Access control and management systems. Components and operating principle.. Article updated in 2023.

sistemi kontrolya i upravleniya dostupom komponenti i pri
Access control and management systems. Components and operating principle.

Access control and management systems. Components and operating principle. Controller.

Controller is the main device of the access control system. The controller receives and processes information from the reader and gives (or does not give) permission to enter. Controls the actuators, i.e. gives the command to open (or lock) the door. The controller stores all the information about the system: configuration, operating modes, list of persons with access rights and the level of their authority.

Main controller characteristics: — operating mode (standalone or network) — types of readers compatible with it — maximum number of users — ability to keep a log of events — support for various schedules for user access.

Network and standalone controllers.

Network controllersare used at large facilities. The controllers are networked and controlled by a computer with special software installed. The decision-making function in this case falls on the computer. In addition, when using network systems, many additional options for monitoring employees are provided.

Network controllers make it possible to monitor events throughout the entire protected area from one place and centrally manage user rights, quickly entering or deleting identifiers.

Autonomous controllersare designed to service one checkpoint. They are usually designed for a small number of visitors (usually up to five hundred). Autonomous controllers are cheaper and easier to operate, although they are no worse in terms of efficiency when used correctly.

Readers

Readers— are devices connected to the controller. The reader's function is to extract information (identification code) from the user's «pass» (identifier). The user's identifier can be a magnetic card, a contactless proximity card, a Touch Memory key fob, biometric features (iris, fingerprint, etc.). Each identifier is characterized by a certain unique code. When the identifier interacts with the reader, this code is transmitted to the controller, which determines whether passage is permitted and activates the actuator (for example, a lock). An LED may be installed in the reader's body to indicate an invitation to enter if the code is successfully read.

It is often necessary to organize bidirectional control of passage through one door. In this case, two readers are used — one for the entrance, the other for the exit.

To increase the reliability of identification, in addition to readers, a keyboard for entering a personal PIN code can be connected to the controller.

Actuators

These are devices for maintaining the barrier in a closed state (and opening it for access). Usually this is a door lock, a locking device for a turnstile, a lock cabin, a barrier, etc.

Locks

The actuator for a regular door is a lock. We would like to draw your attention to the fact that locks can be opened by voltage (this means that when voltage is applied to the lock, the door opens) and closed by voltage (the door opens when the voltage is removed from the lock). Remember that all doors used as fire exits must be equipped with locks that can be locked by voltage.

There are electromechanical locks and latches, as well as electromagnetic locks.

Latches are not effective in protecting a room from burglary, but they are cheap, easy to install on almost any door, and do not require a flexible power supply to the door, so they are usually installed on interior doors in a room.
Electromechanical locks are practically ordinary locks, they can be opened not only with a mechanical key, but also by applying a current pulse from the actuator — the controller. Electromechanical locks are more expensive and require flexible wiring to the door itself. Most of these locks have a mechanical reset, that is, if an opening pulse of even a short duration is applied to the lock, the door will be open until it is opened and closed again.
Electromagnetic locks are relatively inexpensive and in some cases very easy to install. Almost all of them are suitable for installation on evacuation routes in case of fire.

Turnstiles

Turnstiles provide high throughput. The single-pass function and the ability to separate the flow of people one by one allow the turnstiles to be effectively used in access control systems.
Turnstiles come in two types: waist and full-height. It makes sense to install waist turnstiles only near the security post, since you can jump over them. A full-height turnstile is much more expensive than a waist one, but it can be installed in places remote from security.
The advantages of turnstiles are that they require a minimum of time to pass through, and they are guaranteed to allow only one person to pass through with one card (if configured correctly). According to fire safety requirements, there must be a quick-opening free passage next to the turnstile, or the turnstile rods must be easily broken by the force of an ordinary person.

Airlock cabins

Airlock cabinsrecommended for use at enterprises with enhanced security requirements. The principle of operation of airlock cabins is that when the outer door is open, the inner door cannot be opened and vice versa. Thus, the visitor cannot exit or enter until permission is received, and if necessary, an intruder can be blocked inside the cabin.
Airlock cabinsare equipped with autonomous microprocessor control units and do not always have inputs and outputs for interfacing with standard ACS controllers, therefore, when choosing a cabin, find out whether it is compatible with your ACS.

Gates and barriers

They are used at the entrances to the enterprise and in car parks. The main requirement is resistance to climatic conditions and the ability to control from the ACS controller.
In addition to the main devices, without which the ACS simply cannot function, there are also additional ones that improve the characteristics of the system and its reliability.
You can install a video intercom, a remote door unlocking system, fences to form flows of people, etc. To ensure the operation of the system during power failures, you can install backup or uninterruptible power supplies. For medium and high-class ACS, you need to install special software.

OOO «SQUID TD» — on guard of your interests!

ik

Passive IR sensors for security alarms

    Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
    Принять