Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

होम> ब्लॉग> The status quo and trends of the development of access control systems

The status quo and trends of the development of access control systems

November 10, 2022
The status quo and trends of the development of access control systems First, the development of the access control system and the status quo RS485 communication in the number of nodes, transmission distance, communication speed and other aspects of the limitations of its application, especially the application of large-scale access control systems. The access control system based on TCP/IP network communication has the advantages of no-node limitation, wide coverage area, fast communication speed, and small interference, and it is fully ahead of the RS485 bus system, which naturally will be favored by many users.

At present, some access control systems using external or built-in network converters on the market are actually using RS485 to TCP/IP intermediate devices, which are not true network access control. The access controller used in the true sense of the network access control is generally implemented by a 32-bit ARM7/9 microprocessor.

The access control system adopting the full TCP/IP method can make full use of the established network resources. The amount of new wiring works is small. It can be used across regions without distance limitation, and information transmission and storage capacity can be greatly improved. However, if the project does not have a network, the special installation of the network will increase the cost of the initial investment. At present, it is mainly used in large-scale systems with more than 100 doors.

Another aspect of access control system technology development is the integration of access control systems and other building intelligent systems, mainly integrated video surveillance systems, intrusion alarm systems, perimeter detection systems, fire alarm systems, and building automation systems. This combination provides Effective structure to enhance each other's systems complement each other. For example, once there is an event that triggers an alarm, it will send a signal to the video surveillance system to provide real-time recording of the incident scene, and the linked access control system will block the corresponding access control channel.

Second, the access control system networking and network security technology issues 1. Networking and security Network access control systems currently have two networking methods. One is the access control system based on RS485 bus networking. The other is the "IP network access control" of the network access control system. The "IP network access control" refers to the access control system of the access control controller and the access control server using the TCP/IP protocol.

In the past, most of us were concerned about the reliability of access control systems. At present, the security of access control systems has received more and more attention. In particular, the security requirements for access control systems of certain countries' confidential departments and confidential departments are even higher.

Compared with the traditional access control system based on 485 bus network, the advantages of IP network access control are mainly reflected in: (1) greatly improve the system response speed, for more than 100 access control points above the access control system, especially for video linkage requirements occasions, Should be preferred; (2) improve system reliability, RS485 twisted pair bus technology is mature, easy to use, but poor anti-jamming performance; (3) improve system scalability, IP architecture is more suitable for standardization of the system expansion, and off-site It is the best choice for networking users to use. (4) Improve the maintainability of the system. The IP network access control facilitates remote diagnosis and maintenance. Compared with the traditional access control system based on the 485 bus network, the IP network access controller should be higher than the RS485 access controller.

For the network security of the two networking systems, any kind of network communication is subject to the risk of being intercepted or modified by a third party. The RS485 bus communication technology is simpler than the IP network access control using TCP/IP protocol networking. "Easier to be attacked.

The TCP/IP protocol is the most widely used network communication protocol and has powerful communication capabilities. However, TCP/IP protocol packets are easily monitored and intercepted by dedicated software during the transmission process. The TCP/IP protocol in the network is easily communicated by third parties. Eavesdropping or modification.

The main danger of this kind of threat is that the access authority in the access control system and the administrator's user information and password are easily intercepted. The most terrible danger is the possibility of legal communications being modified, the modified information being used for illegal access, and even blocking the interception of real-time alarm events, etc. will cause incalculable losses to the customer's security.

TCP/IP communication packets are intercepted and executed in many ways. Changing the direction of the message causes the hosts on the network to change the address of the packets they send during the network session.

A saboteur interested in truncating a conversation may use one method to set up relays. A relay failure can occur anywhere in the network, even at a distance from the client system. The relay machine can adjust traffic in real time or record packets for later analysis. The relay machine can also change the content of the transmitted communication.

The method of obtaining the communication content only requires a passive packet monitor (often referred to as a "packet sampler"). The packet sampler can provide the logged network information to the deliberately destructive system security in a relay-broken manner.

Currently, 99% of the TCP/IP access control systems used in large-scale projects such as subways, banks, unattended equipment rooms, telecommunication power, military, and national government agencies have no network-level anti-intrusion security mechanisms. Since customers do not understand the potential risks of being hacked at any time, once they are attacked, they will directly threaten the normal operation of the customer; they will even cause major loss of people and property, and thus the security of the TCP/IP access control system will become anxious. The problem to be solved.

2. Application of network security access control system in order to ensure that the current data communications security and access control systems, network security technology mainly used are: security cryptography, Weika prevention technology, device authentication, intrusion detection, data transmission Encryption technology, data storage, backup and disaster recovery technologies. The following lists the application of several common network security technologies in ensuring access control systems.

Borrowing a VPN Network Channel Method This method solves the threat of illegal computer attacks outside the VPN tunnel. The disadvantage is that there is also the possibility of illegal computer attacks from inside the VPN tunnel.

This method provides each controller with a separate VPN device. The advantage is that each device in the system has an independent security channel, which effectively solves the threat of internal and external computer attacks. The disadvantages are very high investment costs and high maintenance costs.

The use of high security encryption technology of the network door vegetable equipment such as Siemens's SIPASS access control system, the use of SSL encryption technology in this type of product communication services, communication services software and management between the customer full and the controller communication through SSL encryption, Decryption, authentication, and other strict security detection mechanisms to complete.

At present, online banking security encryption uses SSL encryption technology. The comprehensive system security mechanism in this kind of access control system products ensures the security of customers in complex network environments. It is characterized by satisfying customers' high security of the entire system. The requirements are relatively cost-saving, and can also significantly save on subsequent use and maintenance costs. This is a very valuable option.

III. Integration and Information Sharing of Access Control Systems and Other Systems With the rapid development of digital networking and building intelligent technologies, the integration of access control systems with other systems will become closer, and the scope will become wider and wider, infiltrating into all areas of society. And play an increasingly important role. In addition to access control, attendance, documents, patrolling, dining, consumption, fitness, medical care, parking, book information, meeting attendance, visitor management, elevator control management, office equipment management, club entertainment, three watches and property payment, etc. Also with other intelligent systems necessary integration and linkage, such as anti-theft alarm, closed-circuit monitoring, fire alarm, and even building automation systems.

In addition, the system will also make data interfaces with systems such as ERP, such as attendance and payroll, personnel management, and other interactive data, which are mutually supportive.

The network access control system has the following features:

Data sharing: Utilize system resources to speed up data exchange.

Real-time monitoring: Real-time monitoring of all terminals in the system.

Quick Search: All records can be retrieved at one time in the same database, improving efficiency and accuracy.

Comprehensive statistics: All statistical reports can be completed in the management center.

Convenient management: Management of all systems can be completed in the management center.

Building intelligent systems development to the present, network access control and card management system integration already is a big trend, simple patchwork "card" can not meet the real needs and requirements of internal card system to achieve seamless connectivity, as well as external The organic linkage of other intelligent systems.

There are two main ways to implement the linkage between the access control system and other systems. The first one is the hardware method, which uses the dry contact of the access control system output relay to the matrix alarm input module of the analog television monitoring system and the alarm input end of the DVR to achieve control. Image capture and monitoring of the door or related parts. This kind of integration method is the most commonly used and the most basic one in the past. However, the problem is that afterwards, it can't be queried through more efficient means. At the same time, installation and debugging are quite troublesome.

The second type is a software access controller with a digital video server (encoder) function. The digital monitoring system simultaneously implements the dual data exchange function from the device protocol layer to the software database layer. Another method is to directly integrate the program of the access control management system software in the SDK of the DVR video capture card, and connect the DVR equipment through the access control system software function item. The above two software methods have their advantages and disadvantages. The advantage of the former is that the system responds quickly and there is no delay. The disadvantage is that the video data must be stored in the local management host, and the capacity of the host hard disk must be high. The latter has the advantage that the local management host does not need to save the video stream data, and only needs to call the data in the remote DVR when needed. The disadvantage is that the associated video will have a delay of about 1-3 seconds and cannot be abnormal at the channel. The previous video was called. In addition, there is also a software approach that is integrated by an intelligent system platform. This software is provided by the equipment provider's OPC standard interface or data development package, and then developed by a professional software vendor, in the third-party software. Show in and out of data and video information, such software also integrates various systems to achieve the purpose of unified management, the drawback is a long development cycle.

Fourth, the development trend of the network access control system In summary, the network access control is based on TCP/IP communication access control system, the use of TCP/IP communication protocol access control system has the advantages of communication speed, the network is not limited distance, network resources The number of easy-to-obtain, system-manageable controllers is large. Therefore, access control devices that use this protocol as a networking mode have become mainstream products for large-scale access control system projects and remote management access control system projects. Compared with the traditional access control, it has greatly improved the communication and real-time monitoring, data transmission, networking, etc., and improved the shortcomings of the lack of real-time RS485. It has broken through the early single RS485 bus access to 128 The limitation of the station controller is changed from a bus network to a star structure. Any problem at any point will not affect the system. The system failure is also easy to find and eliminate.

Needless to say, the security industry as intelligent, integrated, continuous development of network-based, access control systems will embark on a new path, and the entire security video surveillance systems, burglar alarm systems, and fire alarm systems and building automation systems, etc. Taiwan has become a development trend; in addition, information sharing and seamless integration between building and architecture intelligence subsystems will surely be the direction of development of access control systems.
संपर्क करें

Author:

Ms. Yanjun Chen

ईमेल:

quentin@zecheng.com.cn

Phone/WhatsApp:

+8613602572892

लोकप्रिय उत्पाद
You may also like
Related Categories

इस आपूर्तिकर्ता को ईमेल

विषय:
ईमेल:
संदेश:

Your message must be betwwen 20-8000 characters

होम

Product

Phone

हमारे बारे में

जांच

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

भेजें