Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Baowei Intelligence: three basic elements of the access control system

Baowei Intelligence: three basic elements of the access control system

May 17, 2023
What are the three basic elements of the access control system? The three-roller gate manufacturer Bao Wei intelligent experts to analyze the following three elements for everyone to share.

A feature vector <br> <br> access control system is a flow, stream, stream management information and control system. Therefore, first of all, the system must be able to confirm their identity and determine the legitimacy of their access (behavior). This is a way to give them a sign of identity and authority. We call it a feature carrier, and the information it carries about identity and authority is a feature. The key to a mechanical lock is a feature carrier whose "tooth shape" is a feature. There are many feature carriers that can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used today. These feature carriers are to be used together with the holder (person or thing), but it has the same identity as the holder, which means that the feature carrier can be held by others (materials). In order to prevent this problem, multiple methods can be used, ie, using more than two types of feature carriers (depending on the security requirements of the system). If one can pick a unique and stable feature from the holder itself as a message of identity, this problem does not exist. Of course, the characteristics from the "holder" are called "biometrics," and the feature carrier is naturally the holder.

Second, the reading means is reading apparatus <br> <br> information exchange with the device characteristics of the carrier. It reads information about identity and authority from the feature carrier in an appropriate way, thereby identifying the identity of the holder and determining the legitimacy of its behavior (incoming request). Obviously, the feature reading device is a device that matches the feature carrier, the technical properties of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is a “cylinder”, and after the key is inserted into the lock core, the identity and authority of the holder are confirmed by the tooth profile matching of the movable marble in the lock core and the key. The identification process of the electronic reading device is: converting the read characteristic information into electronic data, and then comparing with the data stored in the device memory to realize the identification of the identity and the authentication of the authorization. This process is also called “feature recognition”. ". The characteristic reading device has only the function of reading information, and some also has the function of writing information to the feature carrier. Such a device is called “reading and writing device”, and writing information to the feature carrier is a system authorization to the holder. Or amend the authorization process. This feature carrier can be modified and reused. The key to a mechanical lock is generally not modifiable, and the authority it represents cannot be changed. Human biometrics cannot be modified, but their authority can be changed through system settings.

Third, the locking mechanism <br> <br> access control system only with appropriate locking mechanism was practical. When the reading device confirms the identity and authority of the holder, the legal person is allowed to smoothly access and effectively block the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems, or different applications of access control technology. For example, the lever of the subway toll system, the car stop of the parking lot, and the banknote collection and payment device of the self-service bank. Locking If the organization is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. When the lock core is matched with the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.

The safety of the access control system includes the impact strength, that is, the resistance to mechanical damage. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the locking mechanism of the access control system is also commonly used electronically controlled locks. Its characteristic carrier is mainly various kinds of information cards. The opening and closing of doors is controlled by electromagnetic force.
Hubungi Kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk popular
You may also like
Related Categories

E-mel kepada pembekal ini

Subjek:
E-mel:
Mesej:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kita

Siasatan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Menghantar