A Judicious Integration Project: Integrating Security Systems Requires Careful Planning and Testing.

WHO'S IN CHARGE. A system integration project is a complex

undertaking that requires considerable coordination in both the planning

and execution stages. To ensure that all the parties work together, the

organization should form a committee comprising representatives from all

aspects of the project, including the architect, contractors, the

security consultant, integrators, facility managers, and those

ultimately responsible for security in the completed facility. This

committee should be led by the security director.

SYSTEM INTEGRATION holds the promise of offering companies a way to

get the most from their security equipment, but planning and installing

an effective integrated system is not a simple process. Having consulted

with clients on numerous integration projects, we have learned a number

of dos and don'ts. To illustrate these lessons, we'll use the

example of a newly built facility that we'll call Southwest

Courthouse, an eight-story, 24-courtroom, 272,000-square-foot facility

that opened in late 2001. The building's security measures include

64 CCTV cameras, no card readers, and dozens of glass-break sensors, all

of which had to be made to work together. The lessons learned can be

divided into six key categories: who's in charge, sequence of

operation, wiring and fiber connections, documentation, commissioning,

and operator training.

To determine what the organization wants its integrated security

system to do, the security director can have the committee go through a

brainstorming session to create a matrix of likely threat scenarios.

Committee members can then agree on how the system should respond in

each case. The matrix can serve as a template for the installation and

configuration of the system, including the sequence of operations (more

on this in the following section).

Similarly, the organization must decide who, among the contractors,

will take the lead during installation. The integrated building

environment management control systems contractor is often a logical

choice. That person can work closely with an "owner's engineer

appointed by the owner to keep the technical aspects of the installation

on track and to specify rigorous testing requirements.

At the courthouse, no lead contractor was designated. The same

electrical contractor installed the wiring for both the IT and security

system networks. This contractor worked alongside the integrated

building environment management control systems contractor. However, the

electrical contractor worked directly for the owner (in this case, the

public authority), while the other contractors were subcontractors hired

by the general contractor.

As a result of that arrangement, some ditches occurred. While they

were discovered and fixed during the testing process, the project would

have taken less time and been completed more efficiently if there had

been one contractor designated as the project leader or configuration

manager and given ultimate responsibility for ensuring that wiring

connected the right components, that connections fit system requirements and functioned properly, and that the documentation matched the work

done (more on wiring and documentation later.)

Sequence of operation. One of the biggest roadblocks to creating an

effective integrated security system at the courthouse arose because

there was no agreement before the devices were installed on how the

different components of the security system should interact during

different alarm scenarios.

This is the type of issue that should have been addressed by the

coordinating committee.

For example, the courthouse has a fire alarm system, a card access

control system, and cameras monitoring the doors, all of which must work

together in a specific sequence when an alarm activates. Ideally, when

an alarm is triggered, the cameras should begin recording and the fire

system should deactivate the access control system so that people can

get out of the building. Similarly, in a theft scenario, if someone on

the second floor of the courthouse grabs a laptop computer, runs down a

stairwell, and pushes the panic bar to open the door at the foot of the

stairs, the camera monitoring that door should record the theft.

However, that initially didn't happen in the courthouse because

that particular scenario had not been considered and the appropriate

sequence of operation had not been programmed into the system. The

cameras were not set up to activate. Had this scenario been considered

in advance, alternative sequences of operations could have been in

place; ultimately, the problem was solved by having th e cameras trained

on the doors record whenever the doors opened.

Another example at the courthouse involved the turnstiles that

control access to certain parts of the building. In the event of a bomb

scare, which is announced through the alarm system, the alarm system

must "talk" to the turnstile access control system and

deactivate it to release the turnstiles so that occupants can exit

quickly. However, this option was not programmed into the system when

the courthouse first opened, and the oversight was discovered and

repaired only when on-site testing began. Going back to fix such

problems is more difficult and time consuming once the building is open.

Wiring and fiber. While some security system manufacturers tout the

idea of being fully IT compatible, the use of an existing IT network for

security system data communications has some pitfalls. There are some

data security and system performance ramifications implicit in this

approach that must be considered. For example, typical IT networks are

normally not designed to accommodate the large amount of data inherent

in a video system, particularly if high-frame-rate data is required. In

addition, security systems typically cannot tolerate planned network

maintenance outages, and allowing alarm signals to travel across a

network run by another department creates greater exposure for the

security system.

Another concern is that network staff charged with overseeing the

transmission of security data may be focused primarily on IT concerns,

not physical security issues. Giving these additional personnel access

to alarm data and the ability to alter card access rights may also

compromise security.

The integrators at Southwest Courthouse avoided this issue by

creating a separate data network that links the card-key access system

and CCTV cameras across an Ethernet network using Cat-5 wiring, a type

of highspeed network cabling. This network is monitored and administered

by a dedicated staff in the security command center.

Documentation. Ideally, the same person will serve as the project

manager throughout the project, from planning and design through

construction. But since that period can last as long as four years for a

large facility such as the courthouse, turnover may be unavoidable.

Adequate documentation is vital to ensure a smooth transition and proper

completion of the project under a new manager.

Unfortunately, because there was no one contractor with overall

responsibility for the installation and testing of the courthouse

systems, some of the documentation-particularly the documentation about

the cabling-was incomplete. This led to problems after the project was

completed. For example, a contractor was called in to do some

troubleshooting. When he adjusted one part of the cabling to fix a

problem with a panic button, he inadvertently damaged another part of

the cable affecting a card reader connection, because there was no clear

record of where cables ran.

Keep it clear. A different problem can arise when documentation is

not thorough enough. Those creating the documentation must realize that

it will be used by service technicians and others who may not be

specialists. The cabling at the courthouse all leads into a network

communication room, where thousands of cables terminate in a punch-down

block. If the terminations aren't documented adequately, as was

initially the case at the courthouse, it becomes impossible for service

personnel to know which wire is connected to which glass break, for

example.

Keep it current. It is not unusual for a system to be fine-tuned as

it is installed and commissioned. The documentation should reflect these

changes and accurately reflect the final as-built conditions.

This was one area in which the courthouse project worked

particularly well. One example of how updating documentation is valuable

comes from one of the specialized components of the courthouse's

security system.

To meet special security needs for detention areas at the

courthouse, an independent Detention Control System (DCS) was installed

to integrate a range of security functions, including video cameras and

monitors, parking gates, and metal detection/x-ray stations. Initially,

the sheriff's office had requested installation of cameras in the

corridors outside the courtrooms, in the holding-cell area, and in the

parking garage. Later, when the initial plans went through a

value-engineering process to reconcile the plans with the approved

budget, some of those cameras were eliminated. Fortunately that change

was documented, because after the courthouse was occupied, certain

officials questioned why those cameras hadn't been installed, and

integrators were able to use the existing documentation to answer these

questions.

Commissioning. All systems need to be tested to ensure that the

various systems function properly both individually and together. This

process is called commissioning.

If possible, even before installation begins, integrators and

others involved in a construction project should assemble the system

components and software, either in a factory-floor acceptance test (for

smaller installations) or in a mock-up at the job site (when many

manufacturers' products are involved). The setup should be as

complete as possible, and it should then he tested against the threat

scenarios that the project committee designated as likely. This process

ensures that the system works as intended and uncovers glitches before

they can adversely affect the installation process, thus making for a

smoother installation.

Naturally, the system will need to be tested again once it's

installed-ideally before it is expected to be operational- but the

duration and complexity of installed-system tests are reduced if the

system has already been exercised in all possible modes on the factory

floor.

At the outset, the project team should document how the system

should work and the procedures that must be followed in testing to

determine whether performance objectives are being met. In the case of

the courthouse, those involved in this process included the people who

would be operating the building, the security staff, the sheriff's

staff, and the judges. The courthouse's owner, the municipality,

had to sign off on the process.

An added benefit of involving staff who will later use the system

in the planning for the tests is that they become more familiar with the

specific system configuration, giving them a head start in training to

become proficient at using the system once it is operational.

Additionally, they gain the advantage of insider knowledge.

Project planners should allow for a commissioning period before the

system goes live; they should build this time-consuming step into the

overall construction schedule, Realistically, however, as schedules get

squeezed, it isn't always possible to complete the tests before the

system goes online.

In the case of Southwest Courthouse, some testing was completed

before the building opened. Those tests revealed an incorrect line of

code that prevented the fire alarm and access control systems from

communicating, as well as a signal from the panic button on the

judge's bench that did not reach the sheriff's station. Once

these were discovered, they were quickly repaired.

But integrators were not completely satisfied with the results of

these initial tests. Therefore, commissioning continued during evening

hours after the building was occupied. Every aspect of the system was

checked three times, which took four months.

Operator training. The final--and crucial--element of a successful

integrated security system installation is adequate operator training. A

system with all the connections checked and double-checked and with all

the bugs worked out is still not going to perform the way it should if

the people operating it don't know how to get the most out of it.

The situation at Southwest Courthouse illustrates why it doesn't

always happen the way it should.

Many facilities have several different parties responsible for

security over the course of a 24-hour period--typically an in-house staff handles security during the day, and contracted security personnel

take charge overnight. This was the situation at the courthouse: The

sheriff's department had ultimate responsibility and handled

security operations during the day, while at night responsibility was

transferred to a private security force. Additionally, there were

facility operations personnel who needed to know the system well.

Task-based training. The round-the-clock operation of the

courthouse meant that there was a large pool of people involved in

security operations, working different shifts on different days. So the

first requirement for adequate operator training was to offer an

extensive schedule of training sessions, rather than a few short

sessions.

The training format is another issue. At the courthouse, the

integrators provided 40 hours of training to the various people involved

when the building opened and another 40 hours after it had been

operating for six months. However, that amount of training proved to be

insufficient, and the integrator was asked to come back for several more

training sessions.

Security managers can better ensure proper education of all staff

members by making training task based, not time based. This means that

contractors should be asked to train operators until they know what the

system is supposed to do and how to use it properly This arrangement

makes it more difficult for the contractors providing the training to

estimate how much training would be required. Therefore, a detailed

agreement is necessary to ensure that everyone involved understands the

contractor's training responsibilities.

Another consideration is where the training will take place.

Training is effective only if it takes place on the equipment that the

operators will be using, so installation of the integrated system should

be complete before training sessions start. The authors' company

trained three different staffs (the sheriff's department staff,

which operated the DCS equipment; the facilities operations staff; and

staff members of the company that provided security at night) at the

courthouse, using the same equipment they used in their jobs.

After more than a year in operation, all systems are now working

together smoothly at the courthouse, but as these examples show, a few

objections were raised before this judicious ending was reached, For

others about to embark on similar proceedings, the lessons learned here

may help their case go more smoothly.

Tom Allen is vice president of Johnson Controls Security Systems.

Derek Trimble is vice president of marketing and new product

development, security solutions, Johnson Controls, Inc.'s Controls

Group.

A Judicious Integration Project: Integrating Security Systems Requires Careful Planning and Testing. 1

HOT PRODUCTS
no data
GET IN TOUCH WITH US
no data
recommended articles
Cases
Access control system
Access control system
access control system manufacturer What is the access control system?The Access Control System(ACS) is a control system that uses modern electronic equipment and software information technology to control the entry, shuch as recording and alarming of people or things at the entrance.  It has become an effective measure to ensure the security of the area and realize intelligent management.Types of access control systemThe access control system is mainly composed of the reading part, transmission part, management/control part and execution part, and corresponding system software. There are various types of the access control system. According to its hardware composition mode, it can be divided into the integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type.1.Each component of the integrated access control system realizes all the functions of access control through internal connection, combination or integration.Each component of the split-type access control system has a structured part and a combination part in different ways. The separated part and the combined part are connected to form a system through electronic, electromechanical and other methods to realize all functions of access control.Independent control type access control system, all display / programming / management / control and other functions of its management / control part are completed in one device (entrance controller).Networked control type access control system, all display / programming / management / control functions of its management / control part are not completed in one device (entrance controller). Among them, the display/programming function is completed by another device. Data transmission between devices is achieved through wired and / or wireless data channels and network devices.The difference between the data carrier transmission control type access control system and the networked type access control system is only in the way of data transmission. The display / programming / management / control and other functions of its management / control part are not completed in one device (access controller). Among them, the display/programming work is done with other equipment. The data transmission between the devices is done through the input/export operation of the removable, readable and writable data carrier.Most important things of the access control systemCharacteristic carrier: The access control system is a system that manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legality of their access (behavior). This is to give them a mark of identity and authority through a method. We call it a feature carrier, and the identity and authority information it carries is a feature. The key to a mechanical lock is a feature carrier, and its "tooth shape" is a feature. Many feature carriers can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used at present. These feature carriers must be used with the holder (person or thing), but it does not have the same identity with the holder, which means that the feature carrier can be used by others (things). To prevent this problem, multiple methods can be adopted, that is, two or more feature carriers are used (depending on the security requirements of the system). If a unique and stable feature can be selected from the holder itself as the information for identity, this problem will not exist. Of course, the features from the "holder" are called "biological features", such as face recognition technology, and the feature carrier is, of course, the holder.Reading device: A reading device is a device that exchanges information with a characteristic carrier. It reads the information about identity and authority from the feature carrier appropriately, to identify the identity of the holder and judge the legitimacy of its behavior (access request). The feature reading device is a device that matches the feature carrier. The technical attributes of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "lock core". After the key is inserted into the lock core, the identity of the holder and the authority are confirmed by the movable marbles in the lock core and the tooth shape of the key. The identification process of an electronic reading device is: converting the read feature information into electronic data and then comparing it with the data stored in the device memory to achieve identity confirmation and authorization verification. This process is also called "feature identification ". Some feature reading devices only have the function of reading information, and some also have the function of writing information to the feature carrier. This kind of device is called a "reading and writing device". The system writes information to the feature carrier to authorize the holder. Or revise the authorization process. This feature vector can be modified and reused. The key to a mechanical lock cannot generally be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the rights they possess can be changed through system settings.The locking mechanism of the access control system: The access control system is only practical if it is coupled with an appropriate locking mechanism. After the reading device confirms the identity and authority of the holder, it is necessary to enable the legal person to enter and exit smoothly and effectively prevent the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems or different applications of access control technology. For example, the lever of a subway toll system, a car stop in a parking lot, and a banknote collection device in a self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. After the lock core matches the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.The security of the access control system includes impact resistance, which is resistant to damage by mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the lock mechanism of the access control system is also commonly used with electric control locks. Its characteristic carrier is mainly various information cards, and the opening and closing of the door are controlled by the electromagnetic force. Access control solutionApplication scenarios of access control system1.Pedestrian management for international airport and  metro station .2.Access control system for the office buildings,schools,factories etc.it can be equipped with a face recognition function.Shenzhen TGW Technology Co., Ltd is an access control system manufacturers specialize in access control system security fundamentals.To learn more about our access control system solution  CLICK HERE>>by:Shenzhen TGW Technology Co.,Ltd
TGW team building activities
TGW team building activities
TGW team building activity-world view, world view This year's epidemic came very suddenly and brought huge changes to many companies and individuals. During the epidemic, TGW was fully prepared to fight the epidemic. The employees worked together to face the coming of the crisis, united and stabilized the company's situation, actively promoted products, and entered a new level in business development.The epidemic situation has improved greatly, and the company is also entering a new stage. TGW gathered the staff and their families to participate in outdoor activities after the team had done one live broadcast after another. After the intense work, it was a relaxing trip.On August 23-24, 2020, our team drove to JIAO WEI CHANG of the famous beach in ShenzhenStaying in a homestay, barbecue, entertainment, watching the sunrise, swimming on the beach, relaxing walks and blowing the sea breeze, group dinner, very happy.Once a high-temperature person is detected, the system will not only not open the gate, but also emit a buzzer sound.Our system will also automatically send a high temperature alarm email to the exhibition manager.After this team building, the cohesion has been upgraded again.1. After this team building activity, I deeply feel the importance of the team. Everyone plays a different protagonist in the team. As long as everyone works together, there are no difficulties and problems that cannot be solved. I believe that with the joint efforts of everyone, our company will become stronger and stronger and create greater glories.2. The strength of the team is infinite. In many cases, we need to work together and cooperate. But when others are unable to help you, the most important thing is to rely on yourself and listen to your inner voice. What should I do and what should I do? Then, try to find ways to challenge yourself.3. Team building is very important for an enterprise, especially our technology-based company. The company is a large team, and the work of one department is interlocking. We want to complete a project smoothly and lack a team. Cooperation is not enough. Only when we achieve real teamwork and the members trust each other to help each other learn from each other, our work will be smoother and our future will be brighter.The company’s culture is also one of our important cultures. In addition to daily work, it has enhanced the tacit understanding and collaboration between the teams. Everyone can appreciate the company’s dedication to us. I am grateful for this sense of belonging!
access control security
access control security
access control securityby:Shenzhen TGW Technology Co.,LtdThe access control security system is a security system that is commonly used in modern commercial buildings, communities, schools, and enterprises. The access control security system is a modern security management system that integrates microcomputer automatic identification technology and modern security management measures. Access control security system is used widely in our daily life and work, but how much do you know about the installation of an access control security system? Below I will share with you the contents of the installation of an access control security system. access control security system installation 1: equipment installation 1.Front-end equipmentA. Install a card reader at the entrance. Within the reader's sensing range, do not approach or touch high frequency or strong magnetic fields (such as heavy-duty motors, monitors, etc.), and it needs to cooperate with the grounding method of the control box.B. Install the exit button at the exit.C. The electromagnetic lock is installed on the upper edge of the door and door frame.D. To ensure safety and aesthetics, the controller and power box can be installed on-site or installed in a weak current well. The advantage of installing the controller on-site is to save the use of wires. The controller is installed in the weak current well to facilitate future system maintenance and system security. The controller box can also be installed above the card reader, near the electromagnetic lock. Specific circumstances can choose the installation method according to customers. 2. Central control room equipmentA. The control host and keyboard are installed on the facade wall or placed on the workbench.B. The alarm device is placed in a position with a good alarm effect.C. Due to the special nature of the access control security system, it is required to provide good power to the system. It is recommended to use a UPS power supply to centrally supply the access control security system. access control security system installation 2: equipment debugging 1. After the system installation is completed, firstly connect a signal of the access control card reader to the host, and then separately detect the condition of the access control card reader, and whether there are any false positives or false positives. After checking this way, there is no problem in accessing the other way. In this way, each way is tested separately, and all lines are connected after confirmation. 2. The management personnel can authorize according to the authority of the users. For example, some personnel can enter and exit any place at any time. Ordinary personnel can only enter and exit the authorization scope within the authorization time with the authorization card. When all the access points are opened normally and illegally, check the computer in the control center for records. 3. Attempt that the central computer cannot be connected to the controller due to malfunction or other reasons. Can the controller independently record the relevant information of the controlled door points? After the central computer is connected, can all information be automatically uploaded and whether the information record can be guaranteed to be complete Sex. 4. Make a good record of commissioning. 5. Finally, complete the completion report. access control security system installation 3: pipeline installation 1. The installation engineering wiring shall comply with the national regulations "Code for Construction and Acceptance of Electrical Installation Engineering" and the relevant codes and regulations issued by the state. Threading in pipes or ducts should be performed after construction plastering and groundworks are completed. Before threading, the water and debris in the pipe or wire groove should be removed. Lines with different systems, different voltage levels, and different current categories should not be worn in the same pipe or the same slot in a cable trunk. There should be no joints or kinks in the wires or ducts. The connector of the wires should be soldered in the junction box or connected with terminals. Small cross-section system connections can be spliced. The number of spliced turns should be more than five turns, then tinned and wrapped with insulation tape. Compensation measures shall be taken where the pipeline passes through the deformation joints of the building (including settlement joints, expansion joints, seismic joints, etc.), and the conductors shall be fixed on both sides across the deformation joints with appropriate margin. The terminals in the terminal box should be crimped or terminal boards with solder joints. The terminals should be labeled accordingly. 2. The access controller shall be installed firmly, shall not be inclined, and shall have obvious signs. Installation on light partition walls should be strengthened. The cables or wires introduced into the access controller should be neat and avoid crossover, and the cable core wire and the part of the matched conductor should be fixed and numbered, and should not be easily discolored with the drawing; the terminal board and each terminal, wiring No more than two cables should be left; there should be no less than 20cm of cable core and conductors; the conductors should be bundled into bundles; after the lead wires of the conductors are threaded, they should be blocked at the inlet pipe. 3. The main power supply lead-in of the access controller should be directly connected to the power supply. It is strictly forbidden to use a power plug. The main power supply should be marked. The ground of the access controller is firmly grounded and marked. 4. The routing and specifications of the ground bus in the monitoring room shall meet the design requirements. The construction should comply with the following regulations: the surface of the ground bus should be complete without obvious damage and residual flux slag, copper tape bus light, slip, and no burrs, the insulation layer should not have aging cracks; the ground bus should be laid on the ground trough or cable The center of the aisle is fixed on the outside of the track groove. The bus bar should be flat and free of skew and bend. The connection of the bus bar to the rack or the top of the machine should be firm; the copper strip bus bar on the cable aisle can be fixed by screws; the copper stranded bus bar on the cable aisle should be tied to the rung; Strictly follow the design requirements. Grounding installation shall be carried out simultaneously with civil construction.More info at Wikipedia
We are in the era of face recognition access control
We are in the era of face recognition access control
access control face recognitionby:Shenzhen TGW Technology Co.,Ltd With the development of technology, the era of intelligence is approaching, and the requirements for automation are increasing. We use the access control face recognition technology to modernize building access control.modernization of management and intelligence has become a top priority in the field of building safety. For a long time, access control system have played an important role in building security, intelligence and management. At present, some smart access control systems are based on cards, fingerprints or passwords for identity authentication. These recognition methods require people to operate at close range. And that is extremely bad when the user is inconvenient to use their hand to operate, it may also cause some troubles by card losing or password forgetting. Cost issues such as copying and theft. How to make the building's intelligent channel system truly safe, intelligent, and convenient has become a problem that security companies need to overcome. In fact, the advent of the access control face recognition system is to meet people’s need of a safe and convenient modern office buildings and living places. Access control Face recognition intelligent system is a kind of biometric recognition technology use human face feature for identification. Its is not easy to be copied,and this provide the necessary premise for identification. The recognition of human faces is used as the condition for opening the gate, and it is also used as the basis for attendance. It not only eliminates the trouble of forgetting to bring a key or card, but also does not require any media to open the door, and the only thing we need to do is registering the face information; in addition, the access control face recognition intelligent system can strictly standardize employee attendance management, thereby avoiding the problems caused by low efficiency and difficult statistics.We provide effective solution for Access control Face recognition system, click here to learn more!
Access control system
Access control system
access control system manufacturer What is the access control system?The Access Control System(ACS) is a control system that uses modern electronic equipment and software information technology to control the entry, shuch as recording and alarming of people or things at the entrance.  It has become an effective measure to ensure the security of the area and realize intelligent management.Types of access control systemThe access control system is mainly composed of the reading part, transmission part, management/control part and execution part, and corresponding system software. There are various types of the access control system. According to its hardware composition mode, it can be divided into the integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type.1.Each component of the integrated access control system realizes all the functions of access control through internal connection, combination or integration.Each component of the split-type access control system has a structured part and a combination part in different ways. The separated part and the combined part are connected to form a system through electronic, electromechanical and other methods to realize all functions of access control.Independent control type access control system, all display / programming / management / control and other functions of its management / control part are completed in one device (entrance controller).Networked control type access control system, all display / programming / management / control functions of its management / control part are not completed in one device (entrance controller). Among them, the display/programming function is completed by another device. Data transmission between devices is achieved through wired and / or wireless data channels and network devices.The difference between the data carrier transmission control type access control system and the networked type access control system is only in the way of data transmission. The display / programming / management / control and other functions of its management / control part are not completed in one device (access controller). Among them, the display/programming work is done with other equipment. The data transmission between the devices is done through the input/export operation of the removable, readable and writable data carrier.Most important things of the access control systemCharacteristic carrier: The access control system is a system that manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legality of their access (behavior). This is to give them a mark of identity and authority through a method. We call it a feature carrier, and the identity and authority information it carries is a feature. The key to a mechanical lock is a feature carrier, and its "tooth shape" is a feature. Many feature carriers can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used at present. These feature carriers must be used with the holder (person or thing), but it does not have the same identity with the holder, which means that the feature carrier can be used by others (things). To prevent this problem, multiple methods can be adopted, that is, two or more feature carriers are used (depending on the security requirements of the system). If a unique and stable feature can be selected from the holder itself as the information for identity, this problem will not exist. Of course, the features from the "holder" are called "biological features", such as face recognition technology, and the feature carrier is, of course, the holder.Reading device: A reading device is a device that exchanges information with a characteristic carrier. It reads the information about identity and authority from the feature carrier appropriately, to identify the identity of the holder and judge the legitimacy of its behavior (access request). The feature reading device is a device that matches the feature carrier. The technical attributes of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "lock core". After the key is inserted into the lock core, the identity of the holder and the authority are confirmed by the movable marbles in the lock core and the tooth shape of the key. The identification process of an electronic reading device is: converting the read feature information into electronic data and then comparing it with the data stored in the device memory to achieve identity confirmation and authorization verification. This process is also called "feature identification ". Some feature reading devices only have the function of reading information, and some also have the function of writing information to the feature carrier. This kind of device is called a "reading and writing device". The system writes information to the feature carrier to authorize the holder. Or revise the authorization process. This feature vector can be modified and reused. The key to a mechanical lock cannot generally be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the rights they possess can be changed through system settings.The locking mechanism of the access control system: The access control system is only practical if it is coupled with an appropriate locking mechanism. After the reading device confirms the identity and authority of the holder, it is necessary to enable the legal person to enter and exit smoothly and effectively prevent the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems or different applications of access control technology. For example, the lever of a subway toll system, a car stop in a parking lot, and a banknote collection device in a self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. After the lock core matches the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.The security of the access control system includes impact resistance, which is resistant to damage by mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the lock mechanism of the access control system is also commonly used with electric control locks. Its characteristic carrier is mainly various information cards, and the opening and closing of the door are controlled by the electromagnetic force. Access control solutionApplication scenarios of access control system1.Pedestrian management for international airport and  metro station .2.Access control system for the office buildings,schools,factories etc.it can be equipped with a face recognition function.Shenzhen TGW Technology Co., Ltd is an access control system manufacturers specialize in access control system security fundamentals.To learn more about our access control system solution  CLICK HERE>>by:Shenzhen TGW Technology Co.,Ltd
Fingerprint Identification Access Control System Will Dominate in 2015_ Taigewang Technology
Fingerprint Identification Access Control System Will Dominate in 2015_ Taigewang Technology
In recent years, with the development of the security industry, the community security has attracted much attention. The community access control system has undergone earth shaking changes, from the traditional key lock to the magnetic lock such as swiping card or temporary residence card and ID card. This year, with the popularization of fingerprint identification system, the community access control will develop towards fingerprint access control system. Fingerprint identification is to use the unique fingerprint information on human fingers for identification. The main reasons why the fingerprint identification system can be used in the access control system are as follows: (1) the storage space is small, and the storage capacity of each fingerprint is only about 120 180byte. (2) High security: we know that everyone's fingerprint is unique, so this greatly improves the security of the access control system. (3) Convenience: the most special feature of fingerprint identification is portability, which can facilitate and accurately realize automatic management. (4) High stability: fingerprint is one of the most stable biological characteristics of human beings. With the maturity of technology, fingerprint identification system will have a lot of development space. Whether we use unlocking mobile phone or mobile payment, fingerprint identification will have unlimited imagination space. Now, with the development of technology, fingerprint identification system has been applied to the access control system in the security industry. Compared with other access control systems, fingerprint identification access control system has more security, stability and practicability. Because the fingerprint identification access control system has the above advantages, the power lock or card swiping magnetic lock in the access control system of the community security industry will be replaced by the fingerprint access control system.
Several Troubleshooting Methods of Access Control System_ Taigewang Technology
Several Troubleshooting Methods of Access Control System_ Taigewang Technology
There are two kinds of common faults of access control system: 1. Unable to communicate; 2. If the electric lock cannot be locked, how can we solve it? There are two kinds of failure to communicate, one is that 485 access control does not communicate, and the other is that TCP IP controller does not communicate. Communication fault 1: 485 access control does not communicate. The solution steps are as follows: 1. Check whether the 485 communication line has short circuit or open circuit; 2. Measure the voltage at both ends of 485 communication line, and it is normal when it is between 3v5v; 3. Check whether the software port settings correspond to the computer port. 4. Conduct [detection controller] operation on the controller at the interface of the main control console, and observe whether the status indicator of 485 communication converter flashes while operating. 5. Check whether the serial number of the controller has been encrypted (the special encryption tool can be restored). Communication failure 2: the TCP IP controller does not communicate. The solution steps are as follows: 1. Check the communication mode of the controller. Select [small LAN] for LAN and [medium and large network] for cross network segment. When crossing network segments, first set the controller IP to the network IP of the LAN where the controller is located, including IP address, subnet mask, gateway, DNS server, etc. Then search the management computer for a. Net controller and add it. 2. Ping the IP of the controller at the command prompt to see if the network is connected. 3. If it is a cross network segment, check whether the router port is open or IP bound. 4. Use a line measuring instrument to measure whether the network cable is unobstructed. 5. You can take the controller to the computer and test the communication in a LAN. Ensure that the computer and access controller are free of problems. The above is the solution to the non communication fault of the two devices, and the following is the solution to the electric lock fault. Electric lock fault 3: the electric plug-in lock is not locked. The solution steps are as follows: 1. First check whether the wiring is correct. 2. Use a multimeter to measure whether the voltage at both ends of the electric plug-in lock is above 11.5V. 3. Check whether the magnetic sheet of the electric plug-in lock is magnetic or misaligned. 4. If the above methods fail, return the lock to inspection and maintenance. Electric lock fault 4: the electromagnetic lock is not locked or the suction is insufficient. The solution steps are as follows: 1. Check whether the wiring is correct. 2. Measure whether the voltage at both ends of the electric lock is above 11.5V. 3. Check whether the contact between the lock body and the suction sheet is complete and sufficient. The fixing nut of the lower suction sheet can be slightly adjusted to make the suction sheet have a certain movable space. Electric lock fault 5: the electric plug-in lock or electromagnetic lock is not locked for a long time. The solution steps are as follows: 1. First check the door opening delay setting of the access control. Generally, the door opening delay is set within 6 seconds. At the same time, the delay can be adjusted appropriately according to the speed of the door closer to ensure that the delay is longer than the door closing time of the door closer. 2. Online access control delay adjustment method: A. set the door opening delay on the software. b. Adjust the delay knob of the locking power supply. c. Adjust the time-delay jumper on the side of the electric plug-in lock. (see instructions for details).
Chat About Several Common Access Control Systems_ Taigewang Technology
Chat About Several Common Access Control Systems_ Taigewang Technology
Access control everyone will contact in daily life. Our most common lock key also belongs to access control. However, with the development of electronic technology and network technology, access control has developed into a complete access management system. Access control system not only plays a role in access security control, but also plays an important role in administrative management and personnel attendance. The access control system can be divided into password access control system, card access control system and biological access control system according to the identification method. 1、 Password access control system password access control system is more traditional. As long as you enter the correct password, the door will be opened and released. This identification method has the lowest cost, as long as you remember the password, which is its advantage. However, this identification method is not very convenient to use, because it takes time to enter the password. If there are too many people, they still need to queue up, and password input errors are common on the scene, which takes longer. On the other hand, the security of password recognition is poor, and others may remember the password through gestures, resulting in password disclosure. Due to these reasons, access control using password identification is less and less used, generally in storage cabinets, safes and so on. 2、 Card access control system card access control system can be divided into contact card access control system (such as magnetic stripe card, bar code card, etc.) and non-contact card access control system (such as induction card and RF card). At present, the non-contact card door ban system is widely used. It is welcomed by users because it is not easy to wear, good durability, fast reading speed and high security. On the contrary, because the contact card is easy to be worn and damaged and used less times, the scope of use is becoming smaller and smaller. We often use magnetic stripe cards such as bank cards. 3、 Biometric access control system biometric access control system is recognized based on human characteristics. The most common one is fingerprint identification system. In addition, there are palm access control system, iris (retina) access control system, portrait recognition access control system, etc. The biometric mode has high security, is not easy to copy and is convenient. The disadvantage is that the human characteristics will change, resulting in an increase in the rejection rate and a constant. At present, this identification access control system is mostly used in a few areas with high security requirements. Well, we'll introduce the types of access control systems here. Thank you for reading.
no data
Shenzhen TGW Technology Co.,Ltd is the leading access control solution provider for vehicle intelligent parking system, license plate recognition recognition system and pedestrian access control turnstile and face recognition terminals.
no data
CONTACT US

Shenzhen TigerWong Technology Co.,Ltd

Tel: +86 0755-23773884 

E-Mail: info@sztigerwong.com

Add: Room 601-605, Building 6, 1980 Science and Technology Industrial Park,  Longhua Street, Longhua District, Shenzhen

                    

Copyright © 2021 Shenzhen TigerWong Technology Co.,Ltd  | Sitemap
chat online
Please message us and we’ll be sure to respond ASAP, what product you intrested in?