The Access Control System(ACS) is a control system that uses modern electronic equipment and software information technology to control the entry, shuch as recording and alarming of people or things at the entrance. It has become an effective measure to ensure the security of the area and realize intelligent management.
The access control system is mainly composed of the reading part, transmission part, management/control part and execution part, and corresponding system software. There are various types of the access control system. According to its hardware composition mode, it can be divided into the integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type.
1.Each component of the integrated access control system realizes all the functions of access control through internal connection, combination or integration.
Each component of the split-type access control system has a structured part and a combination part in different ways. The separated part and the combined part are connected to form a system through electronic, electromechanical and other methods to realize all functions of access control.
Independent control type access control system, all display / programming / management / control and other functions of its management / control part are completed in one device (entrance controller).
Networked control type access control system, all display / programming / management / control functions of its management / control part are not completed in one device (entrance controller). Among them, the display/programming function is completed by another device. Data transmission between devices is achieved through wired and / or wireless data channels and network devices.
The difference between the data carrier transmission control type access control system and the networked type access control system is only in the way of data transmission. The display / programming / management / control and other functions of its management / control part are not completed in one device (access controller). Among them, the display/programming work is done with other equipment. The data transmission between the devices is done through the input/export operation of the removable, readable and writable data carrier.
Characteristic carrier: The access control system is a system that manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legality of their access (behavior). This is to give them a mark of identity and authority through a method. We call it a feature carrier, and the identity and authority information it carries is a feature. The key to a mechanical lock is a feature carrier, and its "tooth shape" is a feature. Many feature carriers can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used at present. These feature carriers must be used with the holder (person or thing), but it does not have the same identity with the holder, which means that the feature carrier can be used by others (things). To prevent this problem, multiple methods can be adopted, that is, two or more feature carriers are used (depending on the security requirements of the system). If a unique and stable feature can be selected from the holder itself as the information for identity, this problem will not exist. Of course, the features from the "holder" are called "biological features", such as face recognition technology, and the feature carrier is, of course, the holder.
Reading device: A reading device is a device that exchanges information with a characteristic carrier. It reads the information about identity and authority from the feature carrier appropriately, to identify the identity of the holder and judge the legitimacy of its behavior (access request). The feature reading device is a device that matches the feature carrier. The technical attributes of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "lock core". After the key is inserted into the lock core, the identity of the holder and the authority are confirmed by the movable marbles in the lock core and the tooth shape of the key. The identification process of an electronic reading device is: converting the read feature information into electronic data and then comparing it with the data stored in the device memory to achieve identity confirmation and authorization verification. This process is also called "feature identification ". Some feature reading devices only have the function of reading information, and some also have the function of writing information to the feature carrier. This kind of device is called a "reading and writing device". The system writes information to the feature carrier to authorize the holder. Or revise the authorization process. This feature vector can be modified and reused. The key to a mechanical lock cannot generally be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the rights they possess can be changed through system settings.
The locking mechanism of the access control system: The access control system is only practical if it is coupled with an appropriate locking mechanism. After the reading device confirms the identity and authority of the holder, it is necessary to enable the legal person to enter and exit smoothly and effectively prevent the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems or different applications of access control technology. For example, the lever of a subway toll system, a car stop in a parking lot, and a banknote collection device in a self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. After the lock core matches the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.
The security of the access control system includes impact resistance, which is resistant to damage by mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the lock mechanism of the access control system is also commonly used with electric control locks. Its characteristic carrier is mainly various information cards, and the opening and closing of the door are controlled by the electromagnetic force. Access control solution
1.Pedestrian management for international airport and metro station .
2.Access control system for the office buildings,schools,factories etc.it can be equipped with a face recognition function.
Shenzhen TGW Technology Co., Ltd is an access control system manufacturers specialize in access control system security fundamentals.To learn more about our access control system solution CLICK HERE>>
by:Shenzhen TGW Technology Co.,Ltd
Shenzhen TigerWong Technology Co.,Ltd
Tel: +86 0755-23773884
Add: Room 601-605, Building 6, 1980 Science and Technology Industrial Park, Longhua Street, Longhua District, Shenzhen