Application scheme of access control system in high-risk supervision places
[ad_1]
Supervision places such as prisons and detention centers belong to the first-level risk units. The gates as their security barriers are high-risk entrances and exits. It is necessary to prevent illegal attacks from the outside or illegal trailing in, and to prevent illegal escape of internal prisoners, so its safety And intelligence has extremely high requirements. The following takes the construction of a prison gate access control system as an example to discuss with industry counterparts the functional requirements and implementation methods of the access control system for high-risk surveillance sites.
In addition to the basic requirements of stability and reliability, the supervision site’s requirements for the access control system usually have special features such as double-door interlocking function, anti-trailing function, anti-duress password alarm function, linkage with video surveillance system, etc. need. At the same time, it is necessary to monitor the passage and surroundings of the gate in all directions to ensure the absolute safety of the gate area and passage. According to the different conditions of traffic and pedestrians, the passage at the gate of the supervision site is divided into vehicle passage and pedestrian passage. The requirements of the two parts are slightly different. The following mainly discusses the vehicle passage.
The functional requirements of the vehicle passage are mainly
1. Two doors should be installed in the traffic passage, and it is required that at most one of the two doors can be opened at any time. From the hardware function of the system, it is forbidden to open the two doors at the same time, referred to as “double door interlock” or “A” /B door”.
2. ID card recognition systems are installed at the two gates. The vehicles entering and exiting must be led by the prison police and swiped by the prison police to apply for opening the door. The swiping action automatically prompts the gate duty room personnel to review and identify. After the duty room personnel confirm that the identity is legal and there is no abnormal situation, the duty room personnel will open door A or B one by one to let the vehicle pass.
3. Set up a 15-meter enclosed buffer area between the two gates, and set up an integrated infrared camera in the buffer area to monitor and record the panorama of the bottom of the vehicle, the top of the vehicle, and the buffer area. At the same time, a strong light lighting system at night should be installed.
4. An integrated management host must be installed in the duty room of the prison gate to perform unified management of A/B door access control, inner door infrared alarm equipment and buffer cameras, and automatically generate records of all entry and exit events for inquiries.
5. In case of emergency, it is required that the duty room can remotely control the switch of door A/B and upload the alarm signal to the superior command center.
In response to the above specific needs, while ensuring the safety of vehicle passages, we must also strive to improve the intelligence level of the prison gate. In actual construction, we can adopt the following measures:
1. Adopt A/B door double-door interlocking method to improve the safety of vehicle passage: install two internal and external doors at the prison gate, and add isolation net type linkage control door (hereinafter referred to as B) inside the outer gate (hereinafter referred to as door A) Door), the door body adopts a motor-controlled automatic sliding door. At the same time, to ensure the safety of the door area, a magnetic lock with a pulling force of 500 kg is added. The control part of the magnetic lock adopts a two-door networked access controller. By setting the “double-door interlock” working mode of the access controller, it is ensured that at most only one door of door A and door B can be opened at any time. From the access control center In the program settings, the situation that door A and door B are opened at the same time is prevented. It can also effectively avoid accidents caused by open two door areas at the same time due to the negligence of the duty officer.
In order to ensure accurate judgment of whether the door is in the open state, a door sensor is installed on each door, and the door sensor detection signal is directly connected to the access control controller. The opening and closing status of the door can be accurately judged by the opening and closing state of the door sensor. Quick and accurate alarms for abnormal situations such as illegal door opening and door opening overtime.
2. Adopt a variety of door opening trigger application methods to promote the intelligent management of the door area: the entry and exit method of the prison gate adopts the control method of two-way swiping verification, and a card reader with a keyboard is installed in the entry and exit direction of each door. When police officers lead cars in and out of door A/B, they need to use smart ID cards as entry and exit credentials. The door opening request signal can be uploaded to the gate control room by swiping card or “card + password”. Finally decide whether to open the door for it. Every incident of entering and exiting the door is bound to it with linked snapped pictures and videos. Once an accident occurs, it is convenient for quick and accurate verification.
When an extreme situation of a police officer being hijacked by a prisoner occurs, the hijacked police officer can replace the original card swiping operation by entering a set of pre-set anti-duress passwords, so as to covertly report his dangerous situation to the duty room without causing the prisoner Suspicion, thereby minimizing the damage.
3. Adopting access control and video linkage to prevent detainees from absconding: install multi-angle and omnidirectional cameras in the buffer zone of the vehicle passage to prevent detainees from getting out of the prison by means of vehicles entering and exiting. It is necessary to strictly investigate the top of the car and the chassis of the car that is most likely to hide people. Therefore, a buried camera, commonly known as “earth eye”, is designed on the ground in the middle of the car passage to monitor the car chassis; two installations are installed on the roof of the car passage. A dome camera, commonly known as “Sky Eye”, is used to monitor the roof of the car.
The buried position of the “Earth Eye” is set between Door A and Door B, where the vehicle stays between the two doors and waits for the next door to open. In order to ensure that the camera can illuminate the whole picture of the car chassis, a wide-angle lens is required. Taking into account the light conditions of the car chassis and the waterproof performance of the camera, a sealed and waterproof wide-angle infrared integrated camera was finally selected, and an auxiliary light source was installed at the same time. The installation position of “Sky Eye” is set on the left and right sides of the center of the roof of the vehicle passage. It is installed diagonally and diagonally. While monitoring the roof image in all directions, it can also complete the card swiping area of door A and door B. Image collection is convenient for the police on duty at the gate to see the panoramic video image of the swiping area when receiving the swiping request. Outside Door A and Door B, install color fixed-point gun cameras, and install outdoor waterproof shields. When the policeman swipes his card to request to enter the buffer zone, the policeman on duty at the gate can accurately see the real situation at the gate.
4. Use an integrated management host for unified management of access control and video: The control room of the prison gate uses a digital monitoring host as the core control equipment to centrally manage the A/B door, the monitoring image of each door area and the alarm linkage, and can be linked with The superior command center is networked to facilitate unified command. When a police officer swipes a card to send a door opening request, the supervisory system software automatically pops up the information of the police officer who swipes the card, including the cardholder’s name, department, position, personnel number, and original photo of the cardholder. At the same time, the system automatically captures the picture when the cardholder swipes the card, and displays it on the same interface as the original information of the card-holder police officer, which is convenient for comparison and identification of the police officer on duty at the gate. After confirming that it is correct, the gate and the police on duty can open the door by means of mechanical buttons or software control.
When the police swipes the card, the camera recording at the doorway is automatically linked. The video file is accurately bound to the police swipe record. Once there is a problem, you can view the current video file while viewing the swipe record, which is convenient for quick verification when a problem occurs.
In order to respond to emergencies, the supervisory system software is designed with a one-key lock function. When an on-duty police officer finds an abnormal situation threatening the safety of the door area, he can activate the one-key lock function to lock all A/B door access controls, which can greatly Reduce the risk of illegal impact on the door area. Only authorized managers can release the locked state of the access control through password verification.
Concluding remarks
In the initial stage when the overall security system in the prison has not been completed, the A/B door access control system, as a component of it, can operate independently. After the construction of the overall security system is completed, the access control system can be connected to the prison platform again. Because the demand for security systems in supervision places has shown a trend of integrated platform, intelligent linkage, multi-level networking, and unified command, the access control system must also be seamlessly integrated and intelligently linked with the overall security system. Only when the access control system meets the requirements of visualization, linkage, query, and emergency control, can it truly act as the guardian of the entrances and exits of high-risk supervision sites.
[ad_2]