Bank anti-tailing access control system solution

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

System function and structure

Preface

The so-called anti-tailing refers to the interlocking function of two doors. When one door is opened, the other door cannot be opened, and the other door is allowed to be opened only after the first door is closed. Bank robberies usually occur when criminals use violent means to rob the bank’s business halls and vaults by hijacking, forcing bank staff, or directly using blasting and other bad methods, resulting in economic damage to the bank and a serious threat to the bank. Personal safety of employees.To this end, we launchedAnti-tailing access controlThe system is an access control security control system specially developed for criminals who use trailing or coercive methods to enter the business hall to carry out illegal activities.

1. Overview of the bank anti-trailer access control system

1. Bank anti-tailingAccess control systemdemand analysis

• Use computer technology, network communication technology, automatic control technology, and digital image processing technology to conduct strict and scientific management of high-risk locations such as banks and treasuries to improve the image of banks, financial institutions and other enterprises and improve the security level of the entire location .
• Strictly monitor and control certain banks, treasury and other important areas or departments, such as: treasury entrances and exits, business hall entrances and exits, etc.
• Adopt advanced non-contact inductive card reading technology to avoid physical damage to the card caused by multiple insertion of a contact card or inconvenient unlocking with a hardware lock.
• With multiple alarm states, bank employees can trigger alarm events without the gang’s knowledge. Through networking with the management control host, the central controller can collect on-site alarm information in time and deal with them immediately to ensure the personal safety of the bank’s property and employees .
• Conduct unified management of bank employees, requiring all employees to enter the vault or business hall to pass strict identity authentication (by swiping a card or other door opening methods), and the employee’s card swiping record can be used as an attendance record at the same time, which can be statistically analyzed.

2. Design principles of bank anti-trailing access control system

The prerequisite for the design of the bank’s anti-trailing access control system is to meet the various needs of users. Utilize its advanced, mature, reliable, flexible technology and good price-performance ratio to maximize the long-term interests of users and allow users to obtain the greatest return with the smallest investment.

The following are the main design principles of this system:

• Practicability: The function of the bank’s anti-trailing access control system should meet actual needs. It should not be flashy. The one-sided pursuit of the system’s advancement will inevitably lead to excessive investment and inconsistent with actual applications. Therefore, the practicability of the system is the first principle that should be followed.
• Ease of operation: The operation of the front-end products and software of the bank’s anti-trailing access control system is simple and easy to understand, and the general users or operators can operate independently through simple training or provided manuals. Security adopts TCP/IP and RS485 combination networking, which has higher reliability and more stable performance. It has powerful real-time monitoring function, door interlock function and linkage control, etc., to ensure the safety and reliability of the entire system.
• Scalability: Adopting the access control system control technology, when the user’s needs change, it can be easily realized through the powerful functions of the access control. For example, the number of interlocking door points can be flexibly increased or decreased (it is necessary to increase the number of interlocking doors at the same time), to meet different periods and occasions with different functional requirements, through the linkage function to perform more linkage alarm control, etc. Regularly go to the company website to upgrade the latest management software for free to ensure that the system is always in the leading position.

3. Realization of bank anti-tailing access control system

• Interlock linkage function: When any door is open, the opening of the other door is absolutely prohibited, with automatic anti-following-in function. For special places, linkage and interlocking of more than 3 doors can also be realized.
• Two-way card reading function: Two-way card reading can be realized for two doors, that is, both the inner door and the outer door can be used to read cards in and out.
• Unclosed door reminder function: When any door is opened for more than a specified time (0~255 seconds can be set) and is not closed or falsely locked, it will be prompted to close the door through the on-site buzzer or the management host alarm.
• Emergency door lock and alarm function: When an alarm occurs, press the emergency door button in the business room to lock the two doors at the same time, so that both the inside and the outside of the door cannot be opened. Imprisoned between two doors. At the same time, report to the Public Security Bureau or relevant personnel.
• Duress to open the door alarm function: If the cardholder opens the door under the threat of criminals, just use the duress password to open the door. When the door is opened, an alarm signal (alarm or light) will be sent to the monitoring center, which not only ensures personal safety, but also instantly Call the police.
• Alarm linkage function: When there is an alarm signal from other parts of the alarm system, the two doors will be forcibly locked at the same time, making it impossible for the gangster to succeed.
• Button to open the door function: For those who do not have the identity to open the door, if they are allowed to enter, they can press the door open button in the business room (each door corresponds to a button), which can realize convenient door opening, but is limited by the interlock linkage logic relationship .
• Emergency double opening function: When picking up the cash drawer in the morning and evening or in a very emergency situation (such as fire, poisonous gas, etc.), press the emergency door opening button in the business room to open both doors at the same time.
• Intelligent management: It is safe and convenient to manage the authority, time and method of entering and exiting personnel through the management computer. The management computer can monitor the incoming and outgoing personnel and corresponding events in real time, and store the corresponding data at the same time for later query.
• Multiple identification systems: the system supports non-contact IC card identification systems, biometric systems (such as fingerprint recognition, iris recognition, palm recognition, etc.)
• Multi-card door opening function: In important areas, the system can set the multi-card door opening method, that is, when opening a door, multiple people must simultaneously identify the identity within a specified time before the door can be opened. The system can set up 2-8 people.

2. Design of the bank’s anti-trailing access control system

1. The principle of the bank’s anti-trailing access control system

The digital human intelligent anti-following door system is mainly aimed at banks, treasury and other departments in the important links of extracting or storing valuables, and an effective measure to prevent sudden robberies. This system is installed inside the passages of banks and vaults, with a total of two doors.System equipment includes: management software, communicator, field controller, electronic lock system, identification system (such asCard reader) And indoor control buttons.

The use process of the intelligent anti-trailing door system (as shown in the figure below):

620)this.style.width=620;” border=0>

2. Schematic diagram of bank anti-tailing access control system

620)this.style.width=620;” border=0>

Schematic diagram of Digitalor bank anti-trailer access control system

3. Application occasions of bank anti-trailer access control system

• Banks, treasury, finance and other important regions or departments need to be closely monitored.
• The places to be monitored are widely distributed and large in number, and occasions where unified network management is required.
• The place to be monitored is in the same area, but it is not convenient for wiring due to factors such as the environment, and each controller point is equipped with network resources (such as local area network).

4. Case analysis: (take the business halls of Beijing Bank of Communications as an example)

This system uses aDouble door interlock controllerControl two doors: public area A area-transit area B area door 1#, transit area B area-controlled area C area door 2#, all personnel entering and leaving the bank’s business hall must use a combination of swiping card and password, when When bank personnel need to enter the controlled area C: first verify their identity outside door #1 (such as swiping a card and add a password), and the system will automatically detect the status of door #2. If the personnel’s identity verification is passed, and the system detects that door #2 is In the closed state, door 1# opens and personnel enter zone B (transfer area), and the system automatically closes gate #1. At this time, the personnel are safely locked in zone B of the transfer; personnel verify their identity in front of gate #2 (such as swiping a card to add Password), and the system automatically detects the status of door 1#. If the personnel authentication is passed and the system detects that door 1# is closed, door 2# opens and the person enters the controlled area C, and the system automatically closes door 2# .

When a person arrives from the controlled area C to area A: the person verifies their identity in door 2# (such as swiping a card and adding a password), and the system detects the status of door 1#. If door 1# is closed, door 2# opens and the person Entering area B, the system automatically closes door 2#; personnel verify their identity in area B (such as swiping a card and adding a password), and the system checks the status of door 2#. If door 2# is closed, door 1# opens and personnel arrive at area A , The system automatically closes 1# door.

620)this.style.width=620;” border=0>

Flowchart of using intelligent anti-trailer door system

If a bank employee swipes a card + a 4-digit duress code on the first door when being duressed by an illegal person, the first door can be opened normally at this time, and an alarm signal will be issued when the door is opened. Or alarm bells, etc.); remind the staff on duty to take corresponding measures. These actions are carried out quietly without the knowledge of illegal personnel, which can further protect the lives of employees.

After entering the transit area, employees should deal with the criminals, delaying time and waiting for the security department to take action. Can deliberately not close the first door, at this time the second door cannot be opened in any way. When the gangsters are extremely vicious, employees can close the first door and re-enter the duress password when opening the second door to pass the duress alert to the relevant departments again. Employees in the business hall can transmit the alarm to the relevant departments through the alarm device installed in the hall, or press the emergency double-close button in the business hall after the gangster enters the transfer area, and the system enters the alarm state, and it is in the transfer area. The personnel in the area will not be able to open the door in any way until the manual switch is turned on again. Since this method may threaten the lives of employees who are still in the transfer area, the double-close button cannot be activated under compelling circumstances.

When a fire or other emergencies occur in the business hall, you can also press the “emergency double open” button in the business hall and open the double doors at the same time to complete the quick and safe evacuation of all personnel, which meets the fire safety requirements.

3. Introduction to the main equipment of the bank anti-tailing system

1. Anti-tailing access controller

DCU9029N anti-tailingAccess Controller, It can independently control the two-way entry and exit of the two doors. When connected to the computer, all the data saved in the controller will be uploaded to the management software through the data cable, and 4000 in and out events and data can be stored when offline, and the data can be saved for 180 days when the power is off. Each controller supports 7500 cardholders.

The DCU9029N intelligent access control controller has a powerful internal control point interaction function, which can set the interlocking of each point in each control panel arbitrarily to restrict each other and improve security. It is especially suitable for banks, institutions and other places with high security requirements. You can also use any event information to generate various control actions. For example, when the door is opened abnormally, the controller can be set to automatically lock other related door points and generate an alarm signal. The controller also has auxiliary input and output points, which can be connected to analog or digital switch status signals such as smoke and humidity, and can control lighting, CCTV, fire alarm and other equipment, and can realize various linkage functions.

• One RS485 network communication port, which can connect 127 access controllers
• The total network length can reach 1200 meters
• Communication rate: 9600 bps
• Support Wiegand 26Bit, 27Bit, 32Bit
• ABA (second track)
• Biometrics
• Fingerprint recognition technology
Inductive IC card
• password keyboard
• Watermark magnetic card
• With adaptive function, the controller is fully compatible with various Wiegand card readers such as Motorola, HID, TI, FM, Mifare, logic, etc.

• technical parameter

Number of management: 2 doors two-way control (access can be divided into permissions)
System capacity: Supports the registration of 7500 cardholders in batches or 5000 cardholders by sub-card number registration
Offline storage: 4000 events buffered and archived
Software features: Multi-user management, multi-authority, 15 time groups, real-time monitoring function, electronic map simulation display, Digitalor2005E ACS or Digitalor2005E ACT, Digitalor2005E ACSN network version is optional
Input voltage: 220V AC (50/60Hz)
Input power: ≤30W
Working environment: temperature -10℃~70℃, humidity 0~90%
Communication method: RS485
Input parameters: dry node switch input
Output parameters: switch output or electric lock power output
Card reader interface: provide TTL level signal, 12V DC, 150mA card reader power
Card reader connection: 4~8 core twisted pair shielded wire, 24AWG, connection distance ≤100m

Perfect safety protection measures

1. All interfaces are equipped with TVS transient voltage suppressors, which can effectively protect the interface circuit and suppress the surge voltage and transient overvoltage generated by lightning, static electricity, and various accidental reasons on the line.
2. All contacts of the relay have contact protectors to ensure that the relay will not damage the contacts under frequent and long-term operations.
3. The controller is equipped with a hardware electronic dog monitor to ensure that the controller will not crash when it is working.

Quality system

The product passed the type test of a Ministry of Public Security (Gongjingjian No. 030049)
CNACL No.0398 ISO9002 for military production

2,Card readerseries

EM3000 keyboard card reader adopts advanced radio frequency card technology, embedded microcontroller, reliability technology, combined with high-efficiency decoding algorithm to complete the reception of 64bitsRead-Only uem4100 compatible ID card; it has a 3×4 keypad, Auxiliary password input. It has the characteristics of high receiving sensitivity, low working current, single DC power supply, low price and high performance.
        
Features

• Built-in antenna, working frequency is 125KHz
• Fully support uem4100 compatible format ID card (64bits, Manchester encoding)
• Effective distance above 0-10cm
• The data receiving time within the effective distance is less than 100ms, typically 70ms
• 9-15V power supply, working current is less than 70mA
• Wiegand 26bits/ABA standard format data output
• Built-in two-color LED and buzzer

technical parameter:

• The EM3000 read-only device can be directly installed on the wall or in the wall, and the surface and back cannot be covered with metal objects
• Installation size:
115(L)×75(W)×16(H)mm(Type A)
108(L)×87(W)×28(H)mm(Type B)

• installation steps:

1) Remove the front cover
2) Press the two mounting holes on the card reader to punch holes in the corresponding positions on the wall
3) Fix the card reader to the wall with screws
4) Put on the front cover, installation is complete

3.Power locksseries

DMC-280 magnetic lock:

• Standard function: 280kg single door exposed magnetic lock
• Lock body size: 250(L)×42(W)×25(H)mm
• Withstand tension: 280kg
• Input voltage: 12v or 24v
• Working current: 12v/480mA: 24v/240mA
• Scope of application: wooden doors, glass doors, metal doors, fire doors
• Door opening method: 90℃, push or pull
• Installation method: external
• Material selection: high-strength aluminum alloy, professional electromagnetic material
• Security type: power-on to close the door, power-off to open the door
• Note: With Led indicator

4. Bank quadruple button

• Two exit buttons
• An emergency lock button
• An emergency double button
• The product is selected for use in banks, savings houses, prisons and other places
• Dimensions: 130 (length) × 87 (width) × 43 (height) mm

5. Communication converter:

TLC485 is a general-purpose low-cost RS-232/RS-485 converter. It adopts a pocket-sized design and is equipped with pluggable terminal blocks. It is easy to install and light. It can obtain power from the TXD, RTS and DTR signals of the RS-232 interface, and it can work normally even when only the TXD signal is used for power supply. It is widely used in attendance, access control, PTZ control, meal sales and parking lot systems.

Performance characteristics: small size, easy to install, unique serial port power technology, no external power supply, extremely high power-taking efficiency, ensuring that the serial port can still work normally when it is working in three wires. Very low power consumption, and it is equivalent to ordinary light-emitting diodes when working in static state. Power consumption is truly “passive”.
              
Communication indicators:

• Standard: Comply with EIA RS-232, RS-485 standard
• RS-232 signal: TX, RX, GND
• RS-485 signal: D+, D-, GND
• Working mode: asynchronous work, point-to-point or multi-point, 2-wire half-duplex
• Direction control: the use of data flow automatic control technology, automatically distinguish and control the data transmission direction
• Baud rate: 300~115200bp, automatic detection of serial port signal rate
• Load capacity: support 32-point polling environment (128 points can be customized)
• Transmission distance: 1200 meters at the RS-485 end (at 115200bps), the RS-232 end is recommended not to exceed 5 meters
• Interface protection: 1500V electrostatic protection
• Interface form: RS-232 end DB-9 female, RS-485 end DB-9 male or 3-position terminal

Environmental indicators:

• Working temperature: -20℃~60℃
• Storage temperature: -25℃~85℃
• Relative humidity: 5%~95%

Power indicator:

• Input power: no external power is needed, power is obtained from the TXD, RTS, DTR signals of the RS-232 port
• Power consumption: static power consumption within 10mA, dynamic power consumption within 40mA

Appearance index:

• Length × width × height: 90mm×33mm×16.5mm
• Shell: plastic shell
• Color: computer white
• Weight: 40g

Beijing Cyberman Technology Co., Ltd. All rights reserved

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare