Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

होम> ब्लॉग> Briefly explain the basics of 21 access control systems

Briefly explain the basics of 21 access control systems

July 21, 2023
1. In the access control system, how can we effectively prevent the tailgating?

A: Anti-trailing has always been a difficult problem for access control systems. The following methods are recommended:

Change the door: Install the quick-through door (or three-roll gate). This method also has its shortcomings, such as the speed-through door, which is basically used indoors, only 55cm wide, only one person is allowed to pass, and there is a counter alarm function. If two people pass at the same time, an alarm will be generated. The three-roll gates can be used outdoors, but for those who have crossed over from above, the preventive effect is not ideal, and three-roll gates and other methods are suitable for places such as security exhibitions.

2) Add and remove card readers. If a person follows the card holder and enters it, he must also swipe the card to open the access door in order to achieve the purpose of preventing the tailgating. However, when they go out, if they also go out with the cardholders at the same time, it will not be able to achieve real anti-trailing.

3) Two-way read card plus double door interlock this way. Two-door interlocking basically solves the problem of trailing, because if you want to open a second door, the first door must be locked, or the second door cannot be opened at all. There is also a more cumbersome way to install the camera, is the use of image processing technology to detect the portrait (of course, through the camera to capture the image), but this method is cumbersome and requires a lot of knowledge outreach.

4) If the security level is particularly high, full-height doors or higher-level interlocking doors (two doors, one is weighed after a person enters, and then the second door opens) can achieve true anti-trailing; the disadvantage is that the price of such doors is not Philippine.

2. The intercom extension cannot open the door. How to troubleshoot the fault?

A: The fault description is not detailed. If you provide a more detailed fault description and electrical schematics, you can more clearly give the answer. Therefore, the following can only provide several kinds of possible failures: It may be that the electric control lock is broken, the signal is hesitant or the electric control lock's line contact is not good. In addition, you can also check whether there are any problems on the household line;

Another possibility is that the extension is broken. If the other extensions on the system cannot be unlocked, it indicates that there is a problem with the main line of the system or the power lock is broken. If the instantaneous voltage provided by the unit door machine to the electric lock is not reached, the extension may not be able to turn on; it is also possible to check the button of the extension to unlock and detect if it is broken; the last possibility may be an error in the coding.

3. When the manager talks with the door machine, the microphone of the door machine screams. How to deal with this problem?

A: This phenomenon may be caused by improper wiring. Normally, one power supply and one G-line are connected. The G-line is connected with one more cable; the other possibility is that sound adjustment is not appropriate.

4. Can the hosts and extensions of different brands be compatible with each other when maintaining the area?

A: It is impossible to be compatible. For the bus, because the cabling mode and protocol may not be the same, the compatibility may be almost zero unless two manufacturers' bottom-end protocols are found.

At present, there is basically no standard for video intercom products. Products from different manufacturers cannot be interconnected. The video intercom subsystem can not basically interconnect with other weak electronic systems. The reason is that there is no standard. Without standards and lack of openness, the system cannot be interconnected, and it will be impossible to ensure long-term product warranty and service, and the industry cannot develop healthily. Therefore, the market is very much looking forward to the emergence of standardized and open products.

5, an old district renovation project has a deaf grandfather, want to from the extension and a lighted bell, downstairs call when the light reminds to open the door, I do not know how feasible and how to connect?

Answer: It is possible to use the ringing signal to modify the circuit. The trigger signal is led through the relay switch to the circuit of the bell and the lamp in series. The contact switch is turned into a double-contact switch. When the button is pressed, there is an idle dry signal at the same time to drive visual signals such as flashing lights or ring tones.

6. Community unit access control is not network intercom networking, access control is Shenzhen Chuangtong products, intercom is Taiwan products. It is now necessary to have the unit door unit and the unit access control together with the control unit door lock, but the intercom engineering party believes that it is not so good to control the door lock. Is this?

A: For a simple switch signal, if both systems are you doing, it should be no problem, plus a relay can be solved. If the access control is the priority, the door opening signal line of the intercom can be connected to the terminal of the door opening button of the access control, and no relay is needed. Add a simple triode switch circuit to control the unlocking relay of the original intercom system, so as to avoid mutual interference.

7, old-fashioned video intercom host, there can be no object near the back of the host, otherwise there will be bee eating sound, what is the reason?

A: The typical self-excited horn and microphone, the speaker is generally transmitted sound waves close to the object, the sound wave back through, resulting in self-excitation. The reason for the malfunction is that the sensitivity of the speaker is too high. For a potentiometer, try to adjust the sensitivity of the speaker and turn the speaker's sound down. You can also adjust the sensitivity of the microphone to debug the direction of the microphone and solve the problem by adjusting the device.

8. A floor guard is installed at a floor of a certain building. If a different brand of access control is installed in the second floor, two sets of door entrances are independent. Can the B building access control use the IC card (or ID card) of the A-building access control system, and does the A-building access control function remain unchanged?

A: Theoretically, it's just a problem with the access controller. But first of all, it is necessary to figure out what card was originally used. For example, it is a smart card or identification card of some companies, some are dedicated cards, and some are encryption cards.

9, the building intercom host has noise, the extension noise is too loud to hear the voice of someone coming. Is the power problem? If so, what should I do? Not how? How can this kind of problem be avoided?

A: This should consider what brand of intercom system, as well as the wiring line selection model, more importantly, to find out where the interference, it may be caused by harmonic aging of the power device aging, can be changed Phase filter good power supply try, the best solution is to update the power supply. The second is to see if there is good contact with the ground.

10. What are the differences between IC card and ID card?

Answer: 1) The definition of IC card and ID card:

The IC card is called the Integrated Circuit Card, also called Smart Card. Can read and write, large capacity, encryption, data records, reliable, more convenient to use, such as card systems, consumer systems, etc. Currently, there are PHILPS Miifare series cards.

ID card full name identification card (Identification Card), is a non-writable proximity card, with a fixed number, mainly SYRIS Taiwan's EM format, the United States HID, TI, MOTOROLA and other types of ID cards.

2) When the IC card is to be initialized (ie, encrypted), and the ID card is not used when the IC card is in use, it must first pass the unique two-way key authentication between the IC card and the read/write device before the related work can be performed, thereby making the entire work possible. The system has extremely high security.

Therefore, the factory IC must be initialized (ie, encrypted) in order to generate a non-decryptable one-card system key in the IC card after leaving the factory, so as to ensure a secure distribution mechanism of the card system. After the IC card is initialized and encrypted, it is handed over to the user, and the customer uses the IC card issuing system to generate a private key for each user card. In this way, it is ensured that user cards issued in other user systems cannot be used in the system, which ensures the specificity of the system and thus ensures the safe use mechanism of the system.

Like the magnetic card, the ID card only uses the "card number". In addition to the card number, the card has no security function, and its "card number" is open and bare. So, the ID card is the "inductive magnetic card", but the main question is simply not needed or does not require initialization.

Why does the initialization process not be done by the user himself? This is because:

1) If the user initializes himself, he/she cannot prevent the cheating inside the user. Because when the user uses the card system, if an employee uses the socially purchased card to initialize it at will, he can freely issue a household card that can be used by the household and can even freely recharge the card. This will not only result in serious cheating consequences, but also This will lead to serious flaws in the use mechanism of the security of the card system.

2) In addition, if the user purchases a defective factory card and initializes it and cannot use it on the system, the system will use poor performance or defects, which will result in unclear liability for accidents.

3) The initialization process is performed in the factory, mainly the basic needs of the IC card security key authentication mechanism, and is also the line of the IC card system integrator. Just like the urban public transportation IC cards, before the cards are handed over to the public transport system, the key of each card must be controlled by factory encryption.

4) If the key card for initializing the authorization is lost due to lack of professional management by the user, the user and the manufacturer cannot use the card. Therefore, the initialization work is done by the manufacturer only to ensure safety.

11. Comparison between IC card system and ID card system 1) Security: The security of IC card is much larger than that of ID card. The card number in the ID card is read without any authority and is easy to copy. The reading and writing of the data recorded in the IC card requires corresponding password authentication, and even each zone in the card has a different password protection to fully protect the data security. The password for the IC card writing data and the password for reading out the data can be Different settings provide a good level of management to ensure system security.

2) Recordability: The ID card cannot write data, and its record content (card number) can only be written by the chip manufacturer once. The developer can only read out the card number and use it. It cannot formulate new number management according to the actual needs of the system. system. The IC card can not only read a large amount of data by an authorized user, but also can authorize the user to write a large amount of data (such as a new card number, user's authority, user information, etc.), and the content recorded by the IC card can be erased repeatedly.

3) Storage capacity: The ID card only records the card number; the IC card (such as the Philipsmifare card) can record about 1000 characters of content.

4) Offline and networked operation: Since there is no content in the ID card, the card holder's authority and system function operation can fully rely on the support of the computer network platform database. The IC card itself has recorded a large amount of user-related content (card numbers, user data, permissions, spending balances, and other large amounts of information), and can completely run off of the computer platform, to achieve a network and offline automatic conversion mode of operation, to achieve a wide range of use, Less wiring requirements.

5) One-card extension application: ID card can only rely on network software to process information of each subsystem due to no record, no partition, which greatly increases the dependence on the network; if the ID card system is completed, the user wants to increase the function point. It requires additional cabling, which not only increases the difficulty of construction, but also increases unnecessary investment. Therefore, using an ID card as a system makes it difficult to expand the system and it is difficult to realize a true card.

The IC card storage area itself is divided into 16 partitions, each partition has a different password, with multiple sub-systems * management functions, such as the first partition to achieve access control, the second partition to achieve consumption, the third partition to achieve employee attendance, etc. . Fully realize the purpose of one card, and can achieve complete modular design. Even if users want to increase the function points, they do not need to re-wiring. They only need to add hardware and software modules. This facilitates the IC card system to upgrade at any time by ping, and achieve a smooth upgrade. ,Reduce repetitive investments.

6) Maintenance and operation of intelligent systems:

For example, if a computer issues a new user ID card, it must be able to cross the network of the ID card system and manually download all ID card numbers to each ID card reading pupil controller. Otherwise, the ID card is used as an infinite number of cards. Cannot be used; if you want to change user rights, you need to enter the ID card number with permission on each ID card controller.

Another example is that if an ID card is frequently added after the system is put into use, if you add a card or change the permission of a card every year, you must enter the card number on the controller that is available for the card. The workload and time for manual operation and maintenance have been greatly increased. In addition, if there are several more single card subsystems, or when the subsystems are slightly larger, the complexity of system maintenance and management will increase geometrically, which will directly lead to the failure of the system. run.

With the IC card's one-card system, after the IC card is issued, the card itself is a data information carrier. Even if the communication network is disconnected, the read-write controller operates as an offline reader/writer. If user rights are changed, the user's authority can be directly Written in the IC card, the new user to change the permissions simply modify the card, completely without having to modify the various controllers, from the technical mechanism to avoid the manager everywhere to change the controller card permissions to achieve the management efficiency The purpose of intelligent management.

7) Value for money:

Although ID cards and card readers are cheaper than IC cards and their card readers, the price of the two systems is comparable to that of the entire card system (wiring cost, structure composition), and the IC card system is more than the ID card system. The operation is stable and reliable, so the cost-effectiveness of the IC card system is much higher than that of the ID card system.

In addition, taking into account the fact that today's residential hardware environment is not very mature, system personnel are not very familiar with the reality of computer knowledge, it is impossible to establish or maintain a complete network system to support the ID card card 24 hours of continuous operation. Therefore, it is a better choice for today's users to meet the smart card IC card system that is suitable for networking and offline operation.

12. What is the furthest reading distance for a passive M1 card for a parking lot?

A: The distance of the M card mainly depends on the power of its reader, the speed of data exchange, and its frequency modulation method. Passive card in the absence of the antenna induction distance of about 3-5 meters, plus the antenna can reach up to 8 meters, the current situation in the passive, M1 card can not do ultra-long distance card reader.

13. What are the output formats of the reader?

A: The reader output format is now commonly used: RS232, RS485, WG26, WG34, ABA. ID ABA code (also known as Manchester code) coding method also has the following two common:

1) If the card reader adopts hexadecimal in the 8H format, the ABA code is "192D9D" and the decimal code is "0026226077".

2) If the card reader adopts hexadecimal format of 6H format, the ABA code is "92D9D", and it is converted into decimal ABA code "0009448861". Decimal "0026226077" is converted into 8H format hexadecimal is "1902D9D", and converted into 6H format hexadecimal is "902D9D". This is why the ABA code read by the card reader is different from the ABA physical code on the card.

14, the card close to the reader, the buzzer does not ring, the lights did not respond, communication is normal. What's the problem?

A: Possible causes: (1) The connection between the card reader and the controller is not correct; (2) The reader-to-controller line exceeds the effective length (120M)

15, the valid card close to the card reader, buzzer sound, LED indicator no change, can not open the door, what is the reason?

Answer: Possible causes: (1) The reader and controller are not correctly connected; (2) The line is seriously disturbed and the reader data cannot be transmitted to the controller.

16. The use of the access controller has been normal. Suddenly all valid cards cannot be opened (become invalid) on one day.

A: Possible causes: (1) The operator has set a rest day for the access control device (on the rest day, all cards cannot be opened);

(2) The operator has initialized the access control or other reasons causing the controller to execute an initialization command.

17. Move the valid card close to the card reader. The buzzer sounds. The LED indicator turns green, but the door lock is not open.

Answer: Possible causes: (1) The connection between the controller and the electric control lock is incorrect; (2) Is the power supply to the electric lock normal (the electric lock requires an independent power supply); (3) The electric control lock is faulty; (4) Mechanical locking of the tongue and the latch.

18. When the valid card is close to the card reader, the buzzer sounds and the door lock is opened, but the light of the card reader is off?

Answer: (1) The controller and the electronic control lock share a power supply, which is the reverse potential interference when the lock is working, resulting in control reset; (2) The power supply power is not enough, causing the controller and card reader to not work properly.

19. What are the main wiring structures of networked building intelligent systems?

A: Mainly multi-core cable is adopted as the mainstream method. Video is transmitted using coaxial cable. Audio, data, and power are usually transmitted through RVV cables, and network cables can also be used. Such as Shenzhen Matsumoto intelligent (4 +1 mode), Xi'an Kaiyuan, Shenzhen Shide security, Xiamen Li Lin, Guangzhou Anju Bao, etc., while other manufacturers use two-wire signal modulation transmission, there are also wireless products.

In the wiring of the building intercom system, three issues need to be solved: audio quality, video quality, and data transmission quality. Audio transmission has 3-wire and 2-wire systems. 3-wire transmission can better solve signal amplification and adjustment problems.

Data transmission generally uses dedicated codec chips, CAN transceivers, and RS-485. Differential data transmission methods such as RS-485 have advantages in signal anti-jamming, and baseband electronic data transfer methods are highly susceptible to bus methods. Divided into dry bus (networking) and branch bus (unit), connected by the router (splitter).

20. What kind of wire should be used for the 8-floor building intercom? Three-wire and N+1 type?

A: According to the specific configuration requirements to determine, mainly related to the needs of the intercom function, the intercom is visual or non-visual, is the pass-through or coded or household intercom, different functions, modeling will have Subtle differences.

If there is no selected brand, the wiring proposal program: Visual: 6 core + 1 video; Non-visible: 4 core 21, how to install syris210nt2 series access control products?

A: First, the wiring 1) system centralized power supply A, system lines are divided into two types: power lines, signal lines.

Power Line: Mainly provides power to the electric lock and card reader. Distance within 50 meters requires cloth rvvp (shielded) X*0.5 line (X is the required line), distance is 50 meters and 100 meters is rvvpX*1.0, 100 meters to 15 meters is rvvpX*1.5.

Signal lines: mainly reader communication signal line, exit button control line, communication converter communication line, magnetic signal line and various data lines, twisted pair cable or shielded twisted pair cable rvvp line.

B. Each access point line is divided into: the power cord of the electric lock, the exit button line, the power line of the card reader, the communication line of the card reader, the magnetic signal line of the gate, and various data input/output control signal lines according to specific requirements.

2), system self-powered (distance control)

Only the signal line of the system line, generally rvvp line, twisted pair, shielded twisted pair. The signal lines are divided into card reader communication lines, electric lock control signal lines, exit button lines, door magnetic signal lines, and various data lines. All power supplies are powered by a dedicated access control power supply.

3) If there is a breakpoint in the middle of a line break, the breakpoint must be soldered with a soldering iron and insulated.

4) Before the line is tested, the line shall be tested to avoid breakpoints in the middle of the line. After the line is laid, the line shall be tested immediately to test whether there is any breakpoint in the line during installation. In the case of equipment, it is also necessary to test the line so as to avoid any damage to the line caused by any other construction of the line from the time it is installed to the installation.

5) Shielded processing circuit should be weakened wire slot, if there is no weak wire slot PVC casing. If you cannot take PVC sleeves, you need to leave the strongest power to the maximum extent and all lines should be shielded and grounded.

II. Commissioning Before installing the equipment, it is necessary to check the installation contract with the type and quantity of the equipment in advance and determine the correctness of the equipment from the warehouse.

After the equipment is taken out from the warehouse, it is necessary to test all the equipment one by one to check whether the equipment is normal and avoid hidden trouble during installation.

During installation and debugging: When the equipment is installed, first test the power supply for testing to avoid unstable power supply.

After the installation of the equipment, the controller shall be powered up and tested uniformly. After passing through the public, each device should be checked for proper operation.

If there is no problem with the above checks, the entire system can be rigorously debugged.

The above debugging needs to be done for each debugging record. During the installation of the system, it is also necessary to make a detailed record of the daily installation.

After the installation is complete, arrange the demonstration and Party A related person in charge and ask them to submit their opinions. And to discuss training matters. If training can be carried out immediately, Party A is required to list the various permission requirements that the system must implement. And according to the requirements set forth in the record, according to the requirements of the system software for a variety of related settings, to achieve the required functions, and make a variety of related training, and at the same time a good handover. If it is not possible to carry out commissioning training immediately, the commissioning training date must be negotiated. Also make a variety of transcripts, if the training after the completion of training must be signed by the trained personnel and related personnel of the relevant training and equipment transfer of documents.
संपर्क करें

Author:

Ms. Yanjun Chen

ईमेल:

quentin@zecheng.com.cn

Phone/WhatsApp:

+8613602572892

लोकप्रिय उत्पाद
You may also like
Related Categories

इस आपूर्तिकर्ता को ईमेल

विषय:
ईमेल:
संदेश:

Your message must be betwwen 20-8000 characters

होम

Product

Phone

हमारे बारे में

जांच

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

भेजें