and enter the supervision card replacement area. The management police operator will read the card, the software will display the person’s photo and ID number and other information, and the ID will be checked. (It can be used with the second-generation ID card reader), click on the virtual card replacement (automatic switching can also be used, the police information is automatically judged through face recognition, and the application ID is switched in an unattended manner) to convert the card to App IDs that have group A door permissions.

Personnel swiped their cards with their cards, opened the door of Group A and left the prison.

3.5. Face recognition system in virtual card changing area (optional)

In the virtual card exchange area, the high-definition camera + face recognition method is adopted to realize the automatic identification of the identity of the entering and exiting personnel, and assist the police to realize the virtual card exchange.

The application process is as follows:

Personnel enter the virtual card replacement area, swipe the virtual card reader, and the camera collects facial information.

The virtual card reader obtains the card ID information and transmits the card ID information to the face recognition server.

The intelligent analysis program of the face recognition server analyzes the collected face information and compares it with the face template obtained according to the card ID.

If it does, the virtual card replacement operation is automatically realized or the administrator is prompted to manually perform the virtual card replacement operation.people

3.6. Key points of pedestrian access control

The main function of the pedestrian passage is to register and manage the police officers and temporary personnel entering and leaving the prison, and to improve the security and prevention capabilities of the prison through technical defense methods. Pedestrian passage management includes three parts: the AB gate of the armed police area, the AB gate of the police area, and the virtual renewal.

The armed police on duty distinguishes group A doors. Doors A1 and A2 are double interlocked; they are supervised by the armed police on duty; you must swipe your card + password to enter this area, and the armed police must manually open the door when you leave this area; this area is also equipped with palm vein recognition equipment (or human Face recognition equipment), used for temporary personnel to be released from prison for biometric review;

The police officer on duty distinguishes and manages Group B doors. Doors B1 and B2 are double-door interlocks and are supervised by the on-duty police officer; you must swipe your card + password to enter this area, and the armed police must manually open the door when you leave this area; this area is also equipped with palm vein recognition equipment (or human Face recognition equipment), used for biometric review of temporary personnel leaving prison;

Area B1-B2 is a virtual card changing area, equipped with 1 card changing device, where the police officers perform virtual card changing operations, which are supervised by the police officers’ duty room workstation;

The three-channel four-wing revolving door (vertical roller) is designed with 1 entry and 2 exits. Based on the principle of wide entry and strict exit, the entry direction of this area is swiping card + password entry, and the exit direction is card + password + palm vein biometrics (or Face recognition equipment).

According to the principle of wide entry and strict exit, the four-wing cross revolving door adopts card + password entry, and the exit direction adopts the method of swiping card + password + palm vein biometrics (or face recognition equipment). The four-wing revolving door should support multiple modes such as all-in for 3 channels and all-out for 3 channels. The access controller should reserve room for expansion for this function; and should support functions such as remote control to open the door and power-off key to open the door. In order to ensure scalability, all channels of the four-wing cross revolving door are equipped with CPU card readers in both directions to prepare for the later change of the entry and exit channels.

3.7. Key points of access control for vehicle passages

3.7.1. Vehicle entry and exit process (scanning of images under the vehicle is completed by the video surveillance system)

3.7.1.1. Vehicle entrance process

1) The driver is led by the police officer and goes to the temporary personnel registration room to apply for the driver’s temporary card;

2) Lead police officers and drivers to read the CPU card at the driver’s dedicated card reader, and transmit the police and driver information to the armed police post;

3) The armed police verify the identity information, verify that the information is correct, and manually open door A;

4) Door A is linked with the car stopper. When door A is fully opened, the car stopper will be lowered, the green light will be on and the vehicle will drive into the prison;

5) When the vehicle drives to the license plate capture area, the capture camera executes the capture action, and the picture information is stored in the background;

6) After the vehicle has completely entered the gate, the armed police manually closes door A, the stopper outside door A rises, and the red light turns on;

7) The vehicle enters the vehicle waiting area. After the inspection side passes, the police open door B, the vehicle enters the prison, and the vehicle entry process ends.

3.7.1.2. Vehicle going out process

1) Lead the police and the driver to read the CPU card on the driver’s dedicated card reader, and the information will be transmitted to the police post;

2) Police officers verify the information and manually open door B;

3) Door B is linked with the car stopper and traffic light. After door B is fully opened, the broken tire stopper is lowered, the green light is on, and the vehicle is allowed to drive out; after the vehicle is completely driven out, the policeman closes door B manually, and door B is blocked by linkage The car lifts up and the red light comes on.

4) The vehicle drives to the under-vehicle scanning area to scan the under-vehicle according to the under-vehicle scanning guide line, and the scanning results are transmitted to the operation desk in the police duty area.

5) Police officers compare and verify the license plate and vehicle bottom information;

6) Police officers conduct micro-life detection on vehicles;

7) After verifying that the information is correct, the armed police manually opened door A and let go. After the vehicle completely pulled out of door A, the armed police closed door A manually.

8) The driver returns the temporary card, and the vehicle release process ends.

3.8. Visitor (temporary) registration management

Visitors (temporary personnel) registration management is mainly aimed at outsiders to ensure safe, accurate and efficient identification of the entry and exit personnel, and will make detailed registration and electronic records of the entry and exit personnel, and register the necessary living biological characteristics in preparation for going out Live identity verification at the time.

Visitors (temporary personnel) live identity verification adopts palm vein method (or face recognition equipment), register palm vein information in temporary personnel, and install palm vein comparison equipment (or face recognition equipment) in the armed police duty area and police duty area. , The palm vein information (or face recognition information) registered by the temporary personnel is synchronized to the front-end comparison device through the network, and the biometric comparison is performed when they are released from prison.

The visitor (temporary personnel) registration management system, as a sub-module of the access control system, can be linked with the prison access control system. When a visitor swips his card at the access control, the background information of the visitor is displayed in the background, which is convenient for the management personnel to monitor.

Equipped with dedicated workstations at the visitor (temporary personnel) information collection place, deploy temporary access management system clients, equipped with cameras, second-generation ID card readers, palm vein registration equipment, CPU card issuers and other facilities.

The system supports the collection of second-generation ID card information, digital photography, certificate printing, and the issuance of national secret visiting cards. The system can automatically match personnel information to revisiting personnel, reduce repeated collection of information, and improve management efficiency.The management system can be inquired through the visit management platform software, check visit records, and related

3.8.1. Guest system functions

?Visit front desk software: To register a visitor, you need to select the responsible police officer, collect the second-generation ID card information of the visitor, and then take a photo of the visitor, issue a visit card, and print the visit card.

?Visit Management Platform: You can apply for the visit process through the visit management platform, view visit records, and related statistical reports.

?Access control linkage, when visitors swipe their card at the access control, the photo, name, and ID related information of the visitors are displayed in the background in real time.

? Card issuer: Built-in national secret algorithm PSAM card, support national secret CPU card authentication.

?Second-generation ID card: large capacity, rich functions, and good stability

?Camera or face capture: take pictures of visitors

?Certificate printer: print visiting card

?Card: Use CPU card/country secret CPU card.

3.8.2. Workflow of the guest system

1) First, read the second-generation ID card of the police officer in charge, and determine whether the police officer has a visit record for pick-up and drop-off;

2) When the second-generation ID card of the police officer in charge is successfully verified, the verification terminal will be able to read the second-generation ID card of each visitor who is responsible for the order;

3) If there are multiple people visiting the same visit form, the visitor can swipe his second-generation ID card in turn. After the system determines that his identity is legal, it will display his second-generation ID card information and the video captured photos during registration, and print the visiting card, and Issue visiting card.

3.9. Detailed procedures for personnel entry and exit

3.9.1. Police officer entry and exit process

a. Process of entering the door for police officers

1) Swipe the CPU card + password at the police officer M1 door to enter the prison pedestrian passage;

2) The police officer swipes his card + password to open the door at gate A1, enters the armed police duty area, and the information of the police officer is transmitted to the armed police post; the card is simultaneously linked to the Pingwutong platform, and the outside line is blocked;

3) The armed police check the police information and manually open door A2 to let them go;

4) The police officer opens the door at the B1 door card + password and enters the police duty area; the police officer information is transmitted to the police duty post;

5) The police officer on duty check the police information and execute the virtual card replacement operation of the CPU card at the same time;

6) After the card replacement is completed, the police officer on duty manually opens door B2 to let it go, enter the vertical roller area, and is equipped with automatic face capture in the vertical roller area;

7) Open the right passage of the four-wing revolving door with the police card + password and enter the prison.

b. Police officers going out process

1) Police card + password + palm vein, open the right channel of the four-wing revolving door, enter the revolving door area, pass one person at a time;

2) The four-wing revolving door automatically captures the face of the exit direction; the police card + password opens door B2; at the same time the information is bombed to the police officer on duty;

3) The police officer on duty check the police information, and at the same time perform a virtual renewal and change the CPU card authority;

4) Police officers on duty manually open door B1 and let them go; personnel leave the police duty area;

5) The police card + password opens door A2 and enters the armed police duty area; at the same time the information bombs to the armed police duty post;

6) The armed police check the police information and manually open door A1;

7) Police officer swipe card + password to open door M1;

8) The police officer swipes the card on the reader head outside the M1 gate, links with the Pingwutong platform, the Pingwutong external line is opened, and the process of leaving the prison ends.

3.9.2. Temporary personnel entry and exit process

a. Temporary personnel entry process

1) Police officers bring temporary visitors, card + password to open door M1, and enter the temporary personnel information collection room;

2) The police officer on duty collects the information of the temporary personnel, reads the second-generation ID card, takes photos, enters the palm vein information of the temporary personnel, issues temporary cards, and binds them with the leading police officers; at the same time, they detain the temporary personnel ID cards and other documents;

3) Police officer and swipe card + password at gate A1 to open the door, enter the armed police duty area, the police officer information will be bombed to the armed police post, and the information of the temporary personnel will be displayed. The card has been linked to the police communication platform at the same time, and the outside line has been shielded; temporary personnel swipe at gate A1 Temporary card, for information recording, temporary personnel have no permission to open the door;

4) The armed police checks the information of officers and temporary personnel, and manually open door A2 to let them go;

5) The police officer opens the door at the B1 door card + password and enters the police duty area; the police officer information is bombed to the police duty post, and the information of the temporary personnel is displayed. The temporary personnel swipe the temporary card at the A1 gate to record the information, and the temporary personnel do not have the authority to open the door;

6) Police officers on duty check the information of officers and temporary personnel, and at the same time perform the virtual card replacement operation of the CPU card on the officers;

7) After the card replacement and verification are completed, the police officer on duty manually opens door B2 to let go, enter the vertical roller area, the vertical roller area is equipped with automatic face capture;

8) The police card + password opens the right passage of the four-wing revolving door, one person at a time, until all personnel enter the prison.

b. Temporary personnel going out process

1) The police card + password + palm vein open the right channel of the four-wing revolving door, 1 person at a time, until all personnel enter the channel of the four-wing revolving door area.

2) The four-wing revolving door automatically captures the faces of the exit direction, and the police officer card + password opens door B2; at the same time, the information pops up to the police officer on duty and displays the information of the temporary personnel; the temporary personnel swipe the temporary card in turn to record the information, and there is no temporary personnel. Door opening authority;

3) Temporary personnel swipe the card in the special card reader in turn for the temporary personnel, and verify the palm vein; the police officer must perform a virtual renewal operation to change the CPU card authority;

4) After the police post has verified the information, manually open door B1 and let go; personnel leave the police duty area;

5) The police card + password opens door A2; at the same time, the information pops up to the armed police duty post and displays the information of the temporary personnel; the temporary personnel swipe the temporary card in turn to record the card information, and the temporary personnel do not have the authority to open the door;

6) The temporary personnel swipe the card in the special card reader in turn in the temporary personnel, and verify the palm vein (face);

7) After the armed police on duty has verified the information, manually open door A1 and let go;

8) The police card + password opens the MA2 door (temporary personnel information collection room), and the temporary personnel sequentially swipe the card to record the information;

9) Temporary personnel exchange temporary cards and exchange for ID cards; police officers lead the information collection room;

10) Police card + password to open door M1;

11) The police officer swipes the card on the reader head outside the M1 gate, links the Pingwutong platform, and the Pingwutong external line is opened. Temporarily, the personnel leaving the prison process ends.

3.10. Key Management System Software and Card Issuing Software

The function of the access control card issuance software is mainly to generate a series of keys according to the national secret SM1 algorithm, and distribute the corresponding keys to realize one card with one secret. The card key is downloaded through the card reader.

The key categories generated by the software system are: initial key, protection key, transmission key, master key and root key. Among them, the initial key and the protection key belong to the process key and play the role of encryption line protection. The transmission key, master key and root key are used to send transmission key fob, root key fob and user card.

The transmission key card is used to safely import the transmission key into the read head chip, and then use the transmission key as the line encryption protection key, and the root key is imported from the root key card to the security module in the read head chip. The key in the user card is a decentralized root key, which is used for security authentication and identity recognition in the reader module with SM1 algorithm.

3.11. Linkage with other systems to expand functions

3.11.1. Linkage with video surveillance system

The switch signal of the device is linked with the local camera to realize the linkage with the hardware level of the video system. At the same time, it provides the access control system real-time event query interface to link with the video surveillance system. The video system can link the camera to take pictures when an access control event occurs and save it to the system Under the designated directory, the captured photos can be viewed through the system software, without viewing in the video surveillance system, ensuring real-time management of the access control events of the access control system.

3.11.2. Linkage with Pingwutong system

1) Adopt standard protocol and use encryption authentication method to connect with the operator’s Pingwutong platform to realize that police officers enter the prison through the pedestrian passage, vehicle passage, and interview room passage to close the outside line function, and open the inside and outside line function outside the prison.

2) It can query the real-time display and the police service internal and external functions of the police officer.

3) Use a conversion server to isolate the prison intranet and the police communication dedicated network.

4) It has a communication failure reminder function, which can realize failure alarm when there is no return data or the network is interrupted during the transmission with the telecommunications platform within the specified time.

4. Prison aisle door and prison area access control system

4.1. System block diagram

The structure of the access control system is shown in the figure below. The access control system is composed of an access control management platform and terminal equipment. Using TCP/IP networking mode, a single point of equipment failure does not affect the overall operation of the system.

Access control terminal equipment is mainly composed of floor access control system and access sensor. The floor access control system centralizes the access control of each floor to each weak motor room for management. The access sensor and the floor access control system communicate through Wiegand, and the floor control system communicates with the access control system backstage through TCP/IP to realize access control management. The access control system adopts our company’s unique key management mechanism and performs data encryption processing to realize cross-regional access control intercommunication and unified data collection for users to conduct centralized management.

4.2. System networking

System networking is based on TCP/IP networking and supports cross-regional networking applications.

Adopting TCP/IP network structure has the following advantages:

The network structure is simple, easy to manage, and easy to maintain and debug large networks; basically there is no limit on the number of terminals, suitable for large users;

The TCP/IP protocol ensures the high reliability of data transmission, and the bit error rate is low, especially when a large number of terminals are simultaneously transmitting data;

Each connection only connects to one device, and the failure of a single connection only affects one device and does not affect the entire network; the failure is easy to detect and isolate, and it is easy to delete the faulty terminal from the system. ;

Direct communication with the server through the router or switch, the theoretical communication speed can be as high as 100M or more, which can fully meet and respond to the real-time requirements of the subsystem;

Maintenance is simple.Low requirements for maintenance personnel

Support cross-regional networking applications

4.3. System Features

Based on the B/S architecture, there is no need to install the client, the operation is convenient, and the management is convenient.

Large-scale. It can realize large-scale/cross-region unified access control management. The system supports up to 20,000 doors with access control. The maximum number of authorizations is 1 million. The record is kept for one year.

Hierarchical authority management. It can be managed in a unified manner, or it can be configured with different management authority to manage the bureau department’s prohibition. It can realize unified management of access control distributed in different areas.

High capacity. The maximum number of authorizations per door is 26,000, and the maximum number of offline records is 80,000. There are 64 holidays and 128 groups of time periods.

full functioning. Flexible authority and time period management, multiple door opening methods, real-time monitoring, duress alarm, remote door opening and closing, one-key door opening and closing, real-time record extraction, etc.

Supports fire/alarm/video linkage to facilitate integration with other systems.

5. Workshop invisible access control system

The prison labor workshop area is large, the number of prisoners is large, the police force is scattered, especially during the overtime hours at night, the number of police officers is smaller, and its access control management has conflicting management requirements. From the perspective of fire safety, it is hoped that the workshop door is open. In the event of an accident, personnel can be quickly evacuated; from the perspective of prison administration, it is hoped that the workshop gate will be closed to prevent prisoners from slipping out.

In response to the access control management requirements of the prison workshop, infrared light barriers are used in combination with the access control system to realize invisible access control, unified access to the prison access control system platform, and unified management and authorization. Personnel enter and exit by swiping card, after authorization comparison, the infrared grating will be disarmed for a short time; if the card is not swiped or swiping without authorization, the personnel will automatically sound and light alarm when entering and exiting.

The block diagram of the workshop access control system is shown in the figure below.

6. National Secret CPU Access Control System Platform

6.1.1. Access control system platform software architecture

The access control system platform is established under the .NET architecture, a pure B/S three-tier system, and a multi-level one-card software system based on WEB applications. The use of middleware technology to separate the central database and applications provides an easy-to-expandable business architecture, which can better and more rationally plan business and data flows, improve the security and reliability of the system, and have superior real-time data performance. Strong maintainability.

The three-tiered all-in-one card system under the .NET framework consists of a central database, data access layer, business logic layer, all-in-one card system man-machine interface, and communication services.

Central database

The central database is based on SQL server2005.

Data access layer

The core applications and third-party applications in the one-card system interact with the database server through the data access layer. The system design adopts advanced fast data access mechanism and data connection pool technology to improve the speed of information interaction and the overall performance of the system .

Business logic layer

In the business logic layer, the card center database and various specific business applications are mapped into database objects and business logic objects. Using object-oriented programming technology, for all kinds of database access requests, all information interactions are carried out through the business logic layer to achieve complete isolation of applications and data, and enhance the security and flexibility of the system.

6.1.2. System platform functions

The system platform functions include modules such as area management, equipment management, personnel authorization, monitoring management, alarm management, log management and extended functions.

6.1.2.1. Area Management

Regional settings: Add, modify, delete, and other operations on regions and buildings, and configure basic access control data.

Regional import: batch regional settings.

6.1.2.2. Building Information Management

Maintain and manage building information

6.1.2.3. Device Management

Carry out parameter configuration management and operating parameter monitoring and management for access control controllers, access sensors and other equipment.

Access control equipment management:

Realize the addition and parameter setting of the access control controller and access sensor equipment. Including equipment information: serial number, location, model, communication parameters, function parameters (record storage method, keyboard settings, interlock parameters, fire alarm, bandit alarm, card reading interval, etc.), operating parameters (operating days, equipment temperature, connection Input voltage, validity period, version number); holiday parameters (support 64 holidays) time period (support 64 time periods, accurate to the minute); switch and alarm parameters (illegal card alarm, duress alarm, exit switch alarm, door sensor alarm) .

Holiday management:

Configure the default holiday list.

Time period management:

Configure the system default time zone list.

Equipment operating status management

Door attribute status management

6.1.2.4. Authorization management

Authorization management:

While realizing the card and door association, you also need to select authorization-related parameter settings, including time period, holidays, access signs, advanced functions (first card opening/multi-card), validity period, etc.

Authorized query

Authorization exception handling

6.1.2.5. Monitoring management

Real-time monitoring: real-time monitoring of card swiping information.

Monitoring records: According to conditions, query the monitoring records in the database.

Parameter configuration: configure the access controller card swiping record transmission mode, real-time synchronization or synchronization cycle. It can be set in batches or configured for a certain access controller.

Visitor tracking: enter the card number or query conditions to query the path of the card in a certain period of time.

Door status management: Display the current status of all doors, displayed by floor.

Number of people counting: Select the door to show the number of people who swiped in and out in a certain period of time.

6.1.2.6. Alarm management

Alarm management

Alarm parameters

6.1.2.7. Access control equipment extended functions

Multi-door interlock

Open the door remotely

Remote lock door

Anti-passback:

Confirm inside and outside

First card to open the door

7. Product Qualification

National secret product model

State secret product production designated unit

State secret product sales designated unit

Type inspection

Software copyright

Software test report

(Please consult the company’s sales staff for the qualification certificate)

8. Project case

Shandong Province: Luzhong Prison

Zibo Prison

Hutian Prison, etc.

Gansu Province: 9 prisons including Dingxi Prison

Guangxi Province: Women’s Prison

AB access control of 7 drug rehabilitation centers in the Drug Rehabilitation Bureau

Guangdong Province: Conghua Prison

9. Accessories-End Products

9.1.1. National secret CPU card access sensor

9.1.1.1. ZCR-111S (without keyboard)

9.1.1.2. ZCR-112S (password keyboard)

9.1.2. Access Controller

9.1.2.1. Product features

High capacity. A single door supports 26,000 cards and 80,000 offline records.

Multiple working modes. Normal working mode (default); multi-card reading to open the door; first card reading; normally open (normally open is divided into reading legal card and setting normally open, reading normally open card and setting normally open, automatic timing setting open)

Communication method: TCP/IP or RS485

Support multiple alarm functions: duress alarm function, illegal card reading alarm function, door open overtime alarm function, etc.

Anti-misconnection protection design, anti-interference design, anti-attenuation design

With three-level lightning protection, surge and anti-static design, with anti-crash and self-checking functions

With output current feedback protection design, power failure protection measures are high-speed flash memory design, data will never be lost

9.1.2.2. Technical parameters

9.1.3.1.1. Product features

Follow the relevant regulations of the State Cryptography Administration

Built-in national secret PSAM card to realize the key management of the PSAM module of the access control sensor

Automatically generate configuration cards to realize the key update of the access control sensor PSAM module

Built-in national secret PSAM card to realize national secret CPU card key management

9.1.4. National secret USB card reader

9.1.4.1. Model: ZCR621S

9.1.4.1.1. Product features

Follow the relevant regulations of the State Cryptography Administration

Built-in national secret PSAM card to realize national secret CPU card key management

    1

    [ad_2]

    We will be happy to hear your thoughts

    Leave a reply

    RFID made in China
    Logo
    Enable registration in settings - general
    Compare items
    • Cameras (0)
    • Phones (0)
    Compare