Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

होम> ब्लॉग> What are the classifications and advantages of access control systems?

What are the classifications and advantages of access control systems?

June 03, 2022
[ Huaqiang Security Network News ]
According to the entry and exit identification method can be divided into:
Password identification
Card recognition
Biometrics
Password identification
What are the classifications and advantages of access control systems?
Incoming access rights are identified by verifying that the entered password is correct.
These products are divided into two categories: one is a common type, and the other is an out-of-order keyboard type (the numbers on the keyboard are not fixed, and they are automatically changed from time to time).
normal type:
Advantages: easy to operate, no need to carry cards; low cost.
Disadvantages: easy to leak, poor security; no entry and exit records; only one-way control. The keys are easily damaged and fail.
Out of order keyboard type (the number on the keyboard is not fixed, it changes automatically from time to time):
Advantages: easy to operate, no need to carry cards, a slightly higher safety factor
Disadvantages: passwords are easy to leak, security is still not high; no entry and exit records; only one-way control. high cost. The keys are easily damaged and fail.
Card recognition
The access rights are recognized by reading the card or reading the card plus the password, and are further divided according to the card type:
·Magnetic card
Advantages: low cost; one person and one card (+ password), safe and general, can be connected to the computer, there is a door open record
Disadvantages: cards, equipment wear and tear, short life; cards are easy to copy; not easy to control in both directions. Card information is easily lost due to external magnetic fields, making the card invalid.
RF card
Advantages: the card, the device has no contact, the door is convenient and safe; the service life is long, the theoretical data is at least ten years; the safety is high, the microcomputer can be connected, the door opening record can be realized; the two-way control can be realized.
Disadvantages: The cost is high, the ID/IC card has been cracked, and the safety factor is reduced. [1]
In and out is identified by examining the biometrics of the person. There are fingerprint type, finger vein, iris type, face recognition type.
Advantages: excellent security from the point of view of the identification; no need to carry a card
Disadvantages: high cost. The recognition rate is not high, the environment requirements are high, and the user requirements are high (such as fingerprints can not be scratched, the eyes can not be red and swollen, the face can not be injured, or the amount of beard), inconvenient to use (such as iris type and facial recognition) Type, the installation height position is certain, but the user's height is different)
It is worth noting that most people think that the biometric access control system is very safe. In fact, this is a misunderstanding. The security of the access control system is not only the security of the identification method, but also the security of the control system, the security of the software system, and the security of the communication system. The security of the power system The whole system is a whole, and the whole system is not safe. For example, some fingerprint access control systems, its controller and fingerprint reader are integrated, and should be installed outdoors when installed, so that the line that controls the lock switch is exposed outdoors, and it is easy to be opened.
By communication method
Offline type
RS485 network type
TCP/IP network type
Offline type: that is, stand-alone control type access control, that is, a machine manages a door, can not be controlled by computer software, can not see the record, and directly controls through the controller. It is characterized by low price, simple installation and maintenance, and can not view records. It is not suitable for places where the number of people is more than 50 or people are constantly moving (referring to frequent entry and resignation), and it is not suitable for projects with more than 5 doors.
485 networking: It is the type of access control that can communicate with the computer, directly using software for management, including card and event control. Therefore, it is convenient to manage, centralized, and can view records and analyze and process records for other purposes. The characteristic is that the price is relatively high, the installation and maintenance are difficult to increase, but the training is simple, and value-added services such as attendance can be performed. Suitable for many people, large mobility, and many projects.
TCP/IP network type: Also called Ethernet network access control, it is also a network access control system, but the computer and controller are networked through the network cable. In addition to all the advantages of 485 access control networking, it also has faster speed, simpler installation, more networking, and can be networked across regions or cities. However, there are high equipment prices and need to have computer network knowledge. It is suitable for installation in large projects, large numbers of people, speed requirements, and cross-regional projects.
The earliest networked access control was in the 1990s. With the increasing application scope of access control systems, people's demands for access control systems are no longer limited to a single entrance and exit control, but require multiple control functions such as access control, attendance management, and building automation, and integration of the system. And remote control features have very specific requirements. However, the traditional access control is based on the RS485 communication method, and the transmission distance and the number of nodes are limited, and remote control and intelligent management cannot be realized. Networked access control based on Ethernet transmission has emerged as the times require. It not only solves the problem of long-distance transmission, but also enables more servers and workstations to participate in management, thus providing customers with multi-level and multi-module access control. management.
In response to changes in application requirements, many access control manufacturers have launched network access control products. The so-called networked access control refers to the access control system based on TCP/IP protocol for data transmission. The control center server and the front-end controller adopt a networked structure, and each server and workstation (PC) in the management system also transmit data through the network. .
संपर्क करें

Author:

Ms. Yanjun Chen

ईमेल:

quentin@zecheng.com.cn

Phone/WhatsApp:

+8613602572892

लोकप्रिय उत्पाद
You may also like
Related Categories

इस आपूर्तिकर्ता को ईमेल

विषय:
ईमेल:
संदेश:

Your message must be betwwen 20-8000 characters

होम

Product

Phone

हमारे बारे में

जांच

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

भेजें