1. The basic composition of the access control system
The access control system is composed of an access control controller, a card reader, an exit button, a lock, a communication converter smart card, and a power management software.
Smart card: The role in the smart access control system is to act as a medium for writing and reading data.
Controller: It is the core of the whole system, responsible for the input, processing, storage and output of information data of the whole system, and the communication mode between the controller and the card reader
Lock: It is the execution part in the whole system. There are currently three categories: electric locks, magnetic locks, and electric mortise locks. According to the user's requirements and the material of the door, the electric lock is generally used for wooden doors, the magnetic lock is used for metal doors and wooden doors, and the electric mortise lock is relatively widely used, and doors of various materials can be used. As an executive component, the stability and durability of the lock are very important.
Power supply: The power supply equipment is a very important part of the whole system. If the power supply is improperly selected and there is a problem, the whole system will be paralyzed or various failures will occur, but many users tend to ignore the importance of the power supply. Access control systems generally use a relatively stable linear power supply.
Management software: responsible for the monitoring, management and query of the entire system. Management personnel can monitor and manage the status of the entire system and the working conditions of the controller through the management software, and can be extended to complete functions such as patrolling, attendance, and parking lot management.
2. What are the types of access control systems?
As the name suggests, the access control system is a system for controlling the entrance and exit passages. It is developed on the basis of traditional door locks. Common access control systems include: password identification access control system, card recognition access control system, biometric access control system, etc.
Password identification access control system
Access authority is identified by checking whether the password entered is correct. These products are further divided into two categories, one is the common type, and the other is the random keyboard type (numbers on the keyboard are not fixed and change automatically from time to time). The advantage of password identification is that it is easy to operate, no need to carry a card, and the cost is low. The disadvantage is that the safety is poor and it is easy to leak, it can only be controlled in one direction, there is no record of opening the door, and the buttons are easy to be damaged and malfunction.
Swipe card identification access control system
According to the type of card, it can be divided into contact card access control system (magnetic stripe card, barcode card) and contactless card (also called induction card, radio frequency card) access control system. Contact products are easy to wear and tear, easy to copy information, and easy to be invalidated by external magnetic field interference for contact products. There are few usage scenarios, and they are generally only used in occasions related to bank cards (magnetic stripe cards). Contactless cards have the advantages of convenient use, strong durability, fast reading speed, and high security.
Biometric Access Control System
Identification of entry and exit by means of inspection of personnel's biometrics. There are fingerprint type, palm type, iris type, facial recognition type, finger vein type and so on. Its advantages are that it will not be lost, will not be stolen, has no burden of remembering passwords, and is safe and convenient. However, at present, the stability and accuracy of biometric identification are still being further improved, and the product price is also higher than the previous two types, and the applicable scenarios also have certain limitations.
In recent years, new forms of access control systems such as QR codes, Bluetooth, and WIFI have emerged. After the resident has verified their identity through the mobile APP, they can use the mobile APP to open the door near the access control machine. At the same time, the resident can also generate a QR code picture that authorizes the visitor to open the door, and share it with the visitor. The visitor's QR code has time and the number of times to open the door. .
After more than 20 years of development, the access control system has gradually become a complete access management system. With the continuous development of the security industry, traditional password identification and card identification have been difficult to meet market demand. The development and rise of the Internet of Things, cloud computing, and smart mobile devices have prompted companies to develop new products and new technologies to gain greater market space. and product profitability.
3. Installation and use of access control system
1. Basic configuration
The configuration of the simplest non-networked access control system includes: an access control machine, a 12V power supply, an exit button, and an electric lock The configuration of the simplest networked access control system includes: an access control controller, and a 12V power supply , an exit button, an electric lock, a card reader, and a 485 communication converter.
as the picture shows:
2. It is recommended to install and debug the process
(1) Install the controller host, turn on the power, short-circuit the exit button, and observe the action of the relay and the status change of the relay unlock indicator.
(2) Connect the 485 communication, install the software, add the controller in the software, and pay attention to fill in the correct serial number.
(3) Open the debugging interface to observe the communication situation.
(4) Observe whether the communication is normal. After the communication, use the software to open and close the door, whether it is successful.
(5) Install a card reader to check whether the card swiping operation has correct records.
(6) Add users, issue cards, authorize operations, download cards to the controller, and swipe the card to observe whether the records are normal.
(7) Install the connecting wire connecting the lock to the lock, and observe whether the record and the lock are normal after swiping the card.
(8) Install other auxiliary equipment such as buttons, etc.
3. Construction wiring specifications and precautions of access control system
The cable from the card reader to the controller: It is recommended to use 8-core shielded multi-strand twisted-pair network cables, and the data cables are mutually twisted pairs. The longest length cannot exceed 100 meters. The shielded wire is connected to the GND of the controller.
Wire from the button to the controller: It is recommended to use a two-core wire with a diameter of more than 0.3 square millimeters.
Wire from the electric lock to the controller: It is recommended to use a two-core power cord with a diameter of more than 1.0 square millimeters. If it exceeds 50 meters, consider using thicker wires or multi-strands in parallel, or increase the output voltage to about 14V through the fine-tuning button of the power supply. The longest should not exceed 100 meters, generally controlled within 60 meters.
The wire from the door sensor to the controller: It is recommended to choose a two-core wire with a diameter of more than 0.3 square millimeters. If you don’t need to know the switch status of the door online or don’t need the alarm function of the door not being closed for a long time and the alarm function of illegal intrusion, the door sensor wire can not be connected. .
Between the controller and the controller: as well as the cable from the controller to the converter, it is recommended to use an 8-core shielded twisted-pair network cable. The length of the 485 bus can theoretically reach 1200 meters. It is recommended not to exceed 800 meters according to the number of controllers or the complexity of the communication environment. If more than 485HUB or repeater to improve the communication environment.
Author:Written by Ms.Rebecca Fu from S4A INDUSTRIAL CO.,LIMITED
Factory Address:Building S4A, South Third Lane, Qiuyuling Street, Zhangkeng Village, Hengli Town, Dongguan City, Guangdong Province Office Address:#601,floor 6 ,building 1,JINFANGHUA industrial zone, Bantian St. Longgang Dist. Shenzhen, PRC.
If you are interested in our products and want to know more details,please leave a message here,we will reply you as soon as we can.