Application of the most fire door forbidden system

  • Detail

The application of access control system in intelligent buildings

the common traditional method is that the staff in the reception room register and release the entry and exit personnel. This method is laborious and easy to cause errors. Electronic access control system brings simple procedures to this series of work. The system works in the form of personal identification card, and sends a personal identification card to each person who has the right to enter, which is equivalent to a key. According to the card number and current time information of the card, the system determines whether the cardholder can enter. If so, it will open the door automatically, otherwise it will not open the door. For places requiring attendance, the access control system can also record whether each employee goes to and from work on time. Another advantage of the access control system is that you can add or delete a card at any time without worrying about the loss caused by the loss of a card. The specific functions of the access control system are as follows:

1) registration card. All newly added cards should be registered. When registering, enter the card number, name, valid period and other information. After the registration is completed, the card can be used within the registered valid period to open the door

2) delete the registration card. When the identification card is lost or cannot be used for some reason, the card can be cancelled at any time. Enter the card number to be deleted to cancel the card

3) record the card reading information and control the opening and closing of the door. When someone reads the card, the controller will read in the signal that the middle beam and workbench of the card reader should be often coated with anti rust oil, judge whether the card is valid according to the card number, current time and registration information, control to unlock or not, and record the card number and time at the same time

4) real time monitoring. Set the system to the real-time monitoring state. At this time, every time the card is read, the card number, registration, validity and invalidity recorded by the controller will be immediately displayed on the computer. In addition, the status of the outer door (open or closed) can also be displayed in real time

5) statistics and attendance function. By setting the shift and time, the system can perform attendance statistics on all stored records. For example, query someone's commuting situation, normal commuting times, late times, early leave times, etc. in a certain period of time, so as to carry out effective management

6) extended functions. According to special needs, the system can be externally connected with password keyboard input, alarm signal input and relay linkage input, and can drive audible and visual alarm or start camera and other equipment

composition of access control system

access control system is composed of card reader, controller, electromagnetic lock, identification card and computer. For identification cards and card readers, they can be divided into two categories: contact and non-contact. The so-called contact type means that the identification card must be inserted into the card reader or scratched in the slot before the card number can be read, such as IC card, magnetic card, etc. this kind of card and card reader has inevitable disadvantages: magnetic card is very vulnerable to strong magnetic interference and data loss, easy to be copied, easy to lose data under friction, damp heat and other conditions, and short service life. Contactless card reader means that the identification card can read the data in the identification card at a certain distance without contacting the card reader. Motorola and HP both adopt the latter. Employees only need to point the card reading area on the card at the infrared ray on the card reader, and the door will automatically open

controller is the core of access control system, which is composed of a microprocessor and corresponding peripheral circuits. If the card reader is compared to the eye of the system and the electromagnetic lock is compared to the hand of the system, the controller is the brain of the system, which determines whether a card is a valid card registered in the system and whether the card meets the limited time period, so as to control whether the electromagnetic lock is opened

classification of access control systems

access control systems are divided into two categories: connected and single door

the linked access control system includes: induction card, card reader, electromagnetic lock, controller, signal transceiver, computer and system software. Taking Motorola North Asia Center as an example, the company requires that employees be divided into five levels for management, including the top management, senior staff, ordinary staff, guards and cleaners, and stipulates when different departments (levels) and individual employees can enter which offices. There are many kinds of internal doors in the company, including automatic glass doors, single door glass doors, double door glass doors and wooden doors. For different types of doors, different types of electric locks are required. Generally, magnetic locks are used for single glass doors, electric plug-in locks are used for double glass doors, and electric female locks are used for wooden doors. For the double glass doors at the elevator lobby on each floor, most employees are required to be card free, so the remote sensing card reader is selected, and its maximum sensing distance can reach more than 70cm; Other office doors use card readers with an induction distance of 12 ~ 15cm

single door access control system includes: induction card, card reader, electromagnetic lock, controller and power box. Compared with the linked access control system, it has fewer functions such as statistics, query and attendance, and is more suitable for places without recording historical data

installation and commissioning

the host is similar at home and abroad

in order to ensure that the system operates well if the absolute moisture content is 5g/kg (refers to 5g of water vapor in 1kg of dry air), the following aspects should be paid attention to during the installation of the entire access control system. For card readers and door opening buttons, special attention should be paid to electromagnetic interference, especially the interference of lighting switches, electric typewriters and computers. If conditions permit, the installation position of the card reader should be more than 30cm away from the strong current power supply. The distance between the controller and the card reader should be considered in the installation of the controller. The ideal transmission distance is within 50m. For signal transmission cables, cable shielding and signal attenuation caused by long-distance transmission must be considered. During pipeline construction, wire pipes and cable trays made of steel should be used, and reliable grounding should be done

system debugging is the key link to ensure the quality of access control system. The focus is on the debugging of the controller and the operation of the system software. The debugging process of these two parts must be carried out by the manufacturer at the same time. The function of the controller is that in addition to the input of the card reader, it should also have the function of relay linkage output. The linkage output function is very important. It is required that the entire access control system should start some alarm devices immediately after illegally opening the door, such as cameras, alarm horns, etc., and should always check the tools

the system software should choose to operate the software based on Windows 98 or Windows NT platform. The system software should reflect the aforementioned functions of the entire access control system

Copyright © 2011 JIN SHI