Access control

Access control is a tool for organizing security in homes, office buildings and industrial complexes. Access control and management system for today is one of the most effective methods of property protection and workflow control.
The purpose of the system is protection against penetration into the organization’s building, control of the security department, accounting of working hours of the company's permanent employees. It is also the organization of checkpoints for visitors and employees of the company. It contributes to the delimitation of access into the enterprise by levels, increases control over the object, efficiency, discipline and order.

The principle of operation of access control

  1. All employees, customers and guests of the company receive an electronic key (identifier). This is a plastic pass (key fob or card) with an individual code enclosed inside. Issued only after user registration on the basis of personal data from a passport, photograph and any other information entered into the database. The key and the user's electronic card are interconnected.
  1. The entrance to the building is equipped with information readers from electronic passes. The system controller analyzes the information from the personal key and access rights to the object, providing after the decision: open the door (turnstile) or block. When you try to hack or pass a third party on an electronic key, the system is able to start high security mode.
  1. The controller records the entire history of visits of the owner of the electronic pass, as well as security marks about atypical situations, saving everything inside the visitor’s personal card. Data is stored on the organization’s internal server. Information is used to record employee time, discipline control, identification of violations, etc.

System selection

For enterprises, the organization of these types of checkpoints is characteristic:
  1. passage points;
  2. offices and offices;
  3. especially important premises;
  4. checkpoints of vehicles.
The choice of access control configuration depends on the nature of the dimensions, location and work of your organization:
  1. A small access control system helps to prevent strangers from entering your company’s territory, and help employees indicate the premises available to them.
  1. Complex access control allows you to keep track of employees' working hours on an individual schedule, collect information about company visits, and analyze the events of the week. For this, employees, customers or guests receive an individual electronic key, which is valid on a permanent or temporary basis.
Access control can work in two modes at once: stand-alone and computer. In the second case, management is completely software dependent, allowing you to control the checkpoints from the center.
Such access control are called complex; they allow solving problems of discipline and order completely, including the security and guard department. Advanced features include accounting automation. The ability to choose the functionality of the system allows you to choose the equipment to solve specific security problems and discipline in your organization.

Access control controller

This is the central device of the complex. It is intended for the collection and processing of data from electronic passes, on the basis of which a decision is made in obtaining or denying access to the object. The controller also controls the actuators within the network.
There are such types of controllers:
  1. network (centralized);
  2. autonomous;
  3. combined.
Network - controllers are controlled both locally and from the central office via a computer. Decision making is entirely dependent on analysis by special software. Such controllers are universal, they are used for simple and complex access control. The advantage for the administration is in additional functionality for monitoring the work and security of the entire organization:
  1. employee control;
  2. regular job location reports;
  3. maintaining an automatic time sheet;
  4. accounting of real working hours of employees;
  5. accounting for the movements of workers inside the company;
  6. the ability to create an individual schedule;
  7. maintaining a permanent database of all company employees with photos.
Autonomous - this is a completely independent device, which is controlled by a security guard at a checkpoint. They produce various types of combinations like a controller built into a turnstile, door lock, barrier, etc. Standalone controllers are compatible with all types of readers. The purpose of the type is to control an object with a small number of employees and visitors per day (standard - up to 500).
Combined - are controlled depending on the status of the network: from a computer in real time or offline.

The main devices of the Access control system

Readers Devices are directly connected to the controller. They are the ones who extract information from electronic passes and pass it on. Reading takes place thanks to the identification code encrypted in the pass, original for each key. The reader transmits the information to the controller, which issues a solution for the actuator as a lock.
Executive devices. They keep the curtain, barrier, turnstile or lock closed, mechanically open the barrier after a positive decision by the controller.
Locks. This is the standard door actuator. They produce electromechanical and electromagnetic latches and locks. The latter are not effective for protection, they help to close the doors inside the office.
Electromechanical models are a hybrid that opens both with a mechanical and electronic key, and from the controller signal. Cost more than latches. To work, you need to organize the power supply to all doors of the system. Doors remain open after applying a pulse from the controller until they are manually shut. This is the standard type of lock on the evacuation exits of the building. An electromagnetic lock works on the principle of attracting metal in a door to an electrical overlay in the core of a lock. A feature of the system is the entry of magnetic parts with high attractive forces (up to 500 kg of chain breaking force). Magnetic lock is paired with a closer. This is a special device for the gradual resumption of attraction of magnetic plates and smoothness of the door. The mechanism increases the convenience for users and the period of use of the door, reducing the load on the materials, because it is used together with electromechanical models.
Turnstiles. This is high bandwidth equipment. For the effective distribution of passing people use the function of a single pass of a person through the turnstile.
They produce full-height and waist turnstiles. The latter are installed near the security point, they serve as a visual barrier and a point of distribution and control of visitors to the object. A full-height turnstile costs more than a full-height turnstile. The design does not let people through, makes it possible to deprive the checkpoint of additional protection.
To pass the turnstile you need a minimum of time, and at a time only one visitor can pass, whose body is captured by sensors. Therefore, next to the turnstile there should be a free passage, which quickly opens in emergency situations.
Lock cabins. Use on objects with a high level of security. A person passes through the gateway and one cannot open the first door, or close the second. Before obtaining permission, you cannot leave the cab, and in emergency situations and in case of violations, the visitor is blocked inside.
They are controlled centrally or using an autonomous microprocessor unit. When choosing, pay attention to whether the cabin is equipped with communication facilities with ACS controllers.
Gates and barriers. Mounted at the exits and entrances to the property, parking. When choosing, pay attention to the characteristics of materials that should be suitable for atmospheric conditions of use. It is important that the gates and barriers are compatible with the operation of the main ACS controllers.
There are also other additional elements of access control systems, without which the system is able to function correctly. Such equipment only extends functionality, allows you to solve individual tasks for the control and protection of the enterprise. One of the useful additions is a videophone, which transmits and records the image from the checkpoints of the enterprise, improves the remote system for opening a door or gate. When choosing an ACS, pay attention to the power system, as well as the installation of specialized software for complex systems.
Form not found or is not published
Found a typo? Please select it and press Ctrl + Enter.