Amazines Free Article Archive
www.amazines.com - Thursday, April 18, 2024
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133573)
 Advice (161671)
 Affiliate Programs (34799)
 Art and Culture (73855)
 Automotive (145712)
 Blogs (75614)
 Boating (9851)
 Books (17223)
 Buddhism (4130)
 Business (1330636)
 Business News (426446)
 Business Opportunities (366518)
 Camping (10973)
 Career (72795)
 Christianity (15848)
 Collecting (11638)
 Communication (115089)
 Computers (241951)
 Construction (38962)
 Consumer (49953)
 Cooking (17080)
 Copywriting (6733)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20319)
 Dating (45908)
 EBooks (19703)
 E-Commerce (48258)
 Education (185521)
 Electronics (83524)
 Email (6438)
 Entertainment (159854)
 Environment (28970)
 Ezine (3040)
 Ezine Publishing (5453)
 Ezine Sites (1551)
 Family & Parenting (111007)
 Fashion & Cosmetics (196605)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310615)
 Fitness (106469)
 Food & Beverages (63045)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25202)
 Government (10519)
 Health (630137)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91657)
 Home Improvement (251210)
 Home Repair (46243)
 Humor (4723)
 Import - Export (5459)
 Insurance (45104)
 Interior Design (29616)
 International Property (3488)
 Internet (191029)
 Internet Marketing (146687)
 Investment (22861)
 Islam (1161)
 Judaism (1352)
 Law (80506)
 Link Popularity (4596)
 Manufacturing (20914)
 Marketing (99316)
 MLM (14140)
 Motivation (18233)
 Music (27000)
 New to the Internet (9496)
 Non-Profit Organizations (4048)
 Online Shopping (129734)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12689)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126700)
 Recreation & Leisure (95495)
 Relationships (87674)
 Research (16182)
 Sales (80350)
 Science & Technology (110290)
 Search Engines (23514)
 Self Improvement (153300)
 Seniors (6220)
 Sexuality (36010)
 Small Business (49311)
 Software (83033)
 Spiritual (23516)
 Sports (116155)
 Tax (7663)
 Telecommuting (34070)
 Travel & Tourism (308304)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11790)
 Website Design (56919)
 Website Promotion (36663)
 World News (1000+)
 Writing (35844)
Author Spotlight
TAL BARNEA

Tal is an electrical engineer with over 25 years of expertise with hardware, software, mechanical an...more
MANMOHAN SINGH

Digital marketing professional with 8 years of experience. A good listner, Stratgist and fun loving ...more
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
TUSHAR BHATIA

Tushar Bhatia is the Founder President of EmpXtrack Inc with over 19 years of experience in the soft...more
BRENDA PANIN

Passionate blogger and a great animal lover. ...more


What is Access Control System by Luna Leng





What is Access Control System by
Article Posted: 03/11/2016
Article Views: 732
Articles Written: 39
Word Count: 1202
Article Votes: 0
AddThis Social Bookmark Button

What is Access Control System


 
Business,Computers,Telecommuting

access-control.jpg
Entrance access control security management system is a new modern safety management system, which combines computer automatic identification technology and modern safety measures as a whole, it involves a lot of new technologies in electronics, machinery, optics, computerte chnology, communications technology, biotechnology and so on. It is aneffective measure to solve the entrance implement security management for importantsectors. For a variety of confidential sectors, such as banks, hotels, parkinglots management, computer room, armory, confidential room, office, intelligence community, factories and so on.
Access control system goes beyond the meredoorway and key management, it has evolved into a complete access controlsystem. It plays a larger role in a safe working environment, personnelattendance management and other administrative work.


Access control system categories

There are different types of access controlsystems according to different classifications

a. According to the designprinciple

1, the controller comes with a card reader (identification device)
This design flaw is the controls shall beinstalled outside at the door, some of the control lines must be exposed to the outside, insiders do not need cards or password can easily open the door.
2, controller and card reader (identification device) Split
Such a system controller installed in the room, only a card reader input lines exposed outdoors, and all other controllines are in the room, and the card reader is transmitted digital signal,therefore, If no effective valid card or password no one can enter. Such systems should be the user's choice.

b. Classification of communication way
1. Stand-alone control type:
These products are the most common for small system or the centralized installation location unit. Usually use RS485 communication. The advantage is that small investment, dedicated communication lines. The disadvantage is that once installed, it can not easily change the position of the center of management, not easy to achieve network control andremote control.
2. Network type:
Such high-tech products, but also rare,only a few companies molding. It uses a commonly network communication TCP / IP protocol. Advantages of such a system is the controller and the management center via LAN to transfer the data, the management center position can be changed at any time, without re-wiring, easy to implement network control orremote control. Suitable for large system or geographically dispersed units. Disadvantages of such systems are part of the communications system stability rely on the stability of the local area network.
C.  By means of identification
1. Password identification
Password verification: identified outprivileges by checking a password.
Password keyboard - These products are divided into two categories: one is ordinary type, one is out of order Keypad(numbers on the keypad is not fixed, from time to time changes automatically).
Normal type - Advantages: easy to operate,no need to carry a card; low cost. Disadvantages: only accommodate three passwordswhile easily leak, security is poor; no access to records; only one-waycontrol.
Shuffle Keypad (numbers on the keypad isnot fixed, from time to time changes automatically) - Advantages: easy to operate, no need to carry the card, the safety factor is slightly higher. Disadvantages: easy password leak, security is not high; no access to records; only one-way control. high cost.
2. Card identification
Card identification: to identify the access privileges by reading the card or card with a password mode, according to thetype of cards is divided into magnetic card and RF card.
Magnetic card - Advantages: low cost; oneperson one card (+ PIN), security in general, could be linked computer, thereare open records. Disadvantages: cards, equipment wear and tear, shorter life expectancy; card easily copied; not easy bi-directional control. Card information vulnerable to external magnetic field, so that the card is invalid.
RF card - Advantages: cards, contactless device, convenient and safe to open the door; long life, the oretical data atleast ten years; safe, could be linked computer, there are open records; can achieve bi-directional control. Card difficult to be copied. Disadvantages:high cost.
3. Biometrics identification
Biometrics: Biometric by inspectors and other ways to identify entry and exit. Such as fingerprint, hand geometry type,iris pattern, facial recognition type, as well as finger vein recognition type. Pros: From the perspective of identifying excellent safety; no need to bring the card. Disadvantages: high cost. Recognition rate is not high, high environmental requirements, for users requiring high (such as a fingerprint cannot be scratched, swollen eyes are not bleeding, his face can not have hurt, or how much beard), inconvenient to use (such as facial recognition and iris type, installed certain height, but the user's height different).


Access control components

a. Access Controller
The core of the access control system, the equivalent of a computer CPU, which is responsible for the entire system input,output and storage of information processing, control, etc.
Card reader (identification device) – Such as (Kiosk card reader SYNCOTEK SK-288-K001)
Reading card data (biometric information) devices.
card-reader-sk_288_k001-access-control
b. Electric Lock
Lock the door - the execution unit of access control system. Users should be based on the material of the door, out requirements needs to select different locks. There are the following types:
(1) Electromagnetic lock: electromagnetic lock is to open the door after power off, meet fire safety requirements. And equipped with a variety of mounts for customers to use. This lock is suitable for one-way doors, glass doors, fire doors, folio electric door.
(2) Anode lock: anode is to open the door afterpower off, meet fire safety requirements. It is installed in the upper door frame. The difference from the electromagnetic lock is that anode lock issuitable for two-way doors, glass doors, fire doors, and it itself has magnetic door detector can detect the security status of the door at any time.
(3) Cathode lock: Usually cathode lock is to open the door when energized. Applicable one-way doors. Cathode lock installation must be equipped with UPS. Because when power off the cathode lockis to lock the door.
c. Card
The key to the door. You can print the cardholder's personal photos on the card, combine the door card and badge.
Other equipments
Exit button: Click to open the door appliance, suitable for the situation to go out unlimited.
Magnetic: Used to detect the door safety/switch state, etc.
Power: the entire system power supply equipment, divided into ordinary type and backup (with battery).


Working Principles

Card reader reading a smart card information(card number) of a cardholder, and then convert to an electrical signal to the access controller, the controller according to the received card number, the cardholder is determined by whether the software over this period can beauthorized to enter the door, according to the result of the determination tocomplete the unlock, remain blocked, etc. . For networked access control system, controller also accepts personnel information transmitted from the management computer, and corresponding authorization information while transmitting card recording information to your computer. A single controller can be composed of a simple access control system, used to manage one or two doors. A plurality of controllers are connected to form the entire building access control system via a communication network with computers. Computer with access control systems management software, which manages all system information analysis and processing.


Related Articles - access control card readers, access control system types, access control system components,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
SUSAN FRIESEN

Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
SHALINI MITTAL

A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
JAMES KENNY

James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2024, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license