Technical design scheme of building intelligent all-in-one card system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

The XXX building system should have a high degree of stability, choose an open hardware platform, support multiple communication methods, and lay a solid foundation for the interconnection and system integration between devices. In addition, it should have standardized and modular components to ensure Great flexibility and scalability. Based on the above overall requirements and to ensure the long-term stable operation of the system, the brand of the access control system and time and attendance system of this program is selected as the American Westinghouse (NEXWATCH).

system requirement

Realize the scientific classification management of personnel and access channels, and restrict access to areas and time periods for different authorized personnel. Combining the actual situation of the building, set up access control points in the offices, entrances and exits of each floor, etc., and each access point can be used as an attendance point at the same time, or an attendance point can be set independently.

User needs analysis

We conduct detailed research and analysis on the construction drawings and building structure, layout and environment of each building in the XXX building. Combined with our long-term engineering design experience, our analysis of the requirements for the access protection range and function is as follows.

⑴The system adopts a hierarchical structure, and local damage will not affect the normal operation of other parts.
⑵The system has good scalability, so that users can easily expand the system on the basis of the original system without having to remake the system too much.
⑶ The system should be configured to facilitate users to make work cards.
⑷The system supports the setting of the prevailing time zone, and can be set independently for different holidays.
⑸When selecting equipment, consider the power-off unlock function in case of fire to ensure the safety of personnel during fire alarm.
⑹The access control system should be able to control the arming or disarming of each area of ​​the system, the opening and closing of the access door and the opening and closing of the entrance and exit, and have the function of anti-return.
⑺ The network structure of the access control system requires high system fault tolerance, adopts centralized management, decentralized control management mode, and the entire system is a modular structure, which is convenient for system expansion.
⑻The access control point is mainly one-way control. When you enter the door, you can swipe your card. When you go out, you don’t need to swipe your card. Press the door button to open the door. Real-time record of the name, identity, time, and frequency of the entry/exit personnel, search and query by time, specific door, specific cardholder, etc., and automatically generate reports.
⑼All access control can be opened by swiping the card. Legal users can change the card at any time. The cardholder can be set to have different permissions. People with different permissions can enter different areas. You can also specify the time limit for different permissions to enter each door.
⑽The controller of the access control system can work independently in the abnormal situation of losing communication with the control host. Each intelligent controller can support card readers and input/output points at the same time, and is equipped with a configuration port to facilitate the use of a computer to directly configure and program a single intelligent controller.
⑾The access control system monitors the opening and closing conditions of the doors at each control point in real time. Abnormal situations (door opening timeout, forced door opening, unauthorized door opening, etc.) will automatically alarm, and the system cable, power supply, module, etc. will have an automatic alarm function when the system cable, power supply, module, etc. are damaged.

Function realization

• The design of this system is suitable for the computer intelligent system of XXX building one-card management. The company’s employees hold smart cards, which can access the main passages and office premises of the building, enter and exit the parking lot, consume in the staff restaurant, and staff attendance and other functions. The central management server records the data of all systems, records and queries through the access control system management software, and automatically generates various reports.
• The main control equipment and supporting equipment of the access control system are produced by professional manufacturers, with stable quality, reliable performance, scalability, and extensive practical application by users at home and abroad.
•Integrate multiple functions such as access control and attendance to realize integrated management and intelligent linkage.
• The access control system can be opened, closed, fortified, disarmed and other functions can be conveniently realized through the electronic renderings, the electronic structural plan, and the click of the mouse.
•Each subsystem can work offline. When communication failure occurs between the subsystems and the central server, the inspection system is used to detect whether the communication status of each subsystem is normal. If the communication of each subsystem fails, the central server management system prompts Related systems need to be overhauled, etc.
• The cables of each subsystem have the ability to resist lightning strikes and signal noise interference.
•Each system is equipped with a backup battery, and if the power is suddenly cut off, the system can work normally for more than 5 hours to ensure the safe operation of the system.
• The access control system must be equipped with an “emergency backup card” (advanced authority), which can be used to open any door of the access control system.
• The access control system can easily implement access control functions such as interlocking and anti-passback.
•It can realize the functions of remote report, remote alarm, remote setting and remote query through the modem, which is convenient for the management and maintenance of the system.
• Personnel access management and query: The system records attendance data, and the access control system software of the central server automatically generates comprehensive attendance reports and provides them to the personnel department.
•Consumption management and query: system canteen consumption, catering consumption, appointment consumption, etc., according to needs to achieve fixed consumption and variable consumption, daily management of non-contact consumption card issuance, recharge, and loss reporting, and realize data aggregation, query, and generation The consumption report is provided to the financial department.
•Employees can automatically enter and exit the parking lot with valid ID cards to realize charging or free functions, and at the same time, automatically generate parking lot management reports and provide them to the financial department.
• Various linkage functions (such as CCTV, fire, alarm linkage).

System Components

According to the system requirements of the intelligent access control system of the XXX building, the scope of functions that this solution will achieve includes: identity management, attendance management, entrance and exit control management, online patrol system, consumption management, etc., forming a comprehensive building access control service management system. details as follows:

• The system adopts a contactless card that conforms to the ISO/IEC14443 international standard, has three mutual security certifications, and supports one card with multiple storage structures to facilitate different application fields and extend the service life of the card
• Control the permissions of the card
• Subsystems can operate independently, but also can be centrally managed
•Identity Management
• Attendance management (reserved)
•Entrance and exit control management
•Control the door through the electronic door lock, with the function of entry and exit records, and can generate reports through the computer
•Can display the floor plan electronic map
• The system can self-check and alarm for system failures
• The system has standard, developed and convenient software and hardware interfaces and development and application operating platforms
• The system has a supporting card issuance system, which can complete the production, issuance and authority control of card issuance, and record data management
• The system can share real-time data with security systems, property management systems, etc., to achieve linkage control integration, and support the functional application of related systems

Access control system management structure

1. Central management system: The central management system is set up in the control center. The control center is composed of software and hardware such as central server, door controller, transmission equipment of consumer system, transmission equipment of parking system and management software of access control system. The access control management system adopts the standard WINDOWSNT-based C/S system, provides an open interface, is easy to integrate with the upper management system, and provides a monitoring and query system based on the WEB interface. The system operation status, operating parameters and Various statistical reports, etc., based on the network database management method and the management system for arbitrary integration. Equipped with operation registration, data management, card management, data reception and control, query management, statistical summary management, report module, maintenance module, security mechanism and communication mechanism, etc. Each functional module performs data transfer and calculation through the database, connects with each other, and operates the system through a visual interface, and the operation of the data stream is automatically completed by the system.

2. Access control system: intelligently manage the access channels inside and outside the XXX building. Each access control unit is generally composed of access controllers connected to card readers, electric locks, exit buttons, door sensors and other components. And can be linked with CCTV and other alarm systems.

3. Attendance system: all staff members each hold a non-contact smart card, and read the card on the attendance card reader when they go to get off work. The card reader senses the card reading information and automatically counts it through the attendance management software of the management host. , Generate attendance reports, and provide the reports to relevant departments.

4. Consumption system: Employees can use valid cards to go to restaurants for consumption, catering consumption, reservation consumption, etc., realize fixed consumption and variable consumption according to their needs, and perform daily management of the issuance, recharge, and loss reporting of contactless consumption cards, and realize data Summarize, query, and generate consumption reports, and provide them to the financial department.

System functions and features

Scalability: Each controller can be expanded to 16 independent card reader interfaces to implement authorized security management. It supports the installation of internal and external dual card readers, and can control 2 doors in a “anti-following” manner.
Integration: The NEXWATCH system can be set to close or open the doors of the corresponding area or all areas at will, and can be linked with closed-circuit television monitoring systems, fire alarm systems, equipment monitoring automation systems, etc.
Distributed control logic database: One of the unique functions of the STAR system is a complete distributed database. All the card, time zone, relay control and alarm input monitoring data are stored in the memory of the relevant STARI controller. This operation It is completely independent from the influence of the communication circuit and the computer, so that the system has high reliability.
Large capacity: The controller can store 50,000 card data, 120 permission settings, and 1,000 offline access records; it provides 16 inputs and 4 relay outputs, which can be expanded to a maximum of 255 outputs and 96 outputs through the RS485 interface. It is convenient to connect front-end equipment such as electric locks and alarm detectors, and the memory can be expanded. There is a linkage function between input and output, that is, they can be triggered between each other. The door sensor of the access control point, the door open button, and the alarm device are all connected to the controller or the extended I/O module as the input.
Time zone control: 128 programmable time zones, each time zone can be defined “start time”, “end time” and effective days of the week, used to control access, elevator control, bypass alarm input, multiple time zones Can be connected to suit different system requirements.
Holiday scheduling: 30 holidays can be pre-arranged, all usual functions are automatically blocked during holidays, and holiday procedures are automatically executed. Cardholders can only enter and exit the protected area through specific channels and within specific time zones.
System report: STAR can provide detailed system status report, such as user card report card number, user name, time zone, the status of the door that can be passed; time zone report includes the start and end time report of each time; alarm point report includes The alarm point status of each control box, all normal and illegal operations are recorded and so on.
Auxiliary 232 communication port: An auxiliary RS232 port and a main RS232 port are added. The auxiliary port can be used for on-site debugging and maintenance of portable computers, and the main port can be used to connect communication equipment for remote communication.
System control: Control the opening/closing of electric locks at all access points, implement authorized safety management, and report the status of each door to the management staff in real time.
System setting and management: Through the pre-programmed setting of the management computer, the system can authorize the validity of the cardholder’s pass card, and set the effective use time and range of the card.
Access control: The system automatically recognizes the identity of entering and exiting personnel to prevent outsiders from breaking in.
Anti-reverse transmission function: It can force all people to swipe their cards when entering and exiting (two-way swipe cards are required) to prevent trailing others from entering or leaving, which can enhance the security of the access control system.
Personnel verification: All personnel can individually set their access control levels to control the area and time that can be entered and exited.
Alarm handling: The system can detect abnormal door opening and has an alarm function. If someone opens the door illegally (destroyed), or “applies” a low-level card to try to sneak into the office of an important department to commit a crime, the access control host immediately transmits the police information to the control center computer and prompts the location of the crime, and records it at the same time. High-level alarms are processed first, and topographic maps can be used in the computer to monitor alarms.
Map control operation: All hardware devices, including doors, card readers, controllers, etc., can be directly operated on the topographic map for operation control and status monitoring.
Data records and reports: All operator operations, system events and card reading events uploaded by the controller, etc., are stored in the database in detail. These event records can be classified into categories and based on the date and time that occurred, forming reports for viewing, printing, and output.
Special cardholder location search and tracking function: cardholder statistics in any area (such as a certain floor), and accurate on-site personnel information can be provided in an emergency.
Card-making function: The card can be made into a work permit, pass, VIP card, temporary card, etc., and different authorizations can be performed on different cards. If the work permit can be used for a long time, the temporary card will automatically become invalid after several or several days of use. If the card is lost, it can be deleted in the database; the used card can also be re-authorized to other people.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare