Electronic access control system basic use function overview

First, the system requirements

How to combine humanistic management ideas with scientific and precise management methods, make full use of the network infrastructure that the owners have invested in, improve the safety prevention and management capabilities of owners' offices and other important sites, improve management efficiency, and reduce management costs?

It is recommended to adopt the most advanced international non-contact IC card intelligent integrated management system. This system combines the advantages of non-contact IC card technology and computer network in data retrieval, communication, and acquisition, with a multi-function non-contact type. The IC card also takes charge of management functions such as employee's work permit and access control key, and enjoys the convenience of modern intelligent management methods in the computer network environment.

At the same time, through the intelligent linkage function of the access control system and the security and fire fighting system, the security system is integrated to respond in a timely manner and quickly alarmed to ensure the safety of employees and property.

In addition, the successful application accumulation in many cases of large-scale, multi-tasking, complex network structure, and high frequency of use over the past years has resulted in the success of the access control system in terms of versatility, stability, and scalability of requirements and functions. One person.

Second, the electronic access control subsystem function overview

This system lists entrance access control systems consisting of controllers, card readers, electromagnetic locks, contactless identification cards, and computers. It can control access doors, entrance and exit passages, and other places; real-time management of the set entrance and exit control.

Use personal identification card to work. Send a personal smart card to each person who has the right to enter, which is equivalent to a key. The system can judge whether the card holder can enter or exit according to the information such as the card number and the current time of the card. As long as the employee hangs the card in front of his chest or in his pocket, the door will automatically open when he walks inside the handbag.

Read the card number of each card holder through the card reader. Records of entry and exit of each employee belonging to the department can be recorded at any time. Guarantee that bad cards and fake cards cannot be used. The system can add and delete a card at any time without worrying about what is lost when a card is lost. The system should have high security performance; the system settings and modifications have different permissions for different people. Non-contact cards allow card imitation to be zero. For a certain card, someone, an import and export, a certain period of time, some kind of alarm, carry out statistical queries such as actions, states, operations, and permissions. And formulate the corresponding week, year, month report. The relevant information in the system can be automatically recorded, printed and stored, and there are measures to prevent modification or prevent destruction. The system can instantly record the card number of the cardholder, enter the gate number and time of the door, and force the unauthorized cardholder to enter the record forcibly. And alarm, power interruption does not affect the storage content. Channels and doors that can be linked to automatic fire alarms and linkage systems.

Basic functions of the access control:

1. Use the non-contact proximity card to control the opening of the access door:

When the contactless proximity card reads a card on the card reader, the card reader module checks whether the card is authorized. If the card is authorized for this period of time, the reader module controls the electric lock to open the access door. If it is a non-authorized card, it will not open the door or alarm the management center according to the customer's needs.

2. Implement central control over the network:

The main control module of the system directly monitors the opening and closing status of each access door through the network, and can open any access door directly in the system management center. The main control module maintains monitoring of all modules, power supplies, lines, and alarm devices in the network.

Staff rights management:

Through the system management center, the cardholder's different permissions can be set flexibly, including access doors, access time, and so on. Different authorization cards can open different doors within the specified time.

Holiday Management:

It is possible to set a uniform time period for all cards with certain privileges (holidays management). After the end of this period, the system restores the access control function. In fact, the system is very flexible in terms of time and permissions and can fully meet various management needs.

Backup Battery - Emergency Measures for System Outage (Optional)

The main control module, card reading module and electric lock of the system can all be equipped with a rechargeable battery. When the power supply is normal, the entire system is powered by the building's power supply and charges the rechargeable battery during this period. When the building's power supply system fails, the rechargeable battery will provide power. It can ensure that the door can be opened normally within 10-15 hours after the system is powered off.

Double exit button:

The two buttons are in parallel. Pressing any button will open the door.

Monitor mandatory opening:

If the door open time is too long, the system status such as the use of the Enter/Exit button is used, and you can set alarms to the management center in the above state.

Time period control function:

The access door can be used in different ways at different times; for example, when you enter or leave the office at work, you can use the card and password to enter or exit.

Prevent reuse of cards:

In the system can be set strict or loose to prevent re-use of card features.

Safety performance

The access control system is characterized by high security and easy operation. If any person loses the access control card, he only needs to record the loss report at the control center and receive a new contact card. The old contact card will be invalid, so that the old card will not be used for illegal purposes after being picked up by others.

Third, electronic attendance subsystem

Attendance management, as the name suggests, manages the attendance of staff members on and off duty or attending meetings. By reading the card, the specific attendance date and time can be clearly recorded. At the end of the month, the statistics of all the working hours of the staff were sent to the Ministry of Finance, which provided the basis for the rewards and punishments of each person’s salary.

The biggest advantage of the attendance management system is that it can be extended to the attendance system on the basis of the original access control system, without the need for additional equipment, thereby reducing costs, and can effectively control the situation of cheating.

Specific characteristics of attendance management operation

â—† â—† attendance management cumbersome appraisal system and operating mechanism be different workload statistics â—† â—† â—† high data accuracy requirements of the operation manual and time-consuming, laborious, misuse rate design principles <br> <br> Attendance Management System

â—† Easy and quick operation â—† Realize automatic statistics of attendance data â—† Save original records and automatically generate attendance reports â—† Guarantee accurate data statistics â—† Friendly software interface, easy to operate â—† Card reading and writing is quick and easy, and it is not affected by the use of environmental pollution, high temperature and other factors â—† influence the system configuration is reasonable, cost-effective system <br> <br> system software components and functions

Human resources: Enter, query, modify department files, personnel files; have a duplicate name check; and print a list of people.

Card resources: card issue, reissue card, report loss, cancellation report, cancellation, verification, clear card, etc. of the staff attendance card, and can query the records of all cards, issued cards, unissued cards, loss of lost cards, and cancellation cards, respectively.

Equipment resources: You can automatically complete the attendance login, you can also manually log in or delete the login. You can set parameters for the attendance machine and initialize the attendance machine raw data. And can generate a monthly salary list.

Work Arrangement: You can assign employee shifts by department or individual as a basis for attendance judgments.

Attendance rules: According to the unit attendance system set attendance rules as follows:

Ordinary class: Sets or modifies various working hours for various direct classes and sub-classes.

Rotation: Set or modify the various working hours for various shifts.

Holiday set: automatically set holidays and rest days.

Attendance Rule One: Set the start date of the attendance month, effective credit card delay, credit card error range, two credit card intervals, missing card processing rules, absenteeism, and intermediate processing.

Attendance rule II: Set up overtime attendance processing methods include regular employees and senior employees working day overtime and holiday overtime, each type of overtime includes early overtime, middle overtime and delayed overtime options.

Time segmentation: Pay the corresponding working hours for various working hours.

System maintenance: Realize the holiday category's own settings, data backup, recovery, data import, export and other maintenance functions.

Daily operation: It mainly performs data collection of attendance, manual registration, leave, overtime, shift and other daily operations, and can browse the original records of daily attendance, automatically analyze the daily attendance, and generate reports.

Report Analysis: You can browse the original record of the month, analyze the monthly attendance, and generate the attendance report of the unit or department. The report includes the monthly attendance detailed form, the monthly attendance profile, the monthly commuting schedule, the monthly attendance summary form, and the monthly salary form. Among them, the monthly attendance summary table can select all, abnormal attendance, and normal attendance.

Instructions: It is mainly used to manually modify the attendance results.

The software can be defined by the user unit management department to regulate the operation rights of different operators to ensure data security.

Fourth, parking lot subsystem

The system consists of a parking lot master controller, a parking lot auxiliary controller, an entrance workstation, an exit station, a sense coil (vehicle-in-place induction coil, reset coil), an image capture system, an electrically controlled automatic lane barrier, and a management station.

The overall structure of the parking lot

The parking lot management system mainly consists of three parts: the system server (data center, communication center), workstation (parking lot management, monitoring, billing software carrier), and the parking lot management system execution unit (main controller and its subordinate action units). composition.

Based on the above description of the overall structure of the parking system, we can clearly understand that the parking management system is a product based entirely on Ethernet technology. The parking lot system database can even be associated with the “employee name” employee personnel archive database. When the employee personnel archive database changes, the parking lot system database changes dynamically and in real time in order to facilitate user management and achieve real "One network, one card, one library", and it is very easy for the system to expand the field of application of card systems in the future.

According to the user's different use requirements, the parking lot management system can provide the following multiple configurations to fully satisfy the user:

â—† Dedicated value-based parking lot: There are dedicated personnel at the entrances and exits of vehicles â—† Unattended parking lot: Unattended vehicle entrances and exits â—† Parking-free parking lot: no need to park when the vehicle enters or exits the entrance and exit of the parking lot. Parking lot: No need to park when the vehicle enters or exits the parking lot.

Steal CNC Milling Parts

Steal Cnc Milling Parts,Stamping Parts Stainless Steel Parts,Custom Metal Factory Deep,Deep Drawing Stamping Parts

JIANGSU TONGDE INTERNATIONAL TRADE CO.LTD. , https://www.tongdetrade.com

This entry was posted in on