The ban control has gradually begun to change from simple to complex. The access control system has evolved from single-door access control to multi-network computer control. The management function of access control has been increasingly strengthened, and the security of the system has also been improved....
Prior to the advent of access control technology, the security control management of the door had always used the mechanical key method. The early access control system was only an independent magnetic card system. Although it can be set up and managed by a programming card or a handheld programmer, it is still quite simple. system. Later, with the rapid development of computer technology, access control has gradually begun to change from simple to complex. Access control systems have evolved from single-door access control to multi-network computer control. The management functions of access control are increasingly enhanced, and the security of the system is also improved. Increasingly perfect.
Today's online networked access control systems have been widely used computer control management, access controllers use smart distributed processing, network communications widely used RS-485/422 bus, TCP/IP, remote modem technology, access control software management functions are also more powerful.
The following will introduce the latest achievements in the development of international access control today:
1. Wireless access control system;
2. Seamless integration of classic alarm system and access control system;
3. Seamless integration of access control system and building intercom system.
The emergence of wireless access control systems for wireless access control systems has benefited from the development of communication systems for access control systems. One of the important functions of the access control system is the network function of the system.
Today's access control systems use wired transmission of information. However, because of restrictions on access control installation and construction conditions, it is not always possible to use cable in some places. It is for these reasons that U.S. KERI has broken through the traditional cable method. The KRF wireless access control system was first introduced internationally, which marked the beginning of the creativeness of wireless access control technology.
KRF's wireless access control system has the following main features:
1. Lower prices (compared with the use of cables and construction fees for cable systems). Installation and construction are easier, especially when using KWX for wireless RS-485 communication where wiring is expensive, construction is difficult, or pipelines are not possible at all;
2. KWX wireless transceiver provides RS-485 wireless data communication between PXL-500 access controllers;
3. Under normal circumstances, the distance between KRF wireless system controllers can exceed 91 meters. Of course, the distance between the KRF wireless system controllers will vary depending on the building structure and material, but when the antennas are used, the distance between the controllers can reach 300. Meter;
4. Communication network between controllers can be wired and wireless hybrid connection;
5. The operating frequency of the wireless receiver/transmitter is 915MHz and 2.4GHz. No application is required for direct use. Multiple RF channels can be selected when multiple access control systems are used simultaneously in the same building;
6. There is a communication intensity indicator.
Seamless Integration of Alarm System and Access Control There are now many access control systems that can use their own controller's alarm input/output interface, connect external alarm detectors, and relay outputs to implement alarm linkage functions. Such a system can achieve simple alarm functions, but users who have used such equipment all feel that the alarm function is too simple and can not meet the needs of many places, and its alarm function is not as powerful as a professional, independent alarm system (such as the United States GE, Andingbao). For example, the alarm system uses the keyboard to implement the arming and disarming operation, alarm partition control technology, keyboard alarm information display and zone bypass operation functions. In addition, the alarm management in the access control system can only be implemented on the central computer, so it is inconvenient to use.
Recently, KERI Corporation in the United States and GE, a leader in the world security industry, have collaborated to integrate GE’s NetworX alarm controllers into the KERI’s access control system and introduced the PXL-510 Access Control + GE Alarm Control System, which has received much praise from the industry. It integrates all the functions of GE's alarm system in the existing access control system. The integration of this mature and classic product is highly praised in the security industry. Using a PXL-500 access controller loaded with GE's NetworX alarm controller and NX-8E alarm board, users can now use the usual access control system reader arming and disarming alarm systems, or still serve as a dedicated access control system. This feature makes the system more user-friendly and very simple to use, since the user does not need to operate the keyboard or memorize a password, thus improving the security of the system.
The PXL-510 access controller (including a dedicated RS-232 alarm interface) is responsible for communication with the NX-8E alarm board in the PXL-250/500 access control network. The access control reader can be set to use only one reading. The card can control the access door and open/close the alarm system. The card reader can be a card reader controlling a certain door or door exit, or it can be any reader in an area. Since each user uses a unique number of identification card, the system can know who turned on and off the alarm system, and this information can be added to a separate access control system event data report in the DOORS access control alarm management software. It is recorded as a historical event. This product is different from the existing alarm system products can only integrate a very limited access control functions, it integrates access control system control and alarm system control in a common management software interface.
The seamless integration between access control and building intercom is different from the existing building intercom system, which only adds a card reader to the door machine. This product is based on the full functions of its access control and uses the telephone line network to form a pair of access control and building. Talk about the control system. The integrated access control and telephone intercom system introduced by KERI of the United States has its access control and intercom controller on an RS-485 bus and is managed by an access control management software.
Its telephone intercom door machine has the following main features:
1.Without wiring, only one telephone line is needed to communicate with each household through the telephone line;
2. Quick household enquiries;
3. Seamless integration with the access control system, software can achieve access control + talkback event record management;
4. The LCD large screen has 4 lines of text characters for display;
5. Has 750 and 5,000 2 models user roster storage;
6. Can set 6-digit directory address code, or 7-15 digit phone number for call;
7. Manage multiple doors through RS-485 networking;
8. Optional accessories: placement kit, protective cover, camera and so on.
To sum up, the development of access control technology has provided users with more and better choices, and has also made independent existing systems develop towards the integrated security management platform with access control as the main body. The integrated security management platform integrates devices such as access control, alarm, video, intercom, elevator, time and attendance, certification, and parking management, and uses the same integrated management software to manage and record events, greatly enhancing management functions and usage. Convenience, relevant technological developments will be introduced to readers in subsequent articles.