Access Control System Basics

Access Control

The simplest access control systems involve one door and simply limit access to those holding the necessary credential - much like a mechanical keyed lock. The difference between these small, self-contained systems and mechanical keyed locks is that each user has a unique credential, so that one individual can be denied access while all others are unaffected.

However, access control systems can enhance security by tracking when credentials are used to enter or exit a space and when; by controlling who can enter (or exit) and when they can do so; and by monitoring the condition of doors and locking hardware.

Here is some access control vocabulary:

User - someone who uses the access control system to get in and/or out.

Credential - the identity of the user from the system's point of view. Types of credentials include pin code, mag stripe card, prox cards and prox keys, and a human feature, such as the retina of the eye or fingerprints.

Pin Code - "PIN" stands for Personal Identification Number - a series of numbers unique to a particular user.

Mag Stripe Card -

(magnetic stripe card)

- plastic card with a magnetic strip applied to one side. The magnetic strip contains a code that can be read by a magnetic stripe card reader.

Prox Card -

(proximity card)

- plastic card with a transponder chip embedded inside. The transponder communicates with a proximity reader to effect access control. A Prox Key (or Prox Fob) is a plastic object containing a transponder chip that can by attached to the user's key ring.

Time Zones -

(schedules)

- function of an access control system that controls when certain users' credentials will be accepted by the system and when they will not.

Audit Trail - history of events recorded by the system, such as time when a credential is presented, instances of when a door was forced or propped open, or time when a door is opened for egress.

Front End - system user interface at the door that reads the credential and transmits the information to the access control panel.

Panel - brains of the access control system - receives the information from the front and and decides, based on its programming, whether to permit access.

How It Works

Full featured access control systems work like this:

The system manager uses access control software installed on their computer to set the parameters of the system, that is, to tell the access control panel what to do and when. Access control software is database software. The records in the database can be users, credentials, doors, and times. Using the software, the manager can grant or deny individuals or groups of users access to specific doors between certain hours and on certain days. The software can usually record which user accesses which door at what time and other events it what they call an audit trail.

In operation:

The user presents their credential.

The reader sends the information to the access control panel.

The panel compares the information to its programming, "decides" whether to grant or deny the user access, and records the event in memory.

A low voltage power supply powers the system and electric locking devices.

This system can be made up of components based on the building's electrical system, can be part of the computer network either as devices connected directly to the network or connected wirelessly through an interface, or they can be small, self-contained devices that accomplish access control on one door at a time.

Simple systems that control only a few doors and serve a small numbers of users may offer only the ability to add and delete users. These units have the same kind of "brains" that a more complex system does, but with less capability. These systems are perfect for applications where audit trail and time zones are unnecessary, but the need to be able to deny access to a single user is needed.

Considerations

How many users?

How many people will use the system now, and how many may use it in the future? Number of users is the first criteria for choosing an access control system.

How many doors?

Again, how many doors will have access control now, and how many may have access control in the future?

Do you want audit trail capability? Do you want time zones?

Audit trail capability allows the administrator to keep track of users as they enter the secured space. The system 'remembers' when a user presents their credential to the system. We'll discuss credentials shortly. Usually through a computer interface, the administrator can access and/or print out a list of 'events' including authorized entry, forced entry, and door propped open events.

Time zones are blocks of time assigned to users. If Bob Smith works from 9am to 5pm and you don't want him to come in any other time, time zones allow you to make Bob's credential work only when Bob is authorized to work.

Audit trail and time zone capabilities usually mean that your access control system will interface with a computer using proprietary software supplied by the access control system manufacturer. It is possible to have these features without software, but that usually means that the administrator must punch in commands on a keypad and download audit trail information directly to a printer. A keypad can be a confusing if not frustrating user interface, and the direct print idea is very time consuming, not to mention a waste of paper.

What kind of credential do you want to use?

The credential is the thing that the user presents to the access control system. The access control system permits or denies entry to the credential when presented. These are the most common types of credentials that are used today:

Pin code - a series of numbers. The user sequentially presses numbered keys on a keypad. Advantage: numbers are free. Disadvantage: numbers can be shared over the telephone.

If the object is to simply do away with the need to have a key, then a keypad is ideal. All the users can use the same number. Just remember to change the code a few times a year so that the numbers don't get worn off.

Mag stripe card - like an ATM or credit card, a plastic card with a black magnetic strip across the back. Advantage: common and widely used as well as inexpensive. Disadvantage: they wear out.

Prox card - proximity card, a PVC card with a computer chip embedded inside. Currently this is the most popular kind of credential. Advantages: it is possible to get a proximity reader that will read the card through the users pants and wallet or inside a handbag. Also since prox cards do not actually need to touch the reader in most cases, they last a very long time. Disadvantage: more expensive than pin codes or mag stripe cards. A slightly more expensive alternative to the prox card is the prox tag or prox key. The prox key is a small, teardrop-shaped credential that can be put on the user's key ring.

Biometrics - actual body parts. Biometric readers use a live fingerprint, handprint, or the retina of the eye as the credential. Advantages: extremely secure and no credentials to buy. Disadvantage: today in July, 2008, this is still relatively new technology to the field of commercial access control, so the number of choices is fairly small and price tags can be sometimes fairly hefty.

5.

Do you want emergency lock-down capability?

Emergency lock-down capability is becoming more in demand. Under emergency conditions, such as an armed intruder, it can be an urgently needed function.

Hardwired, PoE, or Wireless?

Hardwired Access Control

This is the model shown in the illustration above. A low voltage power supply is wired to the panel and the panel is wired to the readers. Sometimes a separate power supply may be required for certain kinds of locking locking devices, but the panel will in all cases be wired into the electric locking system. The computer is connected to the access control panel via a cable.

Hardwired systems are the tried-and-true traditional way of achieving access control. Ideally they are installed during construction so that their wiring can be done at the same time as all the other wiring. Adding hardwired access control after the fact can be difficult, particularly, for example, if the space has marble walls and floors and no drop ceiling.

PoE

Power Over Ethernet systems are gaining popularity. These presuppose that there is (or will be) a computer network in place, and require the participation of the system administrator. These systems often use server-based software, so can be controlled from any PC on the network. This is a convenience, but also poses extra security risks. Since the system uses the same kind of cable as the computer network, the same people who run the network cable will run it to the doors to effect access control.

As these kinds of systems have taken hold, electric locking devices that run on PoE have appeared. PoE systems offer a plug-and-play functionality that many find attractive.

Wireless

Wireless access control systems can go where hardwired systems fear to tread. Marble walls, concrete floors, concrete-filled door frames and textured plaster ceilings are suddenly no problem. These systems are made up of battery-operated locks and exit device trims with onboard electronics and transponders. The locks communicate wirelessly over wi-fi through the facility's computer network with server-based access control software, or through direct RF connection with an interface panel which in turn communicates with the access control panel.

Wireless components can be integrated into existing or new hardwired systems, but licensing fees and special interface panels may be required. Check with your professional security integrator or access control system dealer for more information.

Wireless systems tend not to have the instant lockdown capabilities of hardwired systems. If that feature is important to your application, be sure to question your access control dealer or manufacturer's representative for more information.

Standalone Access Control

The term "standalone" refers to an access control device that is self-contained instead of connected to a larger system. Such devices can offer advanced features such as time zones, audit trail and programming via personal computer, or they can be simple systems that only allow adding and deleting users. Standalone access control devices can be battery operated or hardwired.

When a standalone access control system is programmed via computer, the computer may need to be brought to the door to do the programming, though some manufacturers offer a hand-held programmer to handle communication between the computer and the device.

Standalone systems that serve a small number of users where no advanced features are required can often be programmed by entering codes on a keypad. For a system with less than 50 users and one or two doors this is a fine choice. The system manager will need to keep track of the users on paper.

Access Control System Basics 1

HOT PRODUCTS
no data
GET IN TOUCH WITH US
no data
recommended articles
Cases
Access control system
Access control system
access control system manufacturer What is the access control system?The Access Control System(ACS) is a control system that uses modern electronic equipment and software information technology to control the entry, shuch as recording and alarming of people or things at the entrance.  It has become an effective measure to ensure the security of the area and realize intelligent management.Types of access control systemThe access control system is mainly composed of the reading part, transmission part, management/control part and execution part, and corresponding system software. There are various types of the access control system. According to its hardware composition mode, it can be divided into the integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type.1.Each component of the integrated access control system realizes all the functions of access control through internal connection, combination or integration.Each component of the split-type access control system has a structured part and a combination part in different ways. The separated part and the combined part are connected to form a system through electronic, electromechanical and other methods to realize all functions of access control.Independent control type access control system, all display / programming / management / control and other functions of its management / control part are completed in one device (entrance controller).Networked control type access control system, all display / programming / management / control functions of its management / control part are not completed in one device (entrance controller). Among them, the display/programming function is completed by another device. Data transmission between devices is achieved through wired and / or wireless data channels and network devices.The difference between the data carrier transmission control type access control system and the networked type access control system is only in the way of data transmission. The display / programming / management / control and other functions of its management / control part are not completed in one device (access controller). Among them, the display/programming work is done with other equipment. The data transmission between the devices is done through the input/export operation of the removable, readable and writable data carrier.Most important things of the access control systemCharacteristic carrier: The access control system is a system that manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legality of their access (behavior). This is to give them a mark of identity and authority through a method. We call it a feature carrier, and the identity and authority information it carries is a feature. The key to a mechanical lock is a feature carrier, and its "tooth shape" is a feature. Many feature carriers can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used at present. These feature carriers must be used with the holder (person or thing), but it does not have the same identity with the holder, which means that the feature carrier can be used by others (things). To prevent this problem, multiple methods can be adopted, that is, two or more feature carriers are used (depending on the security requirements of the system). If a unique and stable feature can be selected from the holder itself as the information for identity, this problem will not exist. Of course, the features from the "holder" are called "biological features", such as face recognition technology, and the feature carrier is, of course, the holder.Reading device: A reading device is a device that exchanges information with a characteristic carrier. It reads the information about identity and authority from the feature carrier appropriately, to identify the identity of the holder and judge the legitimacy of its behavior (access request). The feature reading device is a device that matches the feature carrier. The technical attributes of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "lock core". After the key is inserted into the lock core, the identity of the holder and the authority are confirmed by the movable marbles in the lock core and the tooth shape of the key. The identification process of an electronic reading device is: converting the read feature information into electronic data and then comparing it with the data stored in the device memory to achieve identity confirmation and authorization verification. This process is also called "feature identification ". Some feature reading devices only have the function of reading information, and some also have the function of writing information to the feature carrier. This kind of device is called a "reading and writing device". The system writes information to the feature carrier to authorize the holder. Or revise the authorization process. This feature vector can be modified and reused. The key to a mechanical lock cannot generally be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the rights they possess can be changed through system settings.The locking mechanism of the access control system: The access control system is only practical if it is coupled with an appropriate locking mechanism. After the reading device confirms the identity and authority of the holder, it is necessary to enable the legal person to enter and exit smoothly and effectively prevent the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems or different applications of access control technology. For example, the lever of a subway toll system, a car stop in a parking lot, and a banknote collection device in a self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. After the lock core matches the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.The security of the access control system includes impact resistance, which is resistant to damage by mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the lock mechanism of the access control system is also commonly used with electric control locks. Its characteristic carrier is mainly various information cards, and the opening and closing of the door are controlled by the electromagnetic force. Access control solutionApplication scenarios of access control system1.Pedestrian management for international airport and  metro station .2.Access control system for the office buildings,schools,factories etc.it can be equipped with a face recognition function.Shenzhen TGW Technology Co., Ltd is an access control system manufacturers specialize in access control system security fundamentals.To learn more about our access control system solution  CLICK HERE>>by:Shenzhen TGW Technology Co.,Ltd
TGW team building activities
TGW team building activities
TGW team building activity-world view, world view This year's epidemic came very suddenly and brought huge changes to many companies and individuals. During the epidemic, TGW was fully prepared to fight the epidemic. The employees worked together to face the coming of the crisis, united and stabilized the company's situation, actively promoted products, and entered a new level in business development.The epidemic situation has improved greatly, and the company is also entering a new stage. TGW gathered the staff and their families to participate in outdoor activities after the team had done one live broadcast after another. After the intense work, it was a relaxing trip.On August 23-24, 2020, our team drove to JIAO WEI CHANG of the famous beach in ShenzhenStaying in a homestay, barbecue, entertainment, watching the sunrise, swimming on the beach, relaxing walks and blowing the sea breeze, group dinner, very happy.Once a high-temperature person is detected, the system will not only not open the gate, but also emit a buzzer sound.Our system will also automatically send a high temperature alarm email to the exhibition manager.After this team building, the cohesion has been upgraded again.1. After this team building activity, I deeply feel the importance of the team. Everyone plays a different protagonist in the team. As long as everyone works together, there are no difficulties and problems that cannot be solved. I believe that with the joint efforts of everyone, our company will become stronger and stronger and create greater glories.2. The strength of the team is infinite. In many cases, we need to work together and cooperate. But when others are unable to help you, the most important thing is to rely on yourself and listen to your inner voice. What should I do and what should I do? Then, try to find ways to challenge yourself.3. Team building is very important for an enterprise, especially our technology-based company. The company is a large team, and the work of one department is interlocking. We want to complete a project smoothly and lack a team. Cooperation is not enough. Only when we achieve real teamwork and the members trust each other to help each other learn from each other, our work will be smoother and our future will be brighter.The company’s culture is also one of our important cultures. In addition to daily work, it has enhanced the tacit understanding and collaboration between the teams. Everyone can appreciate the company’s dedication to us. I am grateful for this sense of belonging!
access control security
access control security
access control securityby:Shenzhen TGW Technology Co.,LtdThe access control security system is a security system that is commonly used in modern commercial buildings, communities, schools, and enterprises. The access control security system is a modern security management system that integrates microcomputer automatic identification technology and modern security management measures. Access control security system is used widely in our daily life and work, but how much do you know about the installation of an access control security system? Below I will share with you the contents of the installation of an access control security system. access control security system installation 1: equipment installation 1.Front-end equipmentA. Install a card reader at the entrance. Within the reader's sensing range, do not approach or touch high frequency or strong magnetic fields (such as heavy-duty motors, monitors, etc.), and it needs to cooperate with the grounding method of the control box.B. Install the exit button at the exit.C. The electromagnetic lock is installed on the upper edge of the door and door frame.D. To ensure safety and aesthetics, the controller and power box can be installed on-site or installed in a weak current well. The advantage of installing the controller on-site is to save the use of wires. The controller is installed in the weak current well to facilitate future system maintenance and system security. The controller box can also be installed above the card reader, near the electromagnetic lock. Specific circumstances can choose the installation method according to customers. 2. Central control room equipmentA. The control host and keyboard are installed on the facade wall or placed on the workbench.B. The alarm device is placed in a position with a good alarm effect.C. Due to the special nature of the access control security system, it is required to provide good power to the system. It is recommended to use a UPS power supply to centrally supply the access control security system. access control security system installation 2: equipment debugging 1. After the system installation is completed, firstly connect a signal of the access control card reader to the host, and then separately detect the condition of the access control card reader, and whether there are any false positives or false positives. After checking this way, there is no problem in accessing the other way. In this way, each way is tested separately, and all lines are connected after confirmation. 2. The management personnel can authorize according to the authority of the users. For example, some personnel can enter and exit any place at any time. Ordinary personnel can only enter and exit the authorization scope within the authorization time with the authorization card. When all the access points are opened normally and illegally, check the computer in the control center for records. 3. Attempt that the central computer cannot be connected to the controller due to malfunction or other reasons. Can the controller independently record the relevant information of the controlled door points? After the central computer is connected, can all information be automatically uploaded and whether the information record can be guaranteed to be complete Sex. 4. Make a good record of commissioning. 5. Finally, complete the completion report. access control security system installation 3: pipeline installation 1. The installation engineering wiring shall comply with the national regulations "Code for Construction and Acceptance of Electrical Installation Engineering" and the relevant codes and regulations issued by the state. Threading in pipes or ducts should be performed after construction plastering and groundworks are completed. Before threading, the water and debris in the pipe or wire groove should be removed. Lines with different systems, different voltage levels, and different current categories should not be worn in the same pipe or the same slot in a cable trunk. There should be no joints or kinks in the wires or ducts. The connector of the wires should be soldered in the junction box or connected with terminals. Small cross-section system connections can be spliced. The number of spliced turns should be more than five turns, then tinned and wrapped with insulation tape. Compensation measures shall be taken where the pipeline passes through the deformation joints of the building (including settlement joints, expansion joints, seismic joints, etc.), and the conductors shall be fixed on both sides across the deformation joints with appropriate margin. The terminals in the terminal box should be crimped or terminal boards with solder joints. The terminals should be labeled accordingly. 2. The access controller shall be installed firmly, shall not be inclined, and shall have obvious signs. Installation on light partition walls should be strengthened. The cables or wires introduced into the access controller should be neat and avoid crossover, and the cable core wire and the part of the matched conductor should be fixed and numbered, and should not be easily discolored with the drawing; the terminal board and each terminal, wiring No more than two cables should be left; there should be no less than 20cm of cable core and conductors; the conductors should be bundled into bundles; after the lead wires of the conductors are threaded, they should be blocked at the inlet pipe. 3. The main power supply lead-in of the access controller should be directly connected to the power supply. It is strictly forbidden to use a power plug. The main power supply should be marked. The ground of the access controller is firmly grounded and marked. 4. The routing and specifications of the ground bus in the monitoring room shall meet the design requirements. The construction should comply with the following regulations: the surface of the ground bus should be complete without obvious damage and residual flux slag, copper tape bus light, slip, and no burrs, the insulation layer should not have aging cracks; the ground bus should be laid on the ground trough or cable The center of the aisle is fixed on the outside of the track groove. The bus bar should be flat and free of skew and bend. The connection of the bus bar to the rack or the top of the machine should be firm; the copper strip bus bar on the cable aisle can be fixed by screws; the copper stranded bus bar on the cable aisle should be tied to the rung; Strictly follow the design requirements. Grounding installation shall be carried out simultaneously with civil construction.More info at Wikipedia
We are in the era of face recognition access control
We are in the era of face recognition access control
access control face recognitionby:Shenzhen TGW Technology Co.,Ltd With the development of technology, the era of intelligence is approaching, and the requirements for automation are increasing. We use the access control face recognition technology to modernize building access control.modernization of management and intelligence has become a top priority in the field of building safety. For a long time, access control system have played an important role in building security, intelligence and management. At present, some smart access control systems are based on cards, fingerprints or passwords for identity authentication. These recognition methods require people to operate at close range. And that is extremely bad when the user is inconvenient to use their hand to operate, it may also cause some troubles by card losing or password forgetting. Cost issues such as copying and theft. How to make the building's intelligent channel system truly safe, intelligent, and convenient has become a problem that security companies need to overcome. In fact, the advent of the access control face recognition system is to meet people’s need of a safe and convenient modern office buildings and living places. Access control Face recognition intelligent system is a kind of biometric recognition technology use human face feature for identification. Its is not easy to be copied,and this provide the necessary premise for identification. The recognition of human faces is used as the condition for opening the gate, and it is also used as the basis for attendance. It not only eliminates the trouble of forgetting to bring a key or card, but also does not require any media to open the door, and the only thing we need to do is registering the face information; in addition, the access control face recognition intelligent system can strictly standardize employee attendance management, thereby avoiding the problems caused by low efficiency and difficult statistics.We provide effective solution for Access control Face recognition system, click here to learn more!
Access control system
Access control system
access control system manufacturer What is the access control system?The Access Control System(ACS) is a control system that uses modern electronic equipment and software information technology to control the entry, shuch as recording and alarming of people or things at the entrance.  It has become an effective measure to ensure the security of the area and realize intelligent management.Types of access control systemThe access control system is mainly composed of the reading part, transmission part, management/control part and execution part, and corresponding system software. There are various types of the access control system. According to its hardware composition mode, it can be divided into the integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type.1.Each component of the integrated access control system realizes all the functions of access control through internal connection, combination or integration.Each component of the split-type access control system has a structured part and a combination part in different ways. The separated part and the combined part are connected to form a system through electronic, electromechanical and other methods to realize all functions of access control.Independent control type access control system, all display / programming / management / control and other functions of its management / control part are completed in one device (entrance controller).Networked control type access control system, all display / programming / management / control functions of its management / control part are not completed in one device (entrance controller). Among them, the display/programming function is completed by another device. Data transmission between devices is achieved through wired and / or wireless data channels and network devices.The difference between the data carrier transmission control type access control system and the networked type access control system is only in the way of data transmission. The display / programming / management / control and other functions of its management / control part are not completed in one device (access controller). Among them, the display/programming work is done with other equipment. The data transmission between the devices is done through the input/export operation of the removable, readable and writable data carrier.Most important things of the access control systemCharacteristic carrier: The access control system is a system that manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legality of their access (behavior). This is to give them a mark of identity and authority through a method. We call it a feature carrier, and the identity and authority information it carries is a feature. The key to a mechanical lock is a feature carrier, and its "tooth shape" is a feature. Many feature carriers can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used at present. These feature carriers must be used with the holder (person or thing), but it does not have the same identity with the holder, which means that the feature carrier can be used by others (things). To prevent this problem, multiple methods can be adopted, that is, two or more feature carriers are used (depending on the security requirements of the system). If a unique and stable feature can be selected from the holder itself as the information for identity, this problem will not exist. Of course, the features from the "holder" are called "biological features", such as face recognition technology, and the feature carrier is, of course, the holder.Reading device: A reading device is a device that exchanges information with a characteristic carrier. It reads the information about identity and authority from the feature carrier appropriately, to identify the identity of the holder and judge the legitimacy of its behavior (access request). The feature reading device is a device that matches the feature carrier. The technical attributes of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "lock core". After the key is inserted into the lock core, the identity of the holder and the authority are confirmed by the movable marbles in the lock core and the tooth shape of the key. The identification process of an electronic reading device is: converting the read feature information into electronic data and then comparing it with the data stored in the device memory to achieve identity confirmation and authorization verification. This process is also called "feature identification ". Some feature reading devices only have the function of reading information, and some also have the function of writing information to the feature carrier. This kind of device is called a "reading and writing device". The system writes information to the feature carrier to authorize the holder. Or revise the authorization process. This feature vector can be modified and reused. The key to a mechanical lock cannot generally be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the rights they possess can be changed through system settings.The locking mechanism of the access control system: The access control system is only practical if it is coupled with an appropriate locking mechanism. After the reading device confirms the identity and authority of the holder, it is necessary to enable the legal person to enter and exit smoothly and effectively prevent the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems or different applications of access control technology. For example, the lever of a subway toll system, a car stop in a parking lot, and a banknote collection device in a self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. After the lock core matches the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.The security of the access control system includes impact resistance, which is resistant to damage by mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the lock mechanism of the access control system is also commonly used with electric control locks. Its characteristic carrier is mainly various information cards, and the opening and closing of the door are controlled by the electromagnetic force. Access control solutionApplication scenarios of access control system1.Pedestrian management for international airport and  metro station .2.Access control system for the office buildings,schools,factories etc.it can be equipped with a face recognition function.Shenzhen TGW Technology Co., Ltd is an access control system manufacturers specialize in access control system security fundamentals.To learn more about our access control system solution  CLICK HERE>>by:Shenzhen TGW Technology Co.,Ltd
Several Troubleshooting Methods of Access Control System_ Taigewang Technology
Several Troubleshooting Methods of Access Control System_ Taigewang Technology
There are two kinds of common faults of access control system: 1. Unable to communicate; 2. If the electric lock cannot be locked, how can we solve it? There are two kinds of failure to communicate, one is that 485 access control does not communicate, and the other is that TCP IP controller does not communicate. Communication fault 1: 485 access control does not communicate. The solution steps are as follows: 1. Check whether the 485 communication line has short circuit or open circuit; 2. Measure the voltage at both ends of 485 communication line, and it is normal when it is between 3v5v; 3. Check whether the software port settings correspond to the computer port. 4. Conduct [detection controller] operation on the controller at the interface of the main control console, and observe whether the status indicator of 485 communication converter flashes while operating. 5. Check whether the serial number of the controller has been encrypted (the special encryption tool can be restored). Communication failure 2: the TCP IP controller does not communicate. The solution steps are as follows: 1. Check the communication mode of the controller. Select [small LAN] for LAN and [medium and large network] for cross network segment. When crossing network segments, first set the controller IP to the network IP of the LAN where the controller is located, including IP address, subnet mask, gateway, DNS server, etc. Then search the management computer for a. Net controller and add it. 2. Ping the IP of the controller at the command prompt to see if the network is connected. 3. If it is a cross network segment, check whether the router port is open or IP bound. 4. Use a line measuring instrument to measure whether the network cable is unobstructed. 5. You can take the controller to the computer and test the communication in a LAN. Ensure that the computer and access controller are free of problems. The above is the solution to the non communication fault of the two devices, and the following is the solution to the electric lock fault. Electric lock fault 3: the electric plug-in lock is not locked. The solution steps are as follows: 1. First check whether the wiring is correct. 2. Use a multimeter to measure whether the voltage at both ends of the electric plug-in lock is above 11.5V. 3. Check whether the magnetic sheet of the electric plug-in lock is magnetic or misaligned. 4. If the above methods fail, return the lock to inspection and maintenance. Electric lock fault 4: the electromagnetic lock is not locked or the suction is insufficient. The solution steps are as follows: 1. Check whether the wiring is correct. 2. Measure whether the voltage at both ends of the electric lock is above 11.5V. 3. Check whether the contact between the lock body and the suction sheet is complete and sufficient. The fixing nut of the lower suction sheet can be slightly adjusted to make the suction sheet have a certain movable space. Electric lock fault 5: the electric plug-in lock or electromagnetic lock is not locked for a long time. The solution steps are as follows: 1. First check the door opening delay setting of the access control. Generally, the door opening delay is set within 6 seconds. At the same time, the delay can be adjusted appropriately according to the speed of the door closer to ensure that the delay is longer than the door closing time of the door closer. 2. Online access control delay adjustment method: A. set the door opening delay on the software. b. Adjust the delay knob of the locking power supply. c. Adjust the time-delay jumper on the side of the electric plug-in lock. (see instructions for details).
Chat About Several Common Access Control Systems_ Taigewang Technology
Chat About Several Common Access Control Systems_ Taigewang Technology
Access control everyone will contact in daily life. Our most common lock key also belongs to access control. However, with the development of electronic technology and network technology, access control has developed into a complete access management system. Access control system not only plays a role in access security control, but also plays an important role in administrative management and personnel attendance. The access control system can be divided into password access control system, card access control system and biological access control system according to the identification method. 1、 Password access control system password access control system is more traditional. As long as you enter the correct password, the door will be opened and released. This identification method has the lowest cost, as long as you remember the password, which is its advantage. However, this identification method is not very convenient to use, because it takes time to enter the password. If there are too many people, they still need to queue up, and password input errors are common on the scene, which takes longer. On the other hand, the security of password recognition is poor, and others may remember the password through gestures, resulting in password disclosure. Due to these reasons, access control using password identification is less and less used, generally in storage cabinets, safes and so on. 2、 Card access control system card access control system can be divided into contact card access control system (such as magnetic stripe card, bar code card, etc.) and non-contact card access control system (such as induction card and RF card). At present, the non-contact card door ban system is widely used. It is welcomed by users because it is not easy to wear, good durability, fast reading speed and high security. On the contrary, because the contact card is easy to be worn and damaged and used less times, the scope of use is becoming smaller and smaller. We often use magnetic stripe cards such as bank cards. 3、 Biometric access control system biometric access control system is recognized based on human characteristics. The most common one is fingerprint identification system. In addition, there are palm access control system, iris (retina) access control system, portrait recognition access control system, etc. The biometric mode has high security, is not easy to copy and is convenient. The disadvantage is that the human characteristics will change, resulting in an increase in the rejection rate and a constant. At present, this identification access control system is mostly used in a few areas with high security requirements. Well, we'll introduce the types of access control systems here. Thank you for reading.
What Is the Access Control System? What Are the Brands of Access Control Systems at Home and Abroad_
What Is the Access Control System? What Are the Brands of Access Control Systems at Home and Abroad_
Access control system is an important branch in the field of security. Security is mainly composed of video monitoring system, access control all-in-one card system and perimeter alarm system. Parking lot system, access gate system, entrance and exit access control system; These management and control technical means commonly used to manage the access of vehicles and personnel are the specific application of access control system. Access control technology involves many high and new technologies, such as mechanical transmission, electronic information, automatic control, computer processing, communication transmission, biometrics and so on. It is mainly used in banks, hotels, parking lots, confidential rooms, intelligent communities, business centers, office buildings, etc. So what are the brand manufacturers of access control system at home and abroad? 1. Honeywell access control system, an American enterprise, a global security giant and a world top 500 enterprise, has rich experience in manufacturing electronic security products. 2. Bosch access control system is a German enterprise, a world top 500 enterprise, a leader in security and communication industry, a global comprehensive multinational group, product system and its stability. 3. Ingersoll Rand access control system (Ingersoll Rand (China) Investment Co., Ltd., a leading diversified multinational industrial company in the world, a world-famous brand and one of the first foreign-funded enterprises to enter China) 4. Jieshun access control system. Shenzhen company, with rich experience in the access control industry, complete product series, older qualifications, domestic access control brands and high prices, Shenzhen Jieshun Technology Industry Co., Ltd. 5. Taigewang technology access control system. Shenzhen local enterprise, double high certification (national high-tech enterprise, Shenzhen high-tech enterprise), a rising rookie brand in the field of access control parking lot, and the first independent and successful manufacturer of Taige Wangyun parking lot platform in China. Taige Wangyun product series is deeply welcomed by the market.
no data
Shenzhen TGW Technology Co.,Ltd is the leading access control solution provider for vehicle intelligent parking system, license plate recognition recognition system and pedestrian access control turnstile and face recognition terminals.
no data
CONTACT US

Shenzhen TigerWong Technology Co.,Ltd

Tel: +86 0755-23773884 

E-Mail: info@sztigerwong.com

Add: Room 601-605, Building 6, 1980 Science and Technology Industrial Park,  Longhua Street, Longhua District, Shenzhen

                    

Copyright © 2021 Shenzhen TigerWong Technology Co.,Ltd  | Sitemap
chat online
Please message us and we’ll be sure to respond ASAP, what product you intrested in?