Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Identification mode of intelligent access control system technical parameters

Identification mode of intelligent access control system technical parameters

February 14, 2023
Identity mode
Mode 1: One-way swiping induction mode (main accessory equipment: access control reader + multi-access control controller + exit button + electric lock)
The user presents an authorized proximity card outside the door. After the access card reader recognizes the legal identity, the controller drives the electric lock to release and record the door entry time. Go out and press the exit button to open the electric lock and go straight out.
Applicable to the entrance of a company's gate or a general security environment, it can effectively prevent the illegal entry of outsiders. Is the most commonly used management model.
Mode 2: Two-way swipe induction mode (main accessory equipment: multi-access control card reader + access controller + access control card reader + electric lock)
The user presents an authorized proximity card outside the door. After the card reader identifies the identity, the controller drives the electric lock to open and record the door entry time. When the user leaves the controlled room, an authorized proximity card is also required to be displayed in the door. After being identified by the card reader, the controller drives the electric lock to release the door and record the time of exit.
Applicable to a higher level of security, not only can effectively prevent illegal entry of outsiders, but also can query the last person and time to leave, to facilitate the implementation of the responsibility to provide evidence for a specific period (such as when stolen). For example: financial office and other important places.
Mode 3: Card + Password Mode
After you finish the card, you must enter the correct password to open the door. The password is a personalized password, that is, one person and one password. The advantage of this is that, for use in more secure situations, even if the card is given to someone and cannot be accessed, the correct password needs to be entered. And you can easily set the mode, for example: For the same door, some people must be allowed to enter the card + password, some people can swipe, you can enter without a password, the highest authority of the person to enter the password can also be released. Can be applied to: factory warehouses, financial offices and other important places.
Mode 4: Biometrics
For the special requirements of the environment, optional iris, fingerprint, vein, face, palm print biometric identification terminal. This mode has special functions and can be applied to places such as financial offices, warehouses and banks where safety requirements are particularly high.
Mode 5: ID card (live in) CPU card mode
We can set the identity card (live in) CPU card door open mode for the required door in the software, that is, a door can only open the door after reading the ID card (live in) CPU card . Suitable for urban villages, rental housing, low-cost housing, etc.
Mode 6: Manually enter the password mode
When we forget to bring a card, this function is very suitable, we can enter the password on the password keyboard reader to open the door to solve the inconvenience caused by the occasional forget to carry the card.
Mode 7: Mobile Mode (APP, Bluetooth, Wechat, NFC, RF-SIM)
When we forgot to bring the card, the APP, Bluetooth shake, WeChat, NFC, RF-SIM function is very suitable. We APP, Bluetooth shake, WeChat, NFC, RF-SIM to open the door, very convenient.
System features
1> Card Access Control Management
The multi-access control system has a standard capacity of 100W million cards, which basically meets the management needs.
You can use non-contact CPU proximity cards, each card has a unique folder, the maximum degree of protection against copying cards.
The system can arbitrarily set the card's validity, time of use, and place of use. Non-members of such card holders are prohibited from access.
2> Real-time monitoring (networking required)
The status and behavior of all doors in the office can be reflected in real-time in the computer room in the control room or in the multi-access control cloud management platform, such as the door open/close status, who, what time, and what location.
3> Electronic maps (networking required)
The status of the portal is displayed in the image display mode, which can be reflected in real time in the control room computer or in the multi-access control cloud management platform.
4> Data Storage
The multi-access control information can be uploaded to the local PC or multi-Owen access control background for storage.
5> High self-test function
The system can perform remote device state self-check on any door point through management software, self-monitored ambient temperature, input voltage stability monitoring, and running stability detection at any time, reducing personnel maintenance costs and improving overall effectiveness. It is a high performance, safe and reliable. Smart access controller.
6> Fire fighting linkage function
Our controllers have alarm output and fire outlets. The system can activate the fire-fighting linkage function through the fire-fighting switch to the system. When the floor fire has a fire alarm, the DAIC-MJ-MB will automatically open the door to allow the evacuation of the personnel. Automatically resumes operation when the fire is turned off. And can start the fire siren and record the time of the fire alarm recording.
7> Illegal card swiping or illegal entry into alarm and burglar alarm host function
When a controller of an access control system has illegal entry or other security alarm events, it does not forcefully open the door or break through a legal way (swipe button, etc.). The system software will initiate illegal intrusion alarm and burglar alarm host and link CCTV (DVR) for video or picture capture.
8> The door does not turn off the alarm for a long time (requires magnetism)
The door is opened for a long time (the number of seconds to open the alarm, this time can be customized) forget to close the door, the system software monitoring interface will use a red prompt the time and location of the open door overtime alarm information, and drive the computer speaker to remind the on duty staff attention.
9> Device Authority Management
This function is a DAIC-MJ-DOGKEY dongle.
10> Reader's photo
This function is used in some important places to install camera surveillance. When the person reads the card, he takes pictures and saves the pictures for future inquiry. Can effectively prevent staff from punching cards.
Hubungi Kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk popular
You may also like
Related Categories

E-mel kepada pembekal ini

Subjek:
E-mel:
Mesej:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kita

Siasatan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Menghantar