What Does a Gate Agent Do?

The access control system is in the field of intelligent buildings, which means Access Control System, or ACS for short. Refers to the prohibition authority of the "gate", which is a guard against the "gate". The "door" here includes, in a broad sense, various passages that can pass, including a door for people, a door for vehicles, etc. Therefore, access control includes vehicle access control. In parking lot management applications, vehicle access control is an important means of vehicle management. It does not aim at charging parking fees, but mainly manages vehicle access rights.

Access control system

The access control system is in the field of intelligent buildings, which means Access Control System, or ACS for short. Refers to the prohibition authority of the "gate", which is a guard against the "gate". The "door" here includes, in a broad sense, various passages that can pass, including a door for people, a door for vehicles, etc. Therefore, access control includes
The access control system, as its name implies, is a system that controls entrances and exits. It is traditional
The earliest networked access control appeared in the 1990s. With the increasing application scope of the access control system, people's demands for the access control system are no longer limited to a single access control, but they are required to have multiple control functions such as access control, time and attendance management, and building self-control. And remote control functions have very clear requirements. However, the traditional access control is based on the RS485 communication method, the transmission distance and the number of nodes are limited, and remote control and intelligent management cannot be achieved. The networked access control based on the Ethernet transmission method came into being. It not only solves the problem of long-distance transmission, but also makes it possible for more servers and workstations to participate in management, thereby providing customers with multi-level and multi-module access control. management.
In response to changes in application requirements, many access control vendors have launched network access control products. The so-called networked access control refers to the access control system based on TCP / IP protocol for data transmission. Both the control center server and the front-end controller adopt a networked structure. The servers and workstations (PCs) in the management system also perform data transmission through the network .
System architecture: offline operation in the event of a network failure, linkage with fire protection, and loss of cards.
The access control read head uses a capacitive touch password keyboard.
Adopting split scheme
Optional image capture and electronic map function, you can capture and save the image when swiping the card to prevent swiping. (Internet connection required)
Flexible setting of card holder's door opening authority, door opening time, and area time zone for door opening
Support multiple door opening methods: password, swipe card, remote door opening (Internet connection required)
Supports multiple conditions to flexibly combine access records, sort report data in different orders, support report data printing, and export to file functions
Can be used with Doao Elevator / Parking / Access / Consumer / Smart Card
(I) Access control selection criteria:
The criteria for choosing an access control system are: first is quality (measured by low reliability, stability, and low failure rate); second is sufficient (products from regular manufacturers generally meet more than 98% of user needs, standard functions are sufficient) , The more features, the better, simple and practical is the best); the third is the price (select products with good performance / price ratio).
(II) Production history:
In terms of time, European and American products generally have longer R & D and production time (generally more than 10 years). The products have been improved and improved over many generations, the quality is more stable and reliable, and the products are serialized. Short (usually under 1-6 years), Taiwan's products are a little longer than domestic ones. Generally, small and medium-sized systems are the main products, and the quality and performance of the brands vary greatly.
(3) Production scale:
European and American access control products are generally produced by professional production manufacturers. The products are scaled and standardized. Manufacturers are only responsible for R & D and production, and then sell and engineering installation through agents and system integrators around the world. End users do not directly install and provide technical services to users, but complete them through a proxy system.
Taiwan's products are sold through European and American methods, but domestic brands have smaller production scales. Most of the products are self-produced, sold, and installed by themselves. There are fewer large-scale productions, which is why domestic products are difficult to grow.
(IV) Price:
Generally speaking, the prices of European and American products are more than 4-5 times the prices of Hong Kong and Taiwan and domestic products. Generally, large and important places use more European and American products. Users' requirements require more consideration of system reliability and stability. In particular, some large and medium-sized projects mostly use imported European and American products. Hong Kong and Taiwan and domestic products are generally used in small and medium-sized projects and places with simple requirements. Domestic products will occupy more market shares with the improvement of quality.
(V) Function:
The development of access control product technology started from Europe and the United States. There are very standardized access control technology industry standards in the United States and Europe. The products produced by various manufacturers are also standardized in accordance with uniform performance standards. If the United States meets UL and FCC Standards must have the corresponding product software and hardware standard functions and system security, and these conditions are quite high standards, which meet the needs of 98% of users, so users can rest assured that they have the above standards when selecting equipment Purchase without having to bother to examine the functions of the access control one by one.
Access control products from Hong Kong, Taiwan and China were relatively simple products at the beginning, such as independent access control products, integrated access control products, etc., and later developed into networked access control products, but the time is short, reliability and stability on the CUHK access control system Sex needs to be improved.
(6) Security:
Generally speaking, the security design of European and American products is relatively strict. This is because European and American countries have very strict security industry standards, especially the underlying interface protocols of system manufacturers for their products are generally not open, which is also mainly from a security perspective. considerate. However, because domestic manufacturers do not have strict industry standards and specifications, product security cannot be guaranteed. Generally, as long as the product is purchased, the underlying interface protocol can be provided, and the management software can be rewritten according to the needs of the user. The surface seems to be more flexible and actually hides security. Hidden danger, because software is just like hardware, software just written takes time to test, and the safety and stability of software and hardware are the most important, so try to use time-tested products.
(Seven) cost performance:
The same is for imported access control products. The prices of the products are also quite different. The products imported from China are more mainstream products abroad. The performance and quality are better, but the price may be more than 1 times. This requires users to carefully compare with Identification, no matter what grade of product has a relatively good cost-effective choice.
The quality of domestic products varies widely, and the price difference is about 1-2 times, and the cost performance is also very different. Users need to compare them carefully.
1.Security
As with all technologies, newer systems are more secure and mature.
2.Integration of access control system
Large-scale platforms such as the Internet of Things and Smart City integrate transportation, residential, security, hydropower, education, medical, sports, entertainment, and government levels, and integrate security technologies such as comprehensive security prevention management systems to optimize urban management And development, improve urban development problems, and build a grid-based social security prevention and control system, so that the city's future development is network-oriented, high-definition, intelligent, and system-integrated, to achieve comprehensive command and dispatch of multiple departments' coordinated response, and improve Ability to prevent and respond to various accidents, disasters, cases and emergencies.
Therefore, in the construction of large platforms such as the Internet of Things and the construction of smart cities, the access control system is no longer a mode in which each subsystem operates independently, but must be able to integrate other professional systems such as building automation, closed-circuit monitoring, anti-theft, and fire alarm systems. Coordinated linkage, so as to improve the overall security and safety.
3. Openness of the system
Realize a variety of applications other than the access control system, including electronic payment parking management, computer desktop login system, elevator control and other applications. Through the open access control architecture, seamless upgrades are provided, providing different upgrade options for the future.
4. Applications of mobile access control systems will increase and expand to other applications
In 2012, the access control industry laid the foundation for deploying mobile access control solutions based on nfc mobile devices. Users can bring their own mobile phones to open doors and other applications, including accessing computers, networks, and related information with their mobile phones. They can also use their mobile phones to open doors and enter safe areas, bringing more convenience to users.
5.Towards cloud applications
With the advent of mobile access control, another concern is how to deploy and manage virtual credential cards carried by users' NFC smartphones. Enterprises can configure mobile access control virtual vouchers in two ways. The first is through an Internet workstation similar to the configuration of traditional plastic credentials (mobile devices are connected to the network via USB or Wi-Fi). The second method is over-the-air configuration by a mobile network operator, similar to how smartphone users download apps and songs.
Mobile phone applications will generate one-time dynamic passwords or receive such passwords via SMS. Various other access keys and virtual vouchers will be sent to the phone from the air in a convenient, cloud-based configuration mode that eliminates credentials Risk of card duplication, issue temporary vouchers, cancel lost or stolen vouchers, and monitor and modify security parameters when needed. [1]

Application of access control system

Intelligent office building company office, intelligent community access management control, access control in government offices, medical hospital systems, telecommunications base stations and power supply bureau substations ...

Access control system

Generally, the access control system is installed on the electric gates of the gates of the residential area, the fire doors of the unit's iron doors, and the anti-theft doors. It can effectively prevent idle people from entering the residential area and effectively manage the residential area effectively. You can change the security of the residential area to determine whether it is Inaccurate and rigorous management methods for outsiders. If it is the owner of the community, the new security guard will block the owner. If the external personnel are well dressed, the security may think that the owner is the owner without questioning. Bring security risks. Security and scientific access control system can improve the grade of the property, which is more conducive to developers to promote real estate. Owners will also benefit from scientific and effective access management. Networked access control is conducive to security to monitor all entrances and exits at any time The situation, if there are accidents and cases, you can query the access records to provide evidence after the fact.
Can be combined with building intercom system and video intercom system.
It can be implemented with the management of consumer parking lots in the community.

Access control system office building

Installing access control on the company's door can effectively prevent foreign salesmen from entering the company to disrupt the office order, and it can also effectively prevent foreign idlers from entering the company to ensure the safety of the company and its employees. It can display and improve the management level of the company and improve the company. Image. You can effectively track whether employees leave the post. You can use the supporting attendance management software to conduct attendance without the need to buy a clock. The attendance results are more objective and fair, and the statistics are fast and accurate, which can greatly reduce the work intensity and personnel of the personnel department. Workload. It can effectively solve the problem that some employees have to change the door key after leaving the office. It can easily and flexibly arrange anyone's authority and opening time for each door, just carry a card, without wearing a lot of heavy Keys, and more secure than keys.
Installing an access control system on the door of the company's leadership office can ensure that the information and documents of the leadership office are not leaked by other people, and can give leaders a safer and quieter private environment.
Installing an access control system on the development technology department can ensure that core technical information is not easily stolen by outsiders. It prevents employees from other departments from going to the development department to affect the development work.
Installing an access control system in the financial department can protect the security of property and the security of the company's financial information.
Installing an access control system on the gate of the production workshop can effectively prevent idle people from entering the production workshop and avoid potential safety hazards.

Access control system government agency

It can effectively regulate office order, prevent illegal personnel from impacting government offices, and protect the personal safety of leaders.
Application of access control in medical hospital system:
Can prevent outsiders from entering infection areas and precision instrument rooms.
It can prevent someone from bringing bacteria into the sterile room such as the operating room because of emotional excitement.
It can prevent illegal groups from impacting the hospital's management department, so as to avoid emotional damage to public property and medical workers and hospital leaders.

Access control system grid

Typical base stations and substations of power supply bureaus have the following characteristics: There are many base stations and large system capacity is required. The distribution range is very wide, even hundreds of square kilometers. They have their own network for networking. Maneuver the staff on site at any time.
The implementation plan is: Adopting a network-type access control controller for remote management through a local area network or the Internet
Advantages and disadvantages of password access control system
By entering the password, the access control system determines that the password is correct and then drives the electric lock to open the door for release.
Pros: Just remember your password, no need to carry additional media. Lowest cost.
Disadvantages: It is slow. It usually takes several seconds to enter the password. If there are too many people in and out, you need to queue. If you make a mistake, you need to re-enter it, which takes longer. Poor security. People next to them can easily remember others' passwords through gestures. Passwords are easy to forget or leak. Trend: There are fewer and fewer occasions for password access control, and it is only used in occasions with low security requirements, low cost, and infrequent use. For example: safe.

Access control system mobile staff management

In 2012, Baiyun District clarified its work ideas, formulated work plans and guidelines, and piloted the Shijinghuan Community as a pilot. Through the introduction of points and areas, the city took the lead in implementing the construction of electronic access control systems for rental housing. Implement unified installation and centralized management; in the operation mode, it is compatible with the city's mobile personnel information system, combined with the "personal house" information management and security management, using an "access control" key to register a rental house information and collect a mobile person Information, apply for a residence permit, and conduct a security inspection to form an information management model of "technical house management and system management". Through system monitoring, all the housing data and population living conditions of the Central Economic Association can be grasped at any time. "How many houses are rented out, what kind of people live in them, what is his daily behavior, and you do nt need to come to the door to understand it clearly. The preliminary effect of" three rises, two drops, and three transitions "has been initially achieved. That is: the "person house" admission rate, accuracy of information collection, and residence permit application rate have increased significantly; criminal security cases and security incidents in rental houses have significantly decreased; mobile personnel have changed from passive registration to active declaration, and public security management has changed from ex post to ex post In the transformation, the management of rental houses has changed from a single "manager of the house" to "manage the house by the key", effectively solving the problem of the management of the rental house.
Review of the access control building industry in the first half of 2011
After the first half of 2011, the access control building industry is still hot. Cards, wireless access control systems, the Internet of Things, smart homes, and building intercoms are all flourishing, and they are a lively scene. Here, ZOL editors will sort out the industry trends in the first half of the year, and take you back in the most plain language. Card: Information sharing, centralized control
The most fundamental requirement of the card system is "information sharing and centralized control". Therefore, the design of the system should not be a simple combination of individual functions, from a unified network platform, a unified database, a unified identity authentication system, data transmission security, and various types of management. The technical implementation considerations of the overall software design ideas such as system interfaces and exception handling allow intelligent management of the comprehensive performance of each management system and each card reader terminal device to achieve the best system design.
The "One Card" card must be a smart card with multiple partitions and partition password verification. It has versatility, compatibility, security, and reliability. This is a prerequisite for "One Card". Read-only, not write, card with no area, no anti-counterfeiting, and not multi-purpose cannot be "One Card".
"One card" is an inevitable trend in the development of the smart card field. It is a complex and sophisticated system application project. Its hardware and software must meet certain conditions and standards. Otherwise, it is difficult to achieve the true "one card". To gather all the functions needed in daily life on one card, you need all the partitions that contain these functions and a huge and unmatched unified network platform, unified database, unified identity authentication system, and so on. So this road is still long.
Wireless access control system: no wiring, reliable, energy saving
The access control system is accompanied by a lot of wiring from the first day of its birth. A complete access control system consists of eight modules: card reader, controller, electric lock, door switch, door sensor, power supply, and management center. Modules need to be connected. At the same time, the front and back of the door frame, the top, and the top of the door must be perforated to install equipment. Therefore, tedious construction is a very intuitive problem.
Wireless IoT access control simplifies the equipment at the door: a battery-powered lock. There is no need to install any auxiliary equipment around the door except for opening holes on the door. The whole system is concise and clear, which greatly shortens the construction period and can also greatly reduce the cost of subsequent maintenance.
Frequency hopping and encryption are another core of wireless access control. A big difference between wireless and wired is that wireless signals are propagated in the air, so they are easily susceptible to external interference and are also easily captured by the outside world. Therefore, security and reliability can be said to be the lifeline of wireless access control products.
Internet of Things: Talent building is key
With the development of the Internet toward broadband, mobility, and ubiquity, smart cities will make people's work and life safer, more efficient, and more comfortable. So, what are the current challenges facing the development of China's Internet of Things? Dr. An Xiaopeng, an informatization promotion department of the Ministry of Industry and Information Technology, and an expert on Internet of things planning and policy, put forward three points for the development of China's Internet of Things industry: First, China's Internet of Things development The challenges of Internet development are not only technical problems, but also market scale applications; secondly, it is necessary to cultivate some enterprises that can integrate the upstream and downstream links of the Internet of Things industry; finally, to resolve the contradiction between demand and immature technology, both technology and Market integration.
Jiang Defeng, a researcher at Guomai Internet of Things Technology Research Center, affirmed Dr. An Xiaopeng's point of view, and pointed out that the Internet of Things is the DNA for building a smart city, and talents are an important driving force for the rapid and healthy development of the Internet of Things industry. One of the main factors of industrial development. Jiang Defeng introduced that according to the research of Guomai for several years, they recognized that the talent training system of the Internet of Things is diamond-shaped, with enterprises as the mainstay, supported by universities and research institutes, and supplemented by professional training institutions. Enterprises are the driving force and practitioners of the development of the Internet of Things industry. Universities and research institutes are the supporters of the development of the Internet of Things industry. Professional training institutions are the lubricants and boosters of the development of the Internet of Things industry. The four must support and cooperate with each other. , And jointly promote the construction of a reasonable and perfect IoT talent training system.
Smart home: clear diversification trend
Urban life is fast-paced and stressful. In addition to the increasingly severe pressure of the workplace, family pressures such as caring for children and caring for the elderly have gradually become the main source of stress. The term "empty nest elderly" is prevalent, and more and more phenomena have shown that the problem of caring for the elderly and caring for children, which is more common in China's 421 structure families, has become an urgent and realistic contradiction. Half of China s 167 million elderly people live in "empty nests." Parents who go out to work and are left unattended by children are passed on to these empty nesters. This makes the problem even more complicated. The draft "Old Age Law" will Take a look at "write the law, and sound the alarm for this phenomenon. Due to the continuous development of the economy and society, people's lifestyles are constantly changing. Household security and care products will play the role and medium of communication between families and family relationships. Products that are equipped with monitoring systems when children cannot be accompanied by care Much favored.
How to know the living conditions and health status of the elderly at home in time when working out? How to see a newborn child at any time without delaying normal work? How can a thief who enters the house know when an alarm occurs in time? As a product branch of smart home At this time, the monitoring equipment is no longer a frosty machine. It has become a super nanny who can solve these problems and a member of the family who can interact and communicate. It can watch the real-time video of the home through any computer or 3G smart phone connected to the Internet. It has a dual monitoring and alarm mechanism combining intelligent video motion detection and infrared detection. When there are personnel or When the object moves, it will immediately capture the scene photos and start the camera function. It will send alarm information to the user's mobile phone and send the captured photos to the user's e-mail address. At the same time, the videos and photos during this period will be stored in The memory card in the product guarantees the timely and accurate alarm.
With the rapid development of science and technology, smart home products are also constantly developing and seeking breakthroughs. It is no longer just a single enjoyment function, but has now developed in a diversified trend. Incorporate "big wisdom" into the "small details" of daily life, think what users think, give users what they need, and use intelligent methods to resolve the contradictions left by society. If the Internet has changed our lives, the emergence of monitoring systems in smart homes has completely changed the definition of home, and can understand the situation at home anytime, anywhere. Some people in the industry have made such calculations. There are more than 200 million urban households in China. According to the most common household security products, it is calculated at 1,000 yuan. If 30% of these households use it, it will generate a new market share of 60 billion yuan. This is only A more conservative estimate. In summary, home security products have unlimited business opportunities in the smart home market, and the prospects are promising.
Building Intercom: Digital is Hot
The building intercom system will be the basic configuration of the intelligent building community. In the design of new commercial housing, some cities have already enforced it. The building intercom system has developed from ordinary intercom to black-and-white video intercom and color video intercom, with more diversified functions. For example, the door phone introduces image recognition technology and fingerprint recognition technology to make the system more user-friendly; the use of audio and video digital technology and ARM embedded technology can directly connect the system to the broadband network, and Bluetooth technology can be used to implement a wireless building intercom system without wiring, etc. .
With the development of the real estate industry, the digitalization of benchmark real estate is all the rage, and digital building intercoms are hot. Building intercom companies have connected digital, network and building intercoms. TCP / IP building intercom technology is becoming more mature and starting After being put on the market, its efficient and convenient features make digitalization and TCP / IP technology quickly recognized by the market. Traditional analog intercom systems, when the size of the cell is too large or there are many floors, will inevitably appear due to the video transmission distance. The problem of signal blur caused by too far; at the same time, on the multi-channel problem, there are congenital weaknesses, it is difficult to overcome well. Using digital technology can solve these two problems well. That is, the networking part uses the standard TCP / IP protocol to transmit compressed audio and video digital signals. Because video, audio, and control information are all digital signals, there is basically no signal attenuation problem, and it can easily meet long-distance transmission requirements. In addition, the networked physical network uses a standard Ethernet architecture and network sharing to easily meet multi-channel requirements.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?