Chuangtong Intelligent Access Control Management System Application Solution (Picture)

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Time: 2008-2 Location: United States

User: Kraft Foods Inc. Label Type: Active

Working frequency: 134.2MHz

Implementing company: RecycleBank company Solution provider: RecycleBank company

Hardware provider: AveryWeigh-Tronix, McNeilus

[Summary]Kraft Foods and RecycleBank apply RFID technology to track the use of items and provide material incentives to consumers who participate in the recycling of items.

American Kraft Foods Corporation (Kraft) formulated the item recycling program and made the following regulations: RFID technology tracks the use of empty containers and provides material incentives to consumers who participate in item recycling. Kraft Foods is the official food supplier of RecycleBank. Kraft’s customers are on all continents in the United States. The company mainly uses the following technology: When the recycling truck recycles garbage, it uses RFID technology to weigh the weight of the recycling bin and records the history of the recycling. user. The user can download cash coupons or other lottery tickets from the Internet based on the RFID record. The amount of cash or lottery tickets depends on the amount recovered.

RecycleBank claims that it hopes to cooperate with some companies that have made outstanding contributions to environmental protection and are leaders. It will choose a company from each industry and give it the title of “official sponsor”. Kraft Foods mainly sells products including the Kraft brand and well-known brands such as MaxwellHousecoffee and Plantersnuts. In recent years, Kraft Foods has spared no effort in reducing environmental pollution and advocating green environmental protection. One of them is their exploration and efforts in product packaging.

1. Company profile

Shenzhen Chuangtong Intelligent Equipment Co., Ltd. is the only franchised sales and after-sales service partner of “Shenzhen Chuangtong Industrial Co., Ltd.”. Professionally dedicated to the sales of “Chuangtong” brand smart card system and smart mechatronics products and provide professional after-sales service; although our company is young, we are very mature and professional. Because our first-class large enterprise from the domestic industry has the core and most advanced technology in the domestic and foreign industries and is fully capable of achieving continuous leapfrogging on this basis.

“Chuangtong Smart Card” is the application of the most advanced non-contact smart card technology, modern electronic technology, computer technology, communication technology, and through the introduction of foreign advanced technology to bring in brand-new management concepts and product concepts. Combining the front-end technology of the industry and relying on the rich experience of technical personnel, we have developed, designed and produced a mature and advanced “Chuangtong Community One Card” application system, which has enabled high-tech to truly enter thousands of households and truly achieve “one card in hand” Create unimpeded”.

The “Chuangtong Smart Community Card” connects users and enterprises without separation and across distances, and can realize smart parking lots, patrols, information access control, smart card video intercom access control, elevator control, club consumption, attendance, and catering in real time. , Smart card query and recharge, smart card community bus and many other management subsystems. At the same time, it also has a variety of electromechanical product series such as electric barrier gates, remote garage doors, electric folding doors, electric flagpoles, and intelligent three-roller gates.

The company has established technical development department, engineering department, production department, after-sales service department and other important functional departments, and established wholly-owned branches in Beijing, Shanghai, Guangzhou, Xiamen, Haikou and other places.

Chuangtong Intelligent Equipment Co., Ltd. is market-oriented, relying on strong technical force and rich market experience, Chuangtong employees always face the ever-changing market with a full spirit, working together, being honest, doing things practically, and making progress together. The company has gradually formed a product field with its own characteristics, and has won the recognition and trust of users with its excellent quality, superior cost performance and perfect service. Thank you for your trust and support, and I hope you can give Chuangtong more criticism and supervision.

2. Overview of the access control system

2.1. Overview

Since the beginning of the new century, in the field of intelligent high-tech technology, there are many smart access control products of various brands, which also bring great troubles to users. Although there are many varieties, they have incomplete functions, no compatibility, and cannot be used flexibly. At the same time, quality and maintenance cannot be guaranteed. In accordance with the national conditions, Shenzhen Chuangtong Industrial Co., Ltd. combined with the requirements of the majority of users, and with the concerted efforts of scientific researchers, developed and produced a new generation of Chuangtong intelligent access control management system, which can also be used for attendance and inspection at the same time. More use, only need to increase the corresponding management software, which greatly saves money.

2.2. System introduction

The application of smart IC card access control management system can fully reflect the high-end taste of the entire enterprise and households. For the security side, the application of the Chuangtong smart access control management system to modern enterprises can also reflect its own value. At the same time, it can also provide anti-theft and alarm , And so on. Improved management and enhanced internal security measures. At the same time, it can completely eliminate the era of key opening. One card can be used for parking and internal consumption of enterprises at the same time, realizing the real “one card” and using only one IC The card can pass through the entire company and complete various basic work processes; and the intelligent IC card access control management system integrates information management, computer control, and non-contact IC card technology. It is not only a simple unlocking tool, but also a kind of Fast and convenient, safe and reliable, once-and-for-all multi-functional, high-efficiency, high-level, high-end management system; Chuangtong intelligent access control management system can be described as a new generation of “safeguard guardian”.

The keychain with a lot of keys hanging around people is heavy and heavy, which is very inconvenient. On the one hand, for security reasons, I also want to know the personnel entering and exiting a certain room in a certain area within a certain time frame. This is for various key prevention and protection areas such as the financial room, the treasury, the confidential room, and the archives room. It is particularly important that the use of keys cannot meet this requirement. The management center can monitor illegal entry and exit through the access control system, which is safe and reliable. Once an illegal intrusion is found, it can be quickly reported to the police. On the other hand, it can realize automatic recording of door opening, which is convenient for tracing and inquiring the information of personnel entering and exiting. It also takes care of the owner’s personal privacy rights as much as possible, and also prevents random entry and exit of outsiders, and improves safety prevention capabilities.

3. Access control system structure and topology

Chuangtong intelligent access control management system mainly uses RS485 communication for information transmission. The communication distance can reach 1200M. The terminal hardware is connected to the management computer through a communication line. The terminal hardware can receive the control commands issued by the computer in real time, and at the same time return the terminal access control to the computer. Status: The IC card reader is connected to the IC card controller through a multi-core control line, the information on the card is read through the IC card reader, and then transmitted to the controller for unlocking and information processing; the controller is connected through a two-core communication line Integrated lock or electromagnetic lock to control unlocking and locking.
3.1. Integrated system structure and description

Chuangtong integrated intelligent access control management system is mainly composed of non-contact IC card, access control reader (including access controller, card reader), IC card issuer, electromagnetic lock, RS485 communication card, door opening button, computer and management software And other composition. As shown below:

620)this.style.width=620;” border=0>

Access control system structure diagram

★Access control controller: The core part of the access control system, which is equivalent to the CPU of the computer. It is responsible for the processing, storage and control of the input and output information of the entire access control system, and is responsible for issuing unlocking instructions to the electric lock.

★Card reader: It mainly reads the information in the card and transmits it to the controller for processing.

★Electromagnetic lock: It is the executive part of the door lock in the access control system. Users can choose different locks according to different doors.

★IC card: Built-in CPU memory (8K), mainly storing personal data and other information.

★IC card issuer: authorize various functions of the card.

★Door opening button: The user does not need to use a card when going out, just press the door opening button to open the door.

★RS485 communication card: Mainly responsible for processing the input and output signals of the system.

3.2. Topology structure of integrated access control system

A single PC of the entire system can be connected to 256 access control terminals. Each access control reader can control one door lock. The access control reader can run both online and offline. The structure diagram is as follows:

620)this.style.width=620;” border=0>

Integrated access control system topology

4. Integrated access control card and workflow

4.1. Work flow and description

620)this.style.width=620;” border=0>

work process

★Description of door opening method:

●IC card to open the door: open the door with an authorized IC card with the authority to open the door, without authorization or without the authority to open the door

The IC card cannot open the door. For example, in the IC card issuance, the financial office only authorizes the IC card that issued the financial to open the door, but the IC card of any other employee cannot open the door.

●Key to open the door: In the event of a power failure and your system has no backup power supply, you can open the door with the key that matches the door lock.

●Computer opening door: the door can be opened directly in the real-time monitoring system of the management software.The management computer reads and writes to the access control through the communication line

When the access control reader receives the instruction, it will open the lock.

★Description of the way to go out and open the door:

●IC card to open the door: when you install an access control read-write controller or read-write antenna in the door, you can also use IC in the door

Card reader to open the door.

●Button to open the door: Install a door open button inside the door, press the button to open the door when you go out.

●Open the door with the unlocking knob: open the door directly through the unlocking knob of the lock.

4.2, system card

★Authorization card: is issued by the manufacturer in the parking lot management system when it leaves the factory. The authorization card has the highest authority in the access control management system and cannot be issued or emptied by its own system. After the authorization card is used to register and enter the system, the management card of the manager can be issued to perform IC card management, query, report management, backup data, etc. All the operations of the system.

★Management card: When the manager is operating the management software, it is used to log in to the software and issue the certificate of opening card to the staff, and can only work within the authority of the manager (the card is only used to swipe the card to log in to the system).

★ Door opening card: a card issued by the manager to the staff through the management system to open the door. The card only has the authority to swipe the card to enter and exit the door, and can only swipe the card to enter and exit the corresponding door within the corresponding time.

5. Main features and technical parameters

5.1, special features

★Card reading record: When the cardholder wants to enter the door, read the IC card on the access control reader. The reader first judges whether the card is valid. Send a door opening message to the lock, and the door lock is opened. If you do not push the door to enter within a certain period of time, the door will be locked again (the door opening delay can be set in the software), and the system will open the card number, cardholder’s name, and open the door. The date, opening time and other information are recorded, and the management personnel can directly query the entry and exit records on the computer; this function can also be used flexibly (to save money for the user, one system can be used as three systems), and the security patrol can hold a card as At patrol points, employees can be used for attendance when commuting.

★Multi-function classification setting (as shown in CTM—003): According to the needs of management, the system can set eight door-opening time periods, days of the week, and holidays (cards, normally open, normally closed), flexibly set to limit personnel access time ; Door opening time can be set arbitrarily through the software to strictly control the flow of personnel; the area of ​​entry and exit can be set freely to limit the scope of personnel entry and exit; the door status alarm can be set freely to enhance security, and it can also be set to be on time and per time deduction.

Time period to open the door: You can use this function to set the state of any door at any time period. For example, you can set door 1 at 12 o’clock to 13 o’clock, and personnel can enter and exit at will without a card or key; it can be set flexibly to limit the entry and exit time of personnel.

Week: For example, you can enter and exit at door 2 except Wednesday without swiping your card. If you don’t have to go to work on Sunday, you can’t open the door even if you swipe your card. This function can help you solve this problem.

Holidays: For example, your activity room is always open during holidays, and you can enter and exit as soon as it is closed or you need to open the door with a card. This function can be used to set it up.

620)this.style.width=620;” border=0>

Access control interface

★Management Center: Mainly responsible for establishing a database according to corresponding conditions, or regularly collecting information recorded on each access control reader (online system transmits information to the computer in real time), and managers can query according to conditions such as field words , At the same time, the realization of the functions of each access control reader is also set in the central management.

★Print report: When printing the report, the report can be automatically generated according to the conditions you choose. You can print the classified report and statistical report in any range and in any order, and it can be printed separately or continuously.

★Real-time alarm: The management center can monitor the opening and closing status of the door in real time. When the access control reader is connected to the management center computer online, the system can realize network alarm or set the phone number through the Internet network (owner’s mobile phone, 119, 110) Alarm, the management center computer is accompanied by a warning sound at the same time.

★Offline operation: Offline operation means that the functions of a dedicated PC are built into the controller of the product, and the software corresponding to the PC is written, so that the system can work normally without relying on the PC, and can automatically identify, Judge, read and write, and record the data of personnel entering and exiting (can hold more than 2032 entries), the PC can collect and read data at any time, and the terminal can also receive and execute instructions issued by the PC at any time. When working normally, the PC can be shut down or do other work.

★Security and protection linkage can set the linkage process by adding signal input/output modules to the controller;

●Door sensor signal, input combined with swiping card to judge whether the door is overtime or forced to enter. For example: when the controller does not receive the card card information, but detects the door sensor action, it can be judged that someone has entered forcibly. When the controller receives the card card information and door sensor action information for a period of time, the door sensor action is still set. If there is a director position, it can be judged that the door has been opened overtime.

●Infrared detector information. Install infrared detection equipment in the non-working time zone and important areas, and set it to be linked to the alarm, so that when a person or animal enters the defense zone, it will be detected by the infrared device immediately, triggering an illegal event, and the controller receives this event After the signal, it automatically connects to the equipment (alarm) linked with this, and uploads the information to the control center to achieve the anti-theft alarm function.

●Smoke fire detector information: similar to the anti-theft device, when the controller receives the information from the smoke detector, it will automatically turn on all the sprinkler switches of the fire channel, and at the same time upload the information to the control center, connect the fire department phone, and carry out fire fighting Linkage processing.

●Others: If the device is automatically activated by card information, such as when the infrared probe detects personnel information, it will automatically start the shooting head to take pictures, or automatically activate after a special event occurs. For example, pass when card information or illegal card information is detected. The controller activates the shooting head to take pictures.

5.2. Function settings

●The access control reader supports 256 cardholders to swipe the card to open the door;

●Each controller can store 1024 in and out minds;

●Multiple door status working modes (door normally open, door normally closed, door open by reading card);

●The controller’s internal logic linkage control, powerful internal interlock function on the board;

●Any door point remote software manual control;

●Real-time clock time function;

●Door open timeout alarm 1~30 seconds, can be set arbitrarily

●Multiple alarm functions: door open timeout, door is forcibly opened, duress entry, controller is destroyed, fire, telephone alarm, voice alarm;

●Multiple time period settings: annual holiday setting, Sunday setting, time period setting;

●Door lock status monitoring function, real-time monitoring of the opening and closing status of the door.

●System fault detection and self-reset function.

●Overcurrent, overvoltage and anti-interference protection functions.

●Voice prompt alarm function.

●LCD display function.

5.3 Technical parameters

●Communication interface: RS485 or TCP/IP

●Data transmission rate: 9600bps

●Transmission distance: 1200m

●Read and write time: <0.2S

●Integrated access control storage card reading records: 2000 records

●Data saving after power failure: 10 years

●Input power: AC/DC12V, 850mA

●Power frequency: 50Hz

●Integrated access control current: 250mA

●Working temperature: -25℃~70℃

●Storage temperature: 30℃~+80℃

●Working humidity: 10%~90%

●Anti-static interference ability: 15KV

●Reading distance: 20~60mm

●Switch output (normally open, normally closed)

●Anti-pry alarm

●Integrated access control dimensions: 125*80*20mm

6. Software performance characteristics

6.1 Software overview

★Using computer control and data processing technology, high degree of automation and accurate control.

★The Chinese operating interface of the software is beautiful, easy to understand, stable in performance, reliable in use, and powerful data management functions. At the same time, it provides users with a more user-friendly user interface, which is simple and convenient to install, debug, and maintain, and easy to replace and repair.

★Using the method of combining computer network and management software to prevent illegal modification and unauthorized access to information.

★The operator can monitor the operation of the entire system from any computer.

★Powerful query report function. Chuangtong intelligent access control management system adopts its own research and development report system, which can print out according to any range, any order, and any specifications.

★In the access control management system, the opening status of the door can be monitored in real time through the management computer. When the management computer and the door controller are connected normally, the function window can be used to monitor the use of the door being opened. If the card number, card type, door lock position and department of the IC card cannot communicate with the door controller normally, a communication error will be displayed.

When the user opens the software, the interface shown in Figure 6-1 appears when it is running, and at the same time, the database connection with the server library is carried out. When the database connection is completed, the user can log in to the system in the system management or the system in the toolbar (Figure 6-2) ), the main interface of the system pops up (as shown in Figure 6-3), where various functions can be implemented for each menu bar. Such as: automatic database generation, entry of personnel information, IC card issuance, IC card loss report, IC card recharge and other functions.

620)this.style.width=620;” border=0>

Chuangtong new card interface

6.3, real-time monitoring

When the on-duty personnel click on the online monitoring, a control bar (as shown in Figure 6-8) appears. The management personnel can monitor the status of all doors in real time, and can open any door by software here.

6.4, query printing

Managers can click to select according to their needs and select the corresponding fields in the field selection window. At the same time, they can arrange the fields in the order of selection according to the conditions. After confirming, the system will generate reports based on the selected fields.

Access control entry and exit records: Managers can click to select according to their needs, select the corresponding fields in the field selection window, and also arrange the fields in the order of selection according to the conditions. After confirming, the system will generate reports based on the selected fields for management Personnel query or print the entry and exit records, this function can only select the corresponding fields of the entry and exit records.

6.5, auxiliary management

●Database clearing: the manager can select the corresponding library to be cleared in the target library, and at the same time can select the time period to be cleared in the cleared date item; all the libraries are to delete the data in the entire access control system, and the door opening record is only the deletion record Entry and exit records in the database.

● ID card number loading (this item is for ID card system)

●Return to the control center (for example, the operator can exit this subsystem and return to the main interface of the all-in-one card software)

6.6 Main features

★Large-capacity, highly reliable information storage, no loss for 10 years after power failure.

★Backlighting makes it convenient to check in and operate at night or in dark places.

★Built-in backup power supply, no need to worry about power failure.

★Large screen LCD, detailed information display.

★Provide system information, check-in information and other inquiries.

★Single machine/multi-machine work (with RS232 and RS485 interface).

★Short messages can be posted to scroll on the LCD display as a bulletin board and warm reminders within the company (such as salary payment date, medical examination date, employee birthday reminder, etc.)

6.7, software performance characteristics

★Using computer control and data processing technology, with high degree of automation and accurate control, the management software of the system is developed under the WINDOWS98 environment.

★As part of the Chuangtong Smart Attendance System, it shares data with other subsystems. When the user uses multiple subsystems, it can be issued at one time and used in multiple places.

★The software has a beautiful operation interface and a skin-changing function. The system has stable performance and reliable use. At the same time, a variety of shift modes can be set to meet the various needs of users.

★Using the current more advanced C/S system structure, while having the unique powerful data management function of the network database itself, it also provides users with a more user-friendly and easy-to-use user interface, which is simple to install, debug and maintain convenient.

★Flexible authority management. The permissions in the Chuangtong Intelligent Attendance System can be refined by the administrator and then assigned to different operators to ensure that each operator can only work within its limited scope of responsibility, ensuring the security of the system.

★In the process of using the intelligent attendance management system, as long as the attendance card issued by the system is passed in the reading and writing area of ​​the attendance machine, the attendance machine will read the effective information in the IC card and store various data in the memory at the same time After the attendance is offline for a period of time, the computer system extracts the data in the attendance machine and stores it in the corresponding database file. In the report output, various IC card management reports required by the user can be statistically output according to the printing conditions. And the detailed report of attendance statistics.

7. Engineering construction and after-sales service

7.1 Composition of construction personnel for access control projects

620)this.style.width=620;” border=0>

The composition of the construction personnel of the access control project

7.2 Construction process of access control project

620)this.style.width=620;” border=0>

Access control project construction process

7.3 After-sales service

Shenzhen Chuangtong Intelligent Equipment Co., Ltd. is a high-tech enterprise integrating R&D, manufacturing, system integration and service. Over the years, the company’s products have been favored by market consumers with more outstanding quality; at the same time, they have been praised by users for their unique warranty and service; in order to thank users for their strong support and love to our company, we will give special services to Special you!

1. Consulting service: The supplier can answer questions about the use of the product by phone or in writing at any time, and send employees to the scene when necessary.

2. Maintenance service: This product is guaranteed for free within one year from the date of acceptance, and life-long maintenance; it is resistant to natural disasters and other force majeure (such as fires, earthquakes, etc.) and other human factors (such as 1, self-disassembly and replacement) Any part of the wiring or parts inside the machine is damaged. 2. Failures caused by installation by the professional technicians not designated by us.) are not within the scope of the free warranty, and only the maintenance cost will be charged (except for the free warranty period) Cost); the company opens the after-sales service hotline 24 hours a day.

3. The company promises

★ Rush to the scene within 3 hours after receiving the user’s call to solve the maintenance problem for the user. After repairing the faulty product, if the same problem recurs more than two times, it cannot be resolved and replaced with a new product unconditionally.

★The maintenance time is set as: at least 2 free maintenance within 1 month, and conduct a comprehensive inspection of the product to prevent accidents as much as possible.

4. Fast maintenance: The company has a dedicated after-sales service department and service centers in various districts of Shenzhen and all over the country:

Full-time responsible for product after-sales service. Our system adopts digital technology and modular design, which can realize fault self-diagnosis; can realize automatic compensation for lost signals, so maintenance is quick—the arrival speed of maintenance personnel is the speed of maintenance completion (Maintenance personnel only need to replace the corresponding module), easy to upgrade-without special instructions, users can perform the upgrade themselves, the operation is stable after the upgrade, and no further training is required.

★Regular customer follow-up, in addition to telephone contact, the “User Usage Sheet” is also sent to the customer, and the feedback form is returned to the company for processing in time.

6. Update and provide services: the product design update or software version upgrade, the supplier immediately informs and assists the purchaser in the improvement and improvement of the running system, and provides the new version of the software free of charge, so that the user’s system is at the most advanced level and the most advanced level. Perfect state.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare