The basic functions of the mature access control system: management of the access permission of the channel, access to the access channel - it is to set who can enter and exit in each channel, who can not enter and exit the channel, and the way of entering and exiting the channel - that is, can enter and exit. People in this channel are authorized to enter and leave the way. There are three ways to enter and exit: password, card reading (biometrics), card reading (biometrics), and password. 3) Time of entering and exiting the channel—this is the person who can enter or leave the channel. During what time can you go in and out. At the same time, for the channel door time status, for example, the door dormant state, the door normally open state, the security state, the password state, the APB state, and the password APB state may also be set. When sleeping, all actions are stopped; when the player is always on, the goalkeeper will no longer be closed; when security is required, the user is required to punch into the door; when the password is required, the user is required to punch the card and enter the password; during the APB, the user is requested to punch the card and the user area is automatically tracked. Allow users to pass through the area; the password APB is basically the same as the APB, but you must enter the user password to access.
4. In and out records can be inspected after being saved, which can ensure the safety of the company and can prevent the real-time monitoring of employees' mixed overtime phenomenon. The system administrator can view the entrance and exit conditions of each door area (with photo display) in real time through the computer. The status of the door area (including the door switch, various abnormal state alarms, etc.); can also open or close all the door area in an emergency.
Incoming and outgoing record search function - the system can store all the in and out records, state records, according to different query conditions, with corresponding attendance software to achieve attendance, access control card.
Abnormal alarm function - in case of abnormal conditions can be achieved through the access control software alarm or external sound and light alarm, such as: illegal intrusion, door overtime is not closed, etc. According to the system's different access control systems can also achieve the following special features:
Anti-submarine back function:
According to the location of the access control point, different area markers are set, and then the card holder must go in and out according to a preset route, otherwise the next channel swiping card is invalid. This function allows cardholders to enter according to the designated area route.
Usually used in prisons.
Anti-trailing function: refers to the use of two-way card readers to prevent one card from being used repeatedly. That is, after a valid card is swiped into the door, the card must be swiped out once at the same door to re-wipe the card. Otherwise, An illegal card is refused to enter the door.
Two-door interlock: Usually used in bank vaults, also called the AB door, it needs to be used magnetically with the door. When the door magnet detects that a door is not locked, the other door cannot be opened normally. Only when one door is normally locked, the other door can be normally opened, thus isolating a safe passage and making it impossible for criminals to enter into the purpose of obstructing the crime.
Coercion code open door: refers to when the cardholder is hijacked, in order to ensure the safety of the cardholder, the card holder can enter the duress code to open the back door, but at the same time alarm to the control center, the control center can receive the alarm signal Take corresponding emergency measures, duress code is usually set to 4 digits.
Fire alarm monitoring linkage function: In the event of a fire alarm, the access control system can automatically open all electronic locks to allow people inside to escape at any time. Interacting with surveillance usually means that the surveillance system automatically records someone's credit card (valid/invalid) and records the situation when the access control system alarms.
Network setting management monitoring function: Most access control systems can only be managed by a single computer, while advanced technology systems can set monitoring and management of the entire system at any authorized location on the network, and can also be set offsite via the Internet. Management monitoring queries.
Logical door opening function: Simply put, the same door requires several people to swipe the card (or other methods) at the same time to open the electronic control door lock.
4. In and out records can be inspected after being saved, which can ensure the safety of the company and can prevent the real-time monitoring of employees' mixed overtime phenomenon. The system administrator can view the entrance and exit conditions of each door area (with photo display) in real time through the computer. The status of the door area (including the door switch, various abnormal state alarms, etc.); can also open or close all the door area in an emergency.
Incoming and outgoing record search function - the system can store all the in and out records, state records, according to different query conditions, with corresponding attendance software to achieve attendance, access control card.
Abnormal alarm function - in case of abnormal conditions can be achieved through the access control software alarm or external sound and light alarm, such as: illegal intrusion, door overtime is not closed, etc. According to the system's different access control systems can also achieve the following special features:
Anti-submarine back function:
According to the location of the access control point, different area markers are set, and then the card holder must go in and out according to a preset route, otherwise the next channel swiping card is invalid. This function allows cardholders to enter according to the designated area route.
Usually used in prisons.
Anti-trailing function: refers to the use of two-way card readers to prevent one card from being used repeatedly. That is, after a valid card is swiped into the door, the card must be swiped out once at the same door to re-wipe the card. Otherwise, An illegal card is refused to enter the door.
Two-door interlock: Usually used in bank vaults, also called the AB door, it needs to be used magnetically with the door. When the door magnet detects that a door is not locked, the other door cannot be opened normally. Only when one door is normally locked, the other door can be normally opened, thus isolating a safe passage and making it impossible for criminals to enter into the purpose of obstructing the crime.
Coercion code open door: refers to when the cardholder is hijacked, in order to ensure the safety of the cardholder, the card holder can enter the duress code to open the back door, but at the same time alarm to the control center, the control center can receive the alarm signal Take corresponding emergency measures, duress code is usually set to 4 digits.
Fire alarm monitoring linkage function: In the event of a fire alarm, the access control system can automatically open all electronic locks to allow people inside to escape at any time. Interacting with surveillance usually means that the surveillance system automatically records someone's credit card (valid/invalid) and records the situation when the access control system alarms.
Network setting management monitoring function: Most access control systems can only be managed by a single computer, while advanced technology systems can set monitoring and management of the entire system at any authorized location on the network, and can also be set offsite via the Internet. Management monitoring queries.
Logical door opening function: Simply put, the same door requires several people to swipe the card (or other methods) at the same time to open the electronic control door lock.
Adjustable Deck Pedestal,Taurus Adjustable Paver Pedestal,Adjustable Paver Plastic Pedestal,Self Level Deck Pedestal
Jiangxi Taurus Technology Co., Ltd , https://www.chinapedestal.com