Inductive IC card office access control attendance card management system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

 1. System overview

  With the vigorous development of high technology, intelligent management has entered people’s social life. Intelligent buildings have emerged to meet the needs of the information age. As buildings and office environments used across the centuries, they must be functional. Meet current and future development needs and become a base for cultural and economic development.

The inductive IC card access management control system (referred to as the access control system) has multiple functions such as door access control, real-time monitoring, and security and anti-theft alarm. It mainly facilitates the access of internal employees and prevents outsiders from entering and exiting at will, which facilitates internal management. It also enhances the internal security, thereby providing users with an efficient and economical working environment.

It has realized communication automation (CA), office automation (OA) and management automation (BA) in function. It is based on integrated wiring system and computer network as a bridge to fully realize the integrated management of communication system and office automation system.

As an advanced high-tech technical prevention and management method, the access control system has been widely used in scientific research, industry, museums, hotels, shopping malls, medical surveillance, banks, prisons, etc. in some economically developed countries and regions, especially because of the system itself It has the characteristics of concealment and timeliness, and it is more and more widely used in many fields.

2. Design principles

Due to the need for security and high-efficiency management, the design of the access control system should follow the following principles:

  Practicality of the system
The function of the access control system should meet actual needs, not flashy. If one-sided pursuit of the advancement of the system will inevitably result in excessive investment and deviate too far from actual needs. Therefore, the practicability of the system is the first principle that should be followed. At the same time, the system’s front-end products and system software have good learnability and operability. Especially the operability (convenience), so that managers with basic computer operation level can master the operation essentials of the system through simple training, and reach the level of operation that can complete the duty task.
  System stability
Since the access control system is an uninterrupted and long-term work system and is closely related to our normal life and work, the stability of the system is particularly important. The product system is required to have more than five years of successful application experience in the market, with a corresponding customer base and customer service system.

 System security
While all the equipment and accessories in the access control system operate safely and reliably, they should also comply with relevant Chinese or international safety standards, and can work effectively in non-ideal environments. The powerful real-time monitoring function and linkage alarm function fully guarantee the safety of the user’s environment.

  System scalability
The technology of the access control system continues to develop, and the needs of users are also changing. Therefore, the design and implementation of the access control system should take into account the actual needs of future expansion, that is: it can flexibly increase, decrease or update each subsystem to meet the needs of different periods of time. Need to maintain a leading position for a long time and become a model of intelligent buildings. When the system is designed, a reasonable configuration is made for the functions that need to be realized, and this configuration can be changed, even after the completion of the project, the change of this configuration is possible and convenient. The system software will be upgraded and perfected according to the market demand of the developers in different historical periods, and the software will be upgraded for the corresponding application customers. At the same time, it can be extended to all-in-one card projects such as the attendance system, conference sign-in system, patrol management system, and dining management system.

Easy maintenance of the system
The maintenance of the access control system during operation should be as simple and easy as possible. The operation of the system is truly to the extent that it can work when the power is turned on, and it can be operated when it is plugged in. And there is no need to use too many dedicated maintenance tools during the maintenance process. From the configuration of the computer to the configuration of the system, the configuration of the front-end equipment has fully considered the reliability of the system. And implemented the corresponding certification. While achieving the lowest system failure rate, we also take into account that even when problems occur due to unexpected reasons, we ensure the convenient storage and rapid recovery of data, and ensure that the channel can be opened quickly in an emergency. The maintenance of the entire system is online, and the normal operation of all equipment will not be stopped due to the maintenance of some equipment.

Advanced
Under the premise of ensuring stability, practicality and convenience, access control products should have a certain degree of advancement to ensure that they will not be eliminated in the next few years, and can meet the requirements and needs of access control in use.

3. The basic components, functional principle, topology and configuration of the access control system

3.1 The basic components of an access control system

Card reader: Recognize the built-in encrypted card number of the proximity card through the principle of radio frequency induction.

Proximity card: Store the user’s ID number that cannot be copied and decrypted.

Access control controller: Stores the access card permissions and card swiping records, and centrally processes all card readers uploading signals, is responsible for coordinating with computer communication and other data storage, and is an intelligent processing center that cooperates with management software.

Electric lock: electric actuator.

485/232 signal converter: network and remote communication for all data storage.

Management software: Centrally manage and monitor all units through a computer, and perform corresponding clock, authorization, and statistical management.

Open button: Go out can be set to press the button to go out.

Power supply: Provides power supply for system operation power and execution structure of electric lock.

3.2 Schematic diagram of the functional principle of the access control system

3.3 Schematic diagram of access control system networking and wiring topology

3.31 Topology diagram of access control system in RS485 communication mode
It is suitable for access control systems where the company’s office locations are relatively concentrated and cost-effectiveness is the priority.

12

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare