Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

บ้าน> บล็อก> 20 Key Knowledge Solutions for Access Control Systems

20 Key Knowledge Solutions for Access Control Systems

April 14, 2023

Regarding the questions related to the access control system, you should be able to find the answers here.

1. In the access control system, how can we effectively prevent the tailgating?

A: Anti-trailing has always been a difficult problem for access control systems. The following methods are recommended:

1) Change the door: Install the quick-through door (or three-roll gate). This method also has its shortcomings, such as the speed-through door, which is basically used indoors, only 55cm wide, only one person is allowed to pass, and there is a counter alarm function. If two people pass at the same time, an alarm will be generated. The three-roll gates can be used outdoors, but for those who have crossed over from above, the preventive effect is not ideal, and three-roll gates and other methods are suitable for places such as security exhibitions.
2) Add and remove card readers. If a person follows the card holder and enters it, he must also swipe the card to open the access door in order to achieve the purpose of preventing the tailgating. However, when they go out, if they also go out with the cardholders at the same time, it will not be able to achieve real anti-trailing.
3) Two-way read card plus double door interlock this way. Two-door interlocking basically solves the problem of trailing, because if you want to open a second door, the first door must be locked, or the second door cannot be opened at all. There is also a more cumbersome way to install the camera, is the use of image processing technology to detect the portrait (of course, through the camera to capture the image), but this method is cumbersome and requires a lot of knowledge outreach.
4) If the security level is particularly high, full-height doors or higher-level interlocking doors (two doors, one is weighed after one enters and then the second door opened) can be used to achieve real anti-trailing; the disadvantage is that the price of such doors is not Philippine.

2. The intercom extension cannot open the door. How to troubleshoot the fault?

A: The fault description is not detailed. If you provide a more detailed fault description and electrical schematics, you can more clearly give the answer. Therefore, the following can only provide several kinds of possible failures: It may be that the electric control lock is broken, the signal is hesitant or the electric control lock's line contact is not good. In addition, you can also check whether there is a problem on the household line; another possibility is that the extension is broken. If other extensions on the system cannot be unlocked, it indicates that the main line of the system has a problem or the electric lock is broken. If the instantaneous voltage provided by the unit door machine to the electric lock is not reached, the extension may not be able to be turned on; it is also possible to check the button of the extension to unlock and detect if it is broken; the last possibility may be an error in the coding.

3. When the manager talks with the door machine, the microphone of the door machine screams. How to deal with this problem?

Answer: This phenomenon may be caused by improper wiring. Normally, one power supply and one G-line are connected. The G-line is connected with one more cable; the other possibility is that sound adjustment is not appropriate.

4. Can the hosts and extensions of different brands be compatible with each other when maintaining the area?

A: It is impossible to be compatible. For the bus, because the cabling mode and protocol may not be the same, the compatibility may be almost zero unless two manufacturers' bottom-end protocols are found. At present, there is basically no standard for video intercom products. Products from different manufacturers cannot be interconnected. The video intercom subsystem can not be interconnected with other weak electronic systems. The reason is that there is no standard. Without standards and lack of openness, the system cannot be interconnected, and it will be impossible to ensure long-term product warranty and service, and the industry cannot develop healthily. Therefore, the market is very much looking forward to the emergence of standardized and open products.

5, an old district renovation project has a deaf grandfather, want to from the extension and a lighted bell, downstairs call when the light reminds to open the door, I do not know how feasible and how to connect?

Answer: It is possible to use the ringing signal to modify the circuit. The trigger signal is led through the relay switch to the circuit of the bell and the lamp in series. The contact switch is turned into a double-contact switch. When the button is pressed, there is an idle dry signal at the same time to drive visual signals such as flashing lights or ring tones.

6. Community unit access control is not network intercom network, access control is Shenzhen Chuangtong products, intercom is Taiwan products. It is now necessary to have the unit door unit and the unit access control together with the control unit door lock, but the intercom engineering party believes that it is not so good to control the door lock. Is this?

A: For a simple switch signal, if both systems are you doing, it should be no problem, plus a relay can be solved. If the access control is the priority, the door opening signal line of the intercom can be connected to the terminal of the door opening button of the access control, and no relay is needed. Add a simple triode switch circuit to control the unlocking relay of the original intercom system, so as to avoid mutual interference.

7. The old-fashioned direct-view video intercom host can't have any object near the back of the host, otherwise there will be a bee-to-mouth beeping. What is the reason?

A: The typical self-excited horn and microphone, the speaker is generally transmitted sound waves close to the object, the sound wave back through, resulting in self-excitation. The reason for the malfunction is that the sensitivity of the speaker is too high. For a potentiometer, try to adjust the sensitivity of the speaker and turn the speaker's sound down. You can also adjust the sensitivity of the microphone to debug the direction of the microphone and solve the problem by adjusting the device.

8. A floor guard is installed at a floor of a certain building. If a different brand of access control is installed in the second floor, two sets of door entrances are independent. Can the B building access control use the IC card (or ID card) of the A-building access control system, and does the A-building access control function remain unchanged?

A: Theoretically, it's just a problem with the access controller. But first of all, it is necessary to figure out what card was originally used, such as a smart card or identification card of some companies, a special card, and an encryption card.

9, the building intercom host has noise, the extension noise is too loud to hear the voice of someone coming. Is the power problem? If so, what should I do? Not how? How can this problem be avoided?

A: This should consider what brand of intercom system, as well as the wiring line selection model, more importantly, to find out where the interference, it may be caused by harmonic aging of the power device aging, can be changed Phase filter good power supply try, the best solution is to update the power supply. The second is to see if there is good contact with the ground.

10. What are the differences between IC card and ID card?

Answer: 1) Definition of IC card and ID card: Integrated circuit card (IC card), also known as smart card (S smart card). Can read and write, large capacity, encryption, data records, reliable, more convenient to use, such as card systems, consumer systems, etc. Currently, there are PHILPS Miifare series cards. ID card full name identification card (Identification Card), is a non-writable proximity card, with a fixed number, mainly SYRIS Taiwan's EM format, the United States HID, TI, MOTOROLA and other types of ID cards.

2) The IC card must be initialized (ie, encrypted), and the ID card is not used. When the IC card is in use, it must first pass through the unique two-way key authentication between the IC card and the read/write device before the relevant work can be performed. The entire system has extremely high security.

Therefore, the factory IC must be initialized (ie, encrypted) in order to generate a non-decryptable one-card system key in the IC card after leaving the factory, so as to ensure a secure distribution mechanism of the card system. After the IC card is initialized and encrypted, it is handed over to the user, and the customer uses the IC card issuing system to generate a private key for each user card. In this way, it is ensured that user cards issued in other user systems cannot be used in the system, which ensures the specificity of the system and thus ensures the safe use mechanism of the system.

Like the magnetic card, the ID card only uses the "card number". In addition to the card number, the card has no security function, and its "card number" is open and bare. So, the ID card is the "inductive magnetic card", but the main question is simply not needed or does not require initialization.

Why does the initialization process not be done by the user himself? This is because:

1) If the user initializes himself, he/she cannot prevent the cheating inside the user. Because when the user uses the card system, if an employee uses the socially purchased card to initialize it at will, he can freely issue a household card that can be used by the household and can even freely recharge the card. This will not only result in serious cheating consequences, but also This will lead to serious flaws in the use mechanism of the security of the card system.
2) In addition, if the user purchases a defective factory card and initializes it and cannot use it on the system, the system will use poor performance or defects, which will result in unclear liability for accidents.
3) The initialization process is performed at the factory, mainly the basic needs of the IC card security key authentication mechanism, and it is also an IC card system integrator's profile. Just like the urban public transportation IC cards, before the cards are handed over to the public transport system, the key of each card must be controlled by factory encryption.
4) If the key card for initializing the authorization is lost due to lack of professional management by the user, the user and the manufacturer cannot use the card. Therefore, the initialization work is done by the manufacturer only to ensure safety.

11. Comparison of IC Card System and ID Card System

1) Security: The security of IC cards is much greater than that of ID cards. The card number in the ID card is read without any authority and is easy to copy. The reading and writing of the data recorded in the IC card requires corresponding password authentication, and even each zone in the card has a different password protection to fully protect the data security. The password for the IC card writing data and the password for reading out the data can be Different settings provide a good level of management to ensure system security.
2) Recordability: The ID card cannot write data. Its record content (card number) can only be written by the chip manufacturer once. The developer can only read the card number and use it. It is impossible to formulate new number management according to the actual needs of the system. system. The IC card can not only read a large amount of data by an authorized user, but also can authorize the user to write a large amount of data (such as a new card number, user's authority, user information, etc.), and the content recorded by the IC card can be erased repeatedly.
3) Storage capacity: ID cards only record the card number; IC cards (such as the Philips mifare card) can record about 1000 characters of content.
4) Offline and Networking Operation: Since there is no content in the ID card, the card holder's authority and system function operation can fully rely on the support of the computer network platform database. The IC card itself has recorded a large amount of user-related content (card numbers, user data, permissions, consumption balance, and other large amounts of information), and it can completely run off the computer platform, and realize the operation mode of automatic conversion between networking and offline, and can achieve large-scale use. Less wiring requirements.
5) One-card extension application: ID card can only rely on network software to process information of each subsystem because there is no record, no partition, which greatly increases the dependence on the network; if the ID card system is completed, the user wants to increase the function point. It requires additional cabling, which not only increases the difficulty of construction, but also increases unnecessary investment. Therefore, using an ID card as a system makes it difficult to expand the system and it is difficult to realize a true card. The IC card storage area itself is divided into 16 partitions, each partition has a different password, with multiple sub-systems * management functions, such as the first partition to achieve access control, the second partition to achieve consumption, the third partition to achieve employee attendance, etc. . Fully realize the purpose of one card, and can be completely modularized. Even if users want to increase the function points, they do not need to re-wiring. They only need to add hardware and software modules. This facilitates the IC card system to upgrade at any time with ping and achieve a smooth upgrade. ,Reduce repetitive investments.
6) Maintenance and operation of intelligent systems: For example, if a computer issues a new user ID card, it must be able to pass through the network of the ID card system and manually download all ID card numbers to each ID card reading pupil controller. In the middle, otherwise the ID card can not be used as countless cards; if you want to change the user rights, you need to enter the authorized ID card number on each ID card controller. In addition, if an ID card is frequently added after the system is put into use, if a new card is added or a permission for a card is changed every year, the card number must be entered on a controller that is available for the card. The workload and time for manual operation and maintenance have been greatly increased. In addition, if there are several more single card subsystems, or when the subsystems are slightly larger, the complexity of system maintenance and management will increase geometrically, which will directly lead to the failure of the system. run. With the IC card's one-card system, after the IC card is issued, the card itself is a data information carrier. Even if the communication network is disconnected, the read-write controller performs offline card reading and writing as usual; if the user rights are changed, the user's permission can be directly Written in the IC card, the new user to change the permissions simply modify the card, completely without having to modify the various controllers, from the technical mechanism to avoid the manager everywhere to change the controller card permissions to achieve the management efficiency The purpose of intelligent management.
7) Cost-effectiveness: Although ID cards and their card readers are cheaper than IC cards and their card readers, the price of the two systems is comparable to that of the entire card system (wiring cost and structure). IC card systems Compared with the ID card system, it is stable and reliable. Therefore, the cost-effectiveness of the IC card system is much higher than that of the ID card system. In addition, taking into account the fact that today's residential hardware environment is not very mature, system personnel are not very familiar with the reality of computer knowledge, it is impossible to establish or maintain a complete network system to support the ID card card 24 hours of continuous operation. Therefore, it is a better choice for today's users to meet the smart card IC card system that is suitable for networking and offline operation.

12. What is the furthest reading distance for a passive M1 card used for parking?

A: The distance of the M card mainly depends on the power of its reader, the speed of data exchange, and its frequency modulation method. Passive card in the absence of the antenna induction distance of about 3-5 meters, plus the antenna can reach up to 8 meters, the current situation in the passive, M1 card can not do ultra-long distance card reader.

13. What are the output formats of the reader?

A: The reader output format is now commonly used: RS232, RS485, WG26, WG34, ABA. ID ABA code (also known as Manchester code) has the following two common coding methods: 1) If the card reader adopts hexadecimal in 8H format, the ABA code is “192D9D” and the decimal code is “0026226077”. ". 2) If the card reader adopts hexadecimal format of 6H format, the ABA code is "92D9D", and it is converted into decimal ABA code "0009448861". Decimal "0026226077" is converted into 8H format hexadecimal is "1902D9D", and converted into 6H format hexadecimal is "902D9D". This is why the ABA code read by the card reader is different from the ABA physical code on the card.

14, the card close to the reader, the buzzer does not ring, the lights did not respond, communication is normal. What's the problem?

A: Possible causes: (1) The connection between the card reader and the controller is not correct; (2) The reader-to-controller line exceeds the effective length (120M)

15, the valid card close to the card reader, buzzer sound, no change in the LED indicator, can not open the door, what is the reason?

A: Possible causes: (1) The reader and controller are not correctly connected; (2) The circuit is seriously interfered and the card reader data cannot be transmitted to the controller.

16. The use of the access controller has been normal. Suddenly all valid cards cannot be opened (become invalid) on one day.

A: Possible causes: (1) The operator has set a rest day for the access control device (on the rest day, all cards cannot be opened);

(2) The operator has initialized the access control or other reasons causing the controller to execute an initialization command.

17. Move the valid card close to the card reader. The buzzer sounds and the LED indicator turns green. But the door lock is not open?

Answer: Possible causes: (1) The connection between the controller and the electric control lock is incorrect; (2) Is the power supply to the electric lock normal? (The electric lock requires an independent power supply); (3) The electric control lock is faulty; (4) The mechanical locking of the bolt and the latch occurs.

18. When the valid card is close to the card reader, the buzzer sounds and the door lock is opened, but the light of the card reader is off?

Answer: (1) The controller and the electronic control lock share a power supply, which is the reverse potential interference when the lock is working, resulting in control reset; (2) The power supply power is not enough, causing the controller and card reader to not work properly.

19. What are the main wiring structures of networked building intelligent systems?

A: Mainly multi-core cable is adopted as the mainstream method. Video is transmitted using coaxial cable. Audio, data, and power are usually transmitted through RVV cables, and network cables can also be used. Such as Shenzhen Matsumoto intelligent (4 +1 mode), Xi'an Kaiyuan, Shenzhen Shide security, Xiamen Li Lin, Guangzhou Anju Bao, etc., while other manufacturers use two-wire signal modulation transmission, there are also wireless products.

In the wiring of the building intercom system, three issues need to be solved: audio quality, video quality, and data transmission quality. Audio transmission has 3-wire and 2-wire systems. 3-wire transmission can better solve signal amplification and adjustment problems.

Data transmission generally uses dedicated codec chips, CAN transceivers, and RS-485. Differential data transmission methods such as RS-485 have advantages in signal anti-jamming, and baseband electronic data transfer methods are highly susceptible to bus methods. Divided into dry bus (networking) and branch bus (unit), connected by the router (splitter).

20. What kind of wire should be used for the 8-floor building intercom? Three-line and N+1 type?

A: According to the specific configuration requirements to determine, mainly related to the needs of the intercom function, the intercom is visual or non-visual, is the pass-through or coded or household intercom, different functions, modeling will have Subtle differences. If no brand is selected, the cabling suggestion program: Visible: 6 cores + 1 video; Non-visible: 4 cores.

ติดต่อเรา

Author:

Ms. Yanjun Chen

อีเมล:

quentin@zecheng.com.cn

Phone/WhatsApp:

+8613602572892

ผลิตภัณฑ์ยอดนิยม
You may also like
Related Categories

อีเมล์ให้ผู้ขายนี้

ชื่อเรื่อง:
อีเมล:
ข้อความ:

Your message must be betwwen 20-8000 characters

บ้าน

Product

Phone

เกี่ยวกับเรา

สอบถาม

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

ส่ง