Access Control System Principles and Technology

Luna Ting
 


Visitors: 117
 1 vote

Access control system, also known as entrance exit control system, it is a intelligent control system used to manage the entering or leaving of personals and goods. There are some common access control systems, such as: the use of password authentication accepted access control systems, non-contact IC card reader authentication access control system, fingerprint, iris, palm-type finger vein biometric access control systems in general.

Introduction:
Entrance access control security management system is a new modern safety management system, which combines computer automatic identification technology and modern safety measures as a whole, it involves a lot of new technology in electronics, machinery, optics, computer technology, communications technology, biotechnology and so on. It is an effective measure to solve the important sectors entrance implement security management. For a variety of confidential sectors, such as banks, hotels, server rooms, armory, confidential room, office, intelligence community, factories and so on.

The hardware can be divided into:

  • Multifunction Scanner: get laboratory personnel’s palm information and transfer to the host.
  • Host: Accept palm information that transmitted from the multifunction scanner and judgment to the controller orders and accepting controller information.
  • Controller: receiving orders from the host, and executed.
  • Motor: command execution controller, drive gear movement.
  • Transmission: transmitting motion between the motor and the door.
  • Sensor: human through induction.
  • Alarm system: alarm when illegally entering the laboratory experiments.

In the rapid development of digital technology and network technology today, access technology also has been rapid development. Access control system goes beyond the mere doorway and key management, it has evolved into a complete access control system. It plays a huge role in a safe working environment, personnel attendance management and other administrative work.
Increase in the corresponding auxiliary equipment on the basis of the system can be elevator control, vehicle access control, property fire control, security patrol management, catering management fees, a truly regional smart card management.

Access Control System Principles

System functions:
Palm-type fingerprint iris biometric access control system is of high security, but the cost is high, due to the rejection rate and storage capacity for applications bottlenecks, it have not been widely accepted by the market. Now the most popular and common is non-contact IC card access control system. Non-contact IC card system is become into the mainstream because of its high safety, convenience and the best cost performance.
Applicability:
Functions of access control system should meet the actual needs, not flashy. If one-sided pursuit of system of advanced, certainly will cause excessive investment, from the actual need to drift too far. Therefore, the system's utility is the first principle to be followed. At the same time, the front-end systems and system software products need have good learnability and operability. Especially operability (convenience), so with the primary computer operating level management personnel, by simple training can master the system operating essentials, to be able to complete the task on duty operating level.
Stability:
The access control system is an ongoing long-term work system, and are closely related to our normal life and work, so the stability of the system is very important. System requirements for the product to have a mature market success application experience, with the right customer base and customer service system.
Safety:
Access control system, all equipment and accessories in a safe and reliable operation performance, but also in line with the relevant international safety standards, and to work effectively in a non-ideal environment. Powerful real-time monitoring and alarm linkage function to provide fully guarantee the safety of the user environment.
Scalability:
Access Control System technology continues to move forward, the user needs are changing, so the design and implementation of access control systems should take into account the actual needs of the future can be extended, such as: flexibility decrease or update the various subsystems, to meet the different periods the need to maintain the leading position for a long time, become a model of intelligent building. When design the system, need to achieve rational allocation of functions, and this configuration can be changed, even after the project is completed, the configuration changes are possible and convenient. The corresponding system software upgrade and improve developer according to different historical periods in line with market demand, and the software upgrade to the appropriate application client. At the same time, it can be extended to time and attendance system, meeting attendance system, patrol management system, dining card management system project.
Easy maintenance:
Access control system maintenance should try to make it simple during operation. Operation of the system can be truly open electrical work, be able to run the plug level. And maintenance without the use of excessive special maintenance tools. From the configuration of the computer to the system configuration, the front-end configuration of the device are fully deliberated system reliability. And implementation of appropriate certification. We achieve the lowest failure rate of the system, but also because even when considering an unexpected problem occurs reasons to ensure easy and fast recovery of data stored, and to ensure emergency can quickly open the channel. Maintenance of the entire system is on-line, and does not maintain the part of the device, stop normal operation of all equipment.
Advanced:
In ensuring the stability, practicality and convenience of the premise, access control products should have a certain advancements , to ensure that will not be eliminated in the next few years and meet the access and use of the requirements and needs.

About Syncotek:
Syncotek is one card reader manufacturer in China, you can find many different types of card readers such as swipe card reader, card reader writer, RFID reader, thermal printer. The products canbe widely deployed in industries of finance, mobile-payment, telecommunication, logistics, custom, insurance, transportation and government business.

(1065)

Article Source:


 
Rate this Article: 
 
CDMA (Code Division Multiple Access) Technology
Rated 2.0 / 5
based on 1 vote
ArticleSlash

Related Articles:

Use of control access system

by: Henry J Williams (August 11, 2011) 
(Business/Customer Service)

What is Access Control System

by: Luna Ting (March 10, 2016) 
(Computers and Technology/Software)

Automatic Control of Driveway With Access Control Systems

by: Mirjan Stojanovic (September 21, 2011) 
(Computers and Technology)

Access Control Cards: Why Are They So Useful?

by: Lisa Seguin (May 23, 2011) 
(Shopping and Product Reviews/Electronics)

The Interest in Access Control Security

by: Y. Tilden (June 26, 2008) 
(Internet and Businesses Online/Security)

Electronic Access Control Systems

by: Jenny Pilley (August 30, 2011) 
(Business/Workplace Safety)

Access Control With DRM Software

by: Alice Pierce (August 22, 2008) 
(Computers and Technology/Software)

Uses of Access Control and Security Fencing

by: Jenny Pilley (January 13, 2012) 
(Business/Workplace Safety)

Concepts of Access Control Systems

by: Jeff Paul (August 07, 2008) 
(Internet and Businesses Online/Security)

CDMA (Code Division Multiple Access) Technology

by: Praise Paul (November 30, 2005) 
(Computers and Technology/Mobile Computing)