Access Control Intercept "Demons and Ghosts"
The access control system, monitoring system, and alarm system are the three most important components of the security system, but the monitoring and alarm systems are passive security systems, that is, after the fact, the access control system is active defense, rejecting all unsafe factors. Outside the door, the security problem is fundamentally solved. With the application of monitoring and alarm systems, it becomes the perfect security iron triangle. With the rapid development of digital technology and network technology today, the access control system has long surpassed simple doorway and key management, and has gradually developed into a complete access management system, which plays a huge role in administrative management work such as working environment safety, personnel attendance management, etc. effect.
Compared with monitoring systems and anti-theft alarm systems, although access control systems have been developed in our country for more than 20 years, they have entered the Chinese market relatively late. Because it can effectively solve the problem of access safety management in important places, it is widely used in government departments, financial industries, smart communities, factories, commercial buildings, hospitals, hotels, etc. In addition, people’s awareness of safety protection continues to increase and they rely on access control systems. Gradually increasing, its market share is also increasing.
The access control system integrates technologies such as computers, communications, biometrics, and mechanical engineering, in line with the intelligent development trend of today's security industry. However, in the field of access control systems, due to differences in technology and their own development positioning, foreign brands are "doing a blessing" in the high-end market, while domestic brands can only work in the low-end market, causing domestic access control companies to "complain." Therefore, to break through the dilemma, access control companies must continue to work hard on technological innovation, and smart access control came into being.
Smart access control function
The intelligent access control system is a new modern security management system. It integrates microcomputer automatic identification technology and modern security management measures. It involves many new technologies such as electronics, machinery, optics, computer technology, communication technology, biotechnology, etc. It is a solution to the realization of the entrance and exit of important departments. Effective measures for security management are applicable to various confidential departments, such as banks, hotels, computer rooms, armory, confidential rooms, office rooms, intelligent communities, factories, etc. In addition to the basic functions of traditional access control systems, it also has the following special functions:
Network anti-theft alarm function: The system is equipped with a large number of alarm input and output ports, which can simultaneously receive from fire probes, infrared detectors, smoke detectors, gas detectors, emergency button switches, etc., with infrared anti-theft that can automatically arm and disarm Alarm function. When the system detects an abnormal door opening, it has an alarm function. If someone opens the door illegally (destroyed), or "applies" a low-level card to try to sneak into an important place, the access controller immediately transmits the alarm to the control center computer and prompts the location of the crime, and records it at the same time.
When an alarm (input) occurs, on the one hand, the system saves all relevant information in the controller and automatically triggers the corresponding alarm to send out an audible and visual alarm signal; on the other hand, the system reports relevant information to the management center in real-time. Analysis and processing. At the same time, relevant personnel can be notified via e-mail or SMS (personalized).
Fire linkage function: More detailed planning can be made for all controlled points defined as fire doors. When the access control equipment is installed in multiple or even multiple buildings, each building has its own relatively independent fire door area. In the software, the fire doors can be organized into different groups according to different buildings and floor functions, and the corresponding trigger source can be bound to each group of fire doors. In the event of an emergency, each grouped fire door will be automatically opened according to the trigger source to help personnel escape quickly.
Equipment timing control function: The system can perform timing switches, start and stop operations on lighting, central air conditioning, fans, pumps, motors, and other equipment.
DVR integrated linkage function: The access control controller can realize linkage with the DVR through the TCP/IP interface to capture the door opening picture. There is a DVR integrated module in the software, which can directly transfer the DVR image data associated with the designated access control device for the access control manager to view. Our model is ACB-W1 ACB-W2 ACB-W4 network access control with management software.
Electronic map real-time monitoring function: The system management software integrates the electronic map function. The icons of all access control devices are dynamic. For example, if a door in access control is normally opened, the icon on the map representing the corresponding door will change from closed to open. And when the state of the door is detected as an abnormal state, an indication will also appear when the state is damaged by means such as trimming, short circuit, parallel connection, and series connection.
Remote management function: The system can authorize relevant personnel to enable them to remotely open or close the relevant passages (doors) in the management center, and the vault administrator needs to pass identity authentication when entering or exiting the vault during abnormal working hours. Treasury administrator + monitoring center guardian dual authentication. At the same time, when the remote management mode is adopted, the management center can manage all hardware controllers, while the workstation can only manage the controllers in the area to which it belongs.
Author: Written by Ms Vivian He from S4A INDUSTRIAL CO.,LIMITED
Factory Address:Building S4A, South Third Lane, Qiuyuling Street, Zhangkeng Village, Hengli Town, Dongguan City, Guangdong Province Office Address:#601,floor 6 ,building 1,JINFANGHUA industrial zone, Bantian St. Longgang Dist. Shenzhen, PRC.
If you are interested in our products and want to know more details,please leave a message here,we will reply you as soon as we can.