Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

होम> ब्लॉग> Working principle and technology of intelligent community access control system

Working principle and technology of intelligent community access control system

May 01, 2023
The intelligent community, which is usually said, is expanded and extended in the basic meaning of an intelligent building. It provides an investment that is reasonable and has high efficiency, comfort, warmth, convenience, and safety in living environment by optimizing the four basic elements (structure, system, service, management, and intrinsic connection between them) of the community buildings. . In order to further adapt to the high security requirements, the access control system has also undergone changes in RFID card access control, fingerprint access control, iris recognition access control, and facial recognition access control systems.

Four series of access control, RFID card access control

RFID is an abbreviation for Radio Frequency Identification, which is radio frequency identification. It is a non-contact automatic identification technology. It automatically identifies target objects and obtains relevant data through radio frequency signals. The identification work can work in various harsh environments without manual intervention. RFID technology can identify high-speed moving objects and can identify multiple labels at the same time. The operation is quick and easy.

Short-range RF products are not afraid of harsh environments such as oil stains and dust pollution. Barcodes can be used in such environments, for example, to track objects on the factory's assembly line. Long-range radio frequency products are mostly used for traffic, and the recognition distance can reach several tens of meters, such as automatic charging or identification of vehicle identities.

The most basic RFID system consists of three parts: Tag: consists of a coupling element and a chip, each tag has a unique electronic code attached to the object to identify the target object; Reader: Read (sometimes also Devices that can write tag information can be either handheld or fixed; Antennas: Transmit RF signals between tags and readers.

What is the basic working principle of RFID technology?

The basic working principle of RFID technology is not complicated: after the tag enters the magnetic field, it receives the RF signal from the reader, and sends the product information stored in the chip (PassiveTag, passive tag or passive tag) through the energy obtained by the induced current. Or actively send a signal of a certain frequency (ActiveTag, active tag or active tag); the reader reads the information and decodes it, and sends it to the central information system for data processing.

Second, fingerprint identification access control

Fingerprint access control system is the use of human biometric fingerprints for identity security identification, with irreplaceable, non-replicable and unique features, the use of high-tech digital image processing, biometrics and DSP algorithms and other technologies for access control security, In and out personnel identification control is a new generation of access control systems that meet modern security requirements. The system replaces traditional keys and existing IC and ID cards with fingers. It uses the anisotropy and invariability of human fingerprints to provide users with safe and reliable encryption means. When used, they only need to place their fingers on the fingerprint scanner. On the collection window, you can complete the unlock task and the operation is very simple. In addition, traditional mechanical locks, identification cards, and code locks are prevented from being lost due to the loss and misappropriation of keys, the forgery of identification cards, or the decipherment of code locks. At the same time, the system also has a screen Chinese character display function, thereby enhancing the protective measures of access control. Achieve security management functions.

Third, iris recognition access control

Iris recognition is a technique that generates less interference with humans in biometric recognition related to the eyes. It uses a fairly common camera element and does not require the user to come into contact with the machine. In addition, it has the ability to achieve higher template matching performance. Therefore, it attracted the attention of various people. In all biometric technologies, iris recognition is the most convenient and accurate one for current applications. Iris recognition access control is characterized by accuracy, anti-deception, and practicality.

Fourth, facial recognition access control

Facial recognition is also called face recognition, face recognition, face recognition, etc. The following are all called face recognition. Areas protected by security can identify the identity of the person trying to enter through face recognition. Face recognition systems can be used for business, residential security and management.

Facial recognition is based on the human facial features to identify the technology, including standard video recognition and thermal imaging technology.

The standard video recognition is to record the facial features such as the shape, relative position, and the like of the eyes, nose, and mouth of a subject through a common camera, and then convert it into a digital signal, and then use a computer for identification. Video facial recognition is a common form of identification and is now widely used in public security.

Thermal imaging technology primarily produces facial images by analyzing the thermal radiation generated by facial blood. Unlike video recognition, thermal imaging does not require a good light source and can be used even in dark conditions.

The intelligentization and biochemistry of the access control system mark another milestone in the security industry. With the support of new technologies, access control systems will inevitably lead to new glories.

Community intelligence

Based on advanced computer technology, communication technology, control technology, and IC card technology, a system integration approach is adopted to gradually establish a multimedia integrated interactive system that communicates residential households and households, households and residential complex service centers, households and external communities. Provide residents with a safe, comfortable, convenient, energy-saving and efficient living environment. According to the "Ministry of Construction" outline of the "National Residential Community Intelligent Technology Demonstration Project", the intelligent buildings are divided into three levels: the popular residential community, the advanced residential community and the leading residential community. Among them, six intelligent requirements should be implemented:

1. The residential community sets up a computer automation management center;

2. Water, electricity, gas and other automatic measurement, fees, residential quarters closed;

3. Implement security monitoring system automation monitoring and management;

4. Automatic fire alarm and harmful gas leakage in the house;

5. Residential setting emergency call system;

6. Implement centralized management of key equipment and facilities in residential communities and implement remote monitoring of their operating status.

At the same time, according to the regulations of the Housing Industry Promotion Center of the Ministry of Construction, the model community should have the following functions in terms of safety precautions and information management:

1. Entrance and exit management and perimeter security alarm 2. Closed-circuit television monitoring 3. Talkback and anti-theft door control 4. Resident alarm 5. Patrol management 6. Implementation of security monitoring system 7.

Major equipment remote monitoring and management ic card management 8. Collecting or vehicle access and parking management 9. powered equipment, public lighting, elevators, water supply, etc. 10. Emergency radio and background music system 11. The computer system of property management <br> <br> intelligent Community Security System Seven Technologies

With the improvement of living standards, people have made higher demands on living conditions. The importance of the security system for residential quarters is getting more and more attention. The intelligent home security system integrates the functions of anti-theft, anti-robbery, fire prevention and anti-gas leakage. It automatically alarms whenever it is unexpected, preventing it from becoming a patron saint of home security.

The community security defense system mainly includes the following aspects: closed-circuit monitoring system, intrusion alarm system, access control system, electronic patrol system, and integrated application of intelligent residential security systems, perimeter prevention systems, and video intercom systems. The community’s security center is responsible for centralized monitoring and management of various subsystems of security. Here we focus on the seven major systems:

First, closed-circuit monitoring system

Closed-circuit monitoring system is one of the monitoring and information means of the security status of the work area. Combined with the internal intercom system and the public broadcasting system, it can reduce the work intensity of management personnel and improve management quality and management efficiency. The closed-circuit monitoring system is a powerful auxiliary tool for modern security. It transmits video images or dangerous signals from various sites within the site to the main control center and sub-management room. The on-duty management personnel can objectively analyze the scenes without visiting the site. Regional centralized surveillance, found that the situation was unified mobility, guiding evacuation, saving a large number of patrolling personnel, fewer people can avoid many human factors, to ensure the implementation of the program properly handled in the shortest time.

Second, the intrusion alarm system

The intrusion alarm system is generally composed of a detector, an alarm controller, a linkage controller, an analog display, and a searchlight. Most intrusion alarm systems use line detectors. Line detectors use two-way/four-way active infrared detectors to form an illegal crossing alarm system. The system adopts fuzzy control technology to effectively avoid the influence of small animals, sundries, and snowstorms on the detection and alarm, and at the same time guarantees instant warning of illegal overturning of larger objects and people. When the detector detects the intrusion signal, it will alarm the residential property alarm center, and the alarm center linkage controller will open the relevant area searchlight, issue an alarm siren, start the recorder, and simulate the electronic screen to dynamically display the alarm area. The alarm center monitoring computer can pop up the electronic map.

Third, the access control system

The access control system manages the important channels of smart homes. The gated system can control the access of personnel, and can also control the behavior of personnel in buildings and sensitive areas. Install control devices such as card readers, fingerprint readers, and password keypads at building entrances, elevators, etc. In order for a tenant to enter, he must have a card or enter the correct password, or press a dedicated finger to be approved. The access control system can effectively manage the opening and closing of doors to ensure that authorized personnel can freely access and restrict the entry of unauthorized personnel.

Fourth, electronic patrol system

The patrol system is a means by which a manager checks whether the patroller arrives at a designated place on a patrolling route at a given time. The patrol system helps managers understand the performance of patrollers, and managers can change patrol routes at any time to meet the needs of different occasions. Patrol system is divided into wired and wireless:

The wireless patrol system consists of information buttons, patrolling handheld recorders, downloaders, computers and management software. The information buttons are installed on the site, such as near the entrance of each residential building, in the garage, along the main road, etc.; the patrol handheld recorder is carried by the patrol personnel on duty; the downloader is a part that connects the handheld recorder and the computer for information exchange. It is set in the computer room. The wireless patrol system has a simple installation, does not require a dedicated computer, and the system is very convenient for expansion, modification, and management.

The cable patrol system is a patrolling officer sending a signal to the management computer at the specified time and place on the specified patrol route to indicate normality. If the signal is not sent to the management computer within the specified time, or if it is not in accordance with regulations The signal appears in the order, and the system will consider it as abnormal. In this way, the patrol personnel will soon be aware of problems or dangers.

V. Smart Home Security System

Mainly home burglar alarm system, it is composed of security center management host, home alarm, various types of sensors and transmission lines. The entry points are mainly doors and windows. The sensors are deployed in important locations and areas of the family, allowing the owners to live in a safer and more comfortable environment. All kinds of sensors are introduced as follows: window magnetic, magnetic switch, gas leak alarm, smoke alarm, emergency button and other security systems are used in the home, in each home owner's home equipped with infrared sensors, magnetic window magnetic switch, Smoke detectors, emergency alarm buttons, etc. Each entrance to the unit is equipped with a host computer at the entrance, and a set of management hosts is set up at the security center. When a guest visits, press the outdoor button or the room number of the respondent, and the room indoor unit will send a ringing tone. At the same time, the screen of the indoor unit will automatically turn on, displaying the image of the visitor and the outdoor situation. The owner and the guest will Talk about the call, confirm the identity through the indoor extension of the unlock key remote control electric gate to allow guests to enter, the guests enter the gate, the door automatically closed.

In addition, through cell networking, centralized security alarm management can be implemented for all users who install the home security system in the entire cell. Each home security system can send alarm signals to the management center through the bus. The management personnel can confirm the location and type of the alarm. The computer also displays some information related to the households so that the security personnel can promptly and correctly answer the alarms. deal with.

6. Perimeter protection system

The perimeter fence alarm system mainly monitors the surrounding conditions of buildings and prevents illegal intrusion. It is the first line of defense for the anti-theft alarm systems and is also a very important line of defense.

Perimeter protection sensors can be detected as soon as the intruder enters the zone and alert him before he or she approaches the protected person and protected property. An effective outdoor security system can be used as a return on equipment investment by reducing the risk of theft and reducing damage and personal injury.

Seven, video intercom system

The traditional analog video intercom system consists of a management center, a visible outdoor host, and a visual indoor extension power supply. Three-way calls can be achieved, building intercom, image monitoring, integrated alarm, unlock the door, alarm memory, integrated management of the center. The system adopts 485 cabling transmission method. According to different requirements, it can be connected to magnetic, infrared, smoke, gas probes and computer centers, workstations and "110" alarm center, implementing intelligent community management.

The digital network intercom system adopts network signal transmission. In addition to all the functions of the above analog video intercom system, it also has the ability to make free video calls over the Internet (VIOP), make PSTN calls (ordinary calls), and provide security alarms. , Send and receive E-MAIL, access to weather forecasts, community information announcements and other information release, multimedia advertising value-added services and other functions.

All in all, the security monitoring system is an important part of the intelligent residential community. Its monitoring system adopts real-time monitoring and layer defense for key areas of the community. Let the owner live in an invisible security net. It is safe and humanized, so that the intelligent residential community has a full range of security.
संपर्क करें

Author:

Ms. Yanjun Chen

ईमेल:

quentin@zecheng.com.cn

Phone/WhatsApp:

+8613602572892

लोकप्रिय उत्पाद
You may also like
Related Categories

इस आपूर्तिकर्ता को ईमेल

विषय:
ईमेल:
संदेश:

Your message must be betwwen 20-8000 characters

होम

Product

Phone

हमारे बारे में

जांच

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

भेजें