Access control attendance management system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

Access control is an equipment system used to manage an entry and exit channel. The main function is to authorize those who enter and exit and to record the entry and exit process. The main advantage of the access control system is that it can facilitate the management of access rights, especially the entrances and exits with large numbers of people and fast flow.
In terms of use, the access control system replaces the traditional key function, but has some advantages that the key does not have:
1. Convenient to use and carry, one card for multiple purposes, no need to carry many keys, one card is used.
2. The access control system can manage a large number of people at one time, and it is convenient to assign different access rights to different people, especially in the case of modern personnel who flow fast and do not know each other. There is no need to recover the key and reissue the key, reducing a lot of trivial labor.
3. It is especially convenient for daily management, and it is very easy to deal with the loss and replacement of the key, and there is no problem of replacing the lock when the key is lost.
4. The access control can have a very detailed record of the entry and exit process, which is convenient for future traceability, but the key does not have any record.
The access control system generally includes the following parts:
The control part of the controller is the core part of the access control system, responsible for data processing, storage, transmission, etc. A device used to verify permissions, receive credit cards, and control electric locks. It also needs to exchange data with the computer. When the computer is not working, it can work offline independently.
Card reader The place where the card is read or the password is entered is the data input part and the place where the user directly uses it. Installed near the door or entrance, convenient for swiping the card, used to collect the swiping data, and pass it to the controller for verification. The card reader is generally selected according to the on-site situation, especially in conjunction with the on-site decoration, because the card reader is a major device seen by the user and has relatively high requirements for appearance.
Electronic lock The controller operates the closing and opening of the lock, which is the executive part of the access control system. A device used to lock doors or other passages.
Power supply The part that provides power to the lock and the controller may need a backup power supply, and it can work even if the power fails.
Communicator A device that communicates with a computer.
Software Software used to perform functions such as card management and access rights.
It also includes some other accessories, such as exit buttons. The controller and the card reader can be integrated together.
[Work Flow of Access Control System]
1. Personnel hold the card and swipe it in front of the card reader. The card reader records the card information and transmits it to the controller.
2. The controller receives the card information, queries its own database whether the card information exists, and if it exists, analyzes whether it can pass through this channel at this time. Regardless of whether it can pass, the controller will record the card information, including time, location, and event type. If the channel can be passed, the controller will issue an unlocking and releasing command to the lock device.
3. After the lock receives the unlock command, the release is opened.
4. The lock remains in the released state, and the controller sends out the lock close command, then the lock closes, re-locks the passage, and cannot pass.
5. When the controller communicates with the control software, the card swiping events and other records are uploaded to the computer.
Scalability
1. Use Wiegand conversion module to connect to world-renowned card readers such as HID and Motorola.
2. Use DI/DO module, can expand 4 input ports and 4 output ports. The control flow can be set through software programming.
3. If the door is opened for too long or someone opens the door forcibly, the alarm bell or warning light can be driven.
4. Up to 1024 doors can be controlled.
5. Install attendance software to realize personnel attendance management.
6. Provide dynamic link library to realize seamless connection between systems.
way of communication
1. The RS485 communication method is adopted between the controller and the card reader, and the linear distance can reach 1200m.
2. TCP/IP communication is adopted between the controller and the main control computer, and the distance is unlimited.
3. RS485 communication cable requires two-core shielded wire 2×28×0.15RVV.

Consulting Tel: 010-52867852, 88494100
Business support: 15611398461
Contact: [email protected]
QQ:1476385659,13023544
MSN: [email protected]

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare