Electronics access control System
The common characteristic of a home, a company and event venues is that they all have an access door. The main mission of a door is to control who can enter and who cannot; For example, the door of a house allows the members of a family to enter, in a company it allows controlling the entrance of employees, visitors and messengers. This process is called access control. The three basic components of an Access Control system are: the Door, the Lock and the Key
If we want to have higher security we can install a door sensor on top of it and thus know the status of the door In this way, any abnormal situation will trigger the alarm and notify the security company or the police.
that any case any case, what if the keys are lost, or there are too many keys to find in a short time? In the first case, we can find a locksmith that opens the door in five minutes, but this will also indicate the unreliability of mechanical locks; In the second case, carrying many keys on you implies a lot of weight and a lot of time selecting which key we are looking for.
The Perfect Solution Access Control
To avoid the above problems, electronic access controls are the perfect solution. In addition, the administrative management of an access control is very laborious. In a traditional mechanical locking system, if a new member is added a new key is necessary, while the office uses paper time clocks to control the attendance and working times of the employees, which makes the count is laborious and prone to errors and omissions.
Conversely, the introduction of a modern network access control system can simplify and improve the process by simply connecting to the Internet, logging into a system web server, and adding or removing authorization levels for staff, as many as you want. , and know their entry and exit conditions. What’s more, the time attendance machine report can be easily generated and edited with less manpower and greater precision.
Taking into account the current trend in the growth of companies, have delegations in different parts of the city or the country. This is the reason why a data synchronization service is needed. The creation of networks of access control systems provides a good solution to manage and control the branches from the central office, adjusting the days off in each one or the working hours in a more efficient and comfortable way, so that it exceeds more than traditional mechanical access control systems.
Principles of electronic access control
Electronic access control manages the door lock using an access controller.
To enter user data and open the lock from the outside, you can use a card, PIN code, fingerprint or some other biometric feature such as facial recognition.
The Request to Exit (RTE) button can be placed inside to operate the lock to exit the building.
In a traditional mechanical lock system, the lock only accepts a single key; however, in the electronic access control system, a lock can be opened with multiple keys (that is, the user data is stored in the memory chip of the controller). You may wonder about the need for multiple keys. In fact, different keys can represent different users. Therefore, logging in / out events for each user will be done in response to security concerns.
Access controller and Identification systems
Access controller literally means device that controls access to a door. It has a control unit (CPU) to control the digital input and output signals, as well as to analyze user data and determine the user’s authorization level. It also requires memory to store data, parameters, and event log. Any device equipped with the above can be considered a gatekeeper.
GCTL Access Control Systems distributes different types of access controller and the two key features are:
- Each access controller is itself an identification unit, with a reader function and can read based on the different types of card / PIN / fingerprints
- Each access control can be connected to a PC to configure parameters and query data, and can be selected between autonomous or Network operation mode
Different access controllers can also be selected based on the need for door groups and number of users. If there is a need for Macro-structure, as for example in hotels or apartments, student residences and office buildings.
RFID
Radio Frequency Identification (RFID) is a technology that uses electromagnetic waves to transfer and receive information between readers and cards. The most common card consists of 3 parts: an antenna, a semiconductor chip and a part where they are encapsulated. In passive RFID systems, energy is transferred through the antenna to power the card chip that coordinates the communication process and consequently the card is activated within the reading distance range, when a valid card, the output unit will trigger and send a signal to the electric lock to open the door.
There are various frequencies such as 125KHz, 13.56MHz and 2.4GHz. When the frequency is higher, the proximity reading range will be reduced and consequently its function will be different.
Biometrics
A biometric system is a technology that identifies people through their unique physical features. Such as fingerprint, iris, or facial features. With this technology, the body itself is the key, and consequently it is not necessary to remember long and complicated keys. there is no concern of loss, copying or identity theft since each individual is unique in the species and always carries it with them.
Bluetooth
It is the latest of the access controllers, to use the Smartphone and its Bluetooth technology to use it as identification and access key. The low cost of both installation and materials and makes this system become the main electronic door opening system in a few years.
Effective management of electronic access control
A traditional lock is only to control the state of a door that cannot be regulated by schedules. However, an electronic access control system allows you to control the lock by setting the schedule, group of doors, authorization level and through the web server, you will be able to know all the registered events of doors and users. The IP CCTV Camera video surveillance circuit is an optional equipment if you want to improve security. Consequently, electronic access control systems have become a leading trend in the security industry thanks to their unrivaled advantages.
Schedules
With an integrated time, function, you will be able to establish schedules. Such as morning shift, afternoon shift or night, etc. The access management using software to regulate the authorization levels of the users and their access times to the different places.
Of course, you can create total opening hours, in these hours the door will open automatically. After this period it will close automatically. This configuration is ideal for shops and department stores.
In addition, you can set an expiration time of access for each user. This is ideal for accesses of a short time such as day passes, or visit passes. Different schedules can be configured to activate equipment designated as a safety alert or industrial control device.
Door groups
As mentioned above, with electronic access control systems working in network mode, there can be many doors connected. How can they control the different levels of user authorization at the doors?
Door group management offers a perfect solution to that requirement, configuring different doors as a door group and only certain users are allowed to access designated door groups, for example, accounting door group for the accounting department and R&D door group for the R&D department.
Access Level
There is additional management such as access level control. You can label each time zone and each door group with a level index. Each user is assigned a level index. Users with a higher level are authorized to schedules and groups of doors with a lower-level index.
Anti-Return
The anti-return feature combines a reader and access control for a higher level of security.
When applied to buildings, there are three fundamental characteristics. First, the external reader is only for reading information, not for storing data. Second, breaking the reader cannot cause a forced open condition to occur. The normal process of obtaining access is as follows: a card approaches the reader from the outside -> the reader transmits the information, determining if the card is valid or not, a signal is transmitted to the electronic lock to unlock it. Therefore, the reader cannot open the door lock directly by himself.
Third, a card must be presented at entry / exit, and the presentation sequence must be the correct order. Such as the following sequence “entry-exit-entry-exit-entry-exit” to gain access. Any attempt to create a sequence “entry-entry” access will be considered as a violation. The Anti-return rule and consequently access will be denied. For example, if someone gives their card to a friend after passing the door or copy and tries to enter. All of them will be rejected at the door for violation of the anti-pass-back rule.