SITE SEARCH

Access control system is ... Access control system

Access control system (ACS) -it is an indispensable element of an integrated security system and an integral part of a modern office, such as an electronic document management system or air-conditioning system.

scud this
And this is completely justified, since it allowscontrol incoming and outgoing people, which effectively protects the object from entering its territory of undesirable persons. It allows to distinguish the passage of visitors and employees to the responsible premises of the enterprise.

It is often integrated into a common systemsecurity, and it interacts with video surveillance or burglar alarm. Also, the advanced ACS carries a system for the recording of working hours. This allows you to control the time of arrival of employees and their care. What can not but increase discipline in the enterprise.

The main elements of the access control system

Manufacturers, producing ACS equipment,great variety. However, its basic elements are unchanged: the control controller, the identifier reader and the personal identifiers themselves, the blocking device and the negotiation device.

Personal identifier (card, various tokens, charms)

scant system
Issued to each employee and serves as a pass,so that he could get to the territory of the enterprise. Each card contains a unique code that is extracted when it contacts the reader. Then the personal code is analyzed by the ACS controller. And if it meets the admission criteria, the automatic signal goes to the blocking device, the door opens, the barrier is lifted, the turnstile is unlocked. The communication protocols of the personal identifier and the reader may vary, and the design organization must take this into account. In Russia, the protocols Mifare, Em-marine became widespread.

Reader

Responsible for retrieving information from the code carrierand transferring it to the controller. The choice of the reader, in addition to technical parameters, is also determined by the interior of the room where the installation will be performed.

Controller

setting scant
The main element of the ACS. This is the component, the performance and reliability of which will greatly affect the entire further operation of the system. If the task is to find a controller that does not work in conjunction with a computer, then you should pay attention to such characteristics:

  • Number of adjustable events.
  • Presence of internal clocks.
  • Maximum number of users.
  • Support for programmable rules, etc.

Matching device

It connects the controller (or several) to the server or office computer. Sometimes this device is built into the access controller.

Lock device

Locks, electromagnetic and electromechanical, turnstiles, barriers, locks, wickets. The choice of the device for blocking is based on the specific requirements and nature of the object.

The principle of the ACS

access control system
This system has different configurations. The simplest one is designed for one entrance door, serious ones are able to control access to banks, factories and large enterprises. A regular intercom is an example of a simple ACS.

Access control is carried out according to thisprinciple. At the entrance organization, at the entrance to the closed rooms, an access control device is mounted on the office door: an electromagnetic lock, a turnstile or other and a reader. These devices are connected to the controller. He receives and processes information received from personal identifiers, and manages executive devices.

Each employee has a personalan identifier, which is a contactless access card of a different type. In order to enter the territory of the enterprise, the employee must bring his card to the reader, and he will pass the code along the chain described earlier. The controller can be programmed to access at certain time intervals (from 8.00 to 17.00) or to pass employees to designated rooms. It can also connect security sensors.

access control system
All events about movements through checkpointsare fixed in the ACS memory. This will further enable us to use this data to analyze the use of working time by workers and receive reports on labor discipline. Such information will also help with official investigations.

The installation of the access control system will help to control the incoming vehicles. In this case, the driver should show his personal identifier at the entrance to open the barrier.

Types of ACS

Conditionally they can be divided into autonomous systems and network.

Autonomous are great for small offices andsmall buildings. They are not connected to the computer, and control is performed using master cards or jumpers on the controller itself. At large and medium-sized protected facilities, this type of ACS is rarely used. An exception is the control over remote premises, or as a backup system. An independent ACS system is installed on the central doors and / or on emergency exits.

When implementing such a system, doors with a throughputthe capacity of about a thousand people is equipped with a code lock or a reader, maybe a turnstile or a barrier. In a modest office with a single door, everything can be limited to an autonomous controller connected to an electromechanical (electromagnetic) lock and combined with a reader

Network Access Control Systems The ACS has one or morecomputers as control elements. It is the PC that monitors what is happening on the site and manages their parameters. This construction is much more flexible and functional. It is network access control systems that are very popular on objects of any complexity. And integration with security and video systems allows for comprehensive protection without additional costs.

Connecting several computers at large facilities is due to the fact that one of them may fail. This ensures continuity of work.

The network access control system with a database allowsoutput detailed statistics on a specific identifier and its movement on a protected object. You can see what access rights each employee has.

scant equipment
The main features of the access control system are access control and management

The main function. It allows you to separate the access rights of employees and deny access to undesirable persons. It is possible to organize remote control of devices for blocking. You can prohibit employees from going on weekends and holidays to the company, as well as after a shift.

Collection and issuance of statistics

Collection of information system of control and managementaccess leads continuously. Who through what point has passed and how many times. For each employee, you can get information: time of arrival / departure, attempts to access restricted areas and premises, attempts to pass through a forbidden time. It is possible to track how an employee moves through the territory when ACS readers pass. All identified disciplinary violations can be entered in the personal file of the employee, and the leadership of the offender will be informed properly.

Access of employees only with electronic passes

scab readers
The worker, passing through the checkpoint,identifies itself with a card, and on the screen of the security monitor, information about the employee and a photograph can be displayed. This will eliminate the possibility of penetrating someone else's identifier. In the ACS reaction rules, you can block the repeated entry through the checkpoint to the enterprise on one access card for a short period of time.

Accounting of working hours

ACS allows you to keep track of working hours,based on the marks of the arrival and departure of people from their workplace. As a result, you can calculate the total working time of the employee, taking into account "breaks", lunches, etc. And at the beginning of the working day, she can create a report on employees who did not pass the control point at the specified time, which will identify latecomers who did not go to work. By analogy, you can create a report at the end of the work shift.

Autonomy of the system

Equipped with uninterrupted power supply, ACS is notwill cease to operate under a centralized power outage. In addition, thanks to the functionality of the controller, it can continue to work even when the control computer is stopped.

Real-Time Protection

Access Control Systemprovides an opportunity to shoot and place certain rooms under protection. And you can receive real-time information about emergency situations through an organized notification system through responsible persons. And also alarm events are fixed in the database, which will allow you to view this information later.

setting scant

The security guard, thanks to the access control system,can, without leaving the workplace, manage turnstiles and doors, give alarm signals. It is enough to place floor plans of the building and layout of control points in his computer.

Control via the Internet or from a mobile phone

When connecting the ACS to the worldwide network, the administration can remotely control the system and monitor its operation.

Integration with other systems

Fire, burglar alarm, video surveillanceperfectly integrated with ACS. Integration with video surveillance provides visual control over the protected area. And it allows us to identify in the shortest possible time, if possible, identify and block the offender.

Combination with burglar alarm allowsset up a joint response to unauthorized penetration. So you can force the siren to fire in the office, light an alarm lamp, or simply block the doors in the right part of the plant.

Integration with fire alarm is vital. This will automatically unlock all control points in case of fire. That will significantly simplify the evacuation of workers in a critical period.

A few words about designing

When designing an ACS project first of allIt is necessary to take into account the imposed restrictions on the number of card-passes. The number of the latter should be calculated taking into account the growth of the company, otherwise you can find yourself in a situation where the number of employees reaches the maximum value for the system and will have to be changed to a more capacious one. The optimal solution for the design is the installation of a modular system that allows for upgrading or expansion. If the budget is limited, it will be useful to consider the possibility of integrating access control systems with other systems responsible for security. The advantages of such a combination were described above. Clear those. the task will help the designers to create exactly such a system that the customer needs. A well-designed project, in turn, will greatly facilitate the work of the installation organization. And it's better when one firm is engaged in design and installation. She can take the service in the future.

</ p>
  • Rating: