Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
86-0769-39020536
The traditional security access control has been far from meeting the current development needs of the banking industry. It requires a larger and higher platform to focus on integrated management and control. The integration of access control systems and banking business management requires access manufacturers to provide high-capacity, high-reliability, distributed control, and centralized management products, a more intelligent and more secure system platform, and deeper integration of access control systems through the platform. Meet the needs of the market.
Networked access control systems gradually replaced traditional access control with the advantages of application security and convenient management, becoming the mainstream of development. The networked access control system is superior to the traditional access control in terms of controller security protection level, humanization of the reader, linkage intelligence level, network bandwidth, transmission speed, etc. The system software also has stronger comprehensive ability and can cross platforms. , cross-regional management. This article takes the world's leading security product and industry solution provider Hikvision as an example to discuss several applications of networked access control in banks.
First, the actual needs of the bank office building access control
1. Management of exits and entrances of office buildings
Only people holding office building work cards can enter the building and use fast personnel access gates to manage. To prevent the entry of people who do not have cards and to send advertisements, promotions, etc., it is easy to maintain the working environment in the building.
2. Visitor registration
In order to maintain the working environment of the office building, visitors to this building are not permitted to enter the building's work area unless they have booked or registered visitors. If there are reservations on the Internet in advance, you can use the self-service visitor's ID card to change the card through the entrance gate. Temporary visitors, after entering personal information at the temporary visitor workstation, issue a card to enter the building. The visitor's card automatically assigns the floor access that the ladder can reach based on the company the visitor needs to visit.
Visitor and personnel channel topology:
3. Elevator Management in High-rise Office Buildings
In ultra-high-rise financial center offices, different companies and departments are distributed on different floors to prevent non-personal or non-personnel personnel from interfering with the work environment. Only staff with the employee's card can greatly develop the floor.
4. Other needs of bank office buildings
1) Implement online patrol function
The security requirements of financial center office buildings are stricter than ordinary office buildings. The integrated management of the access control of the overall financial building facilitates online patrolling of guards and increases the level of security protection. Using the reader's card access control, the guards were issued a patrol card, and the card was swiped according to the designated credit card line within the prescribed time. This is a normal patrol. There is no need to re-arrange offline patrols. Patrols are more flexible and easy to integrate into the system.
2) Attendance management function
The fabric points are set at the entrance and exit of the company's doors, and the back-end access control system is under unified management.
3) linkage function
The security management platform integrates all devices to enable access control and fire protection linkage. In the event of a fire, all access controls can be turned on to facilitate the escape of personnel. In conjunction with video, when important rooms and key areas are opened, the video is linked to the management center.
The topology is as follows:
4) Network Management
Multiple access control terminals are networked via the Internet, and only need to log in on any terminal. All data will be automatically transmitted to the access control monitoring server in the security monitoring room for use by any other terminal for identity authentication.
Personnel authorization management: It is very easy for employees to delete permission after being transferred. If the supervisor deletes or suspends the transferred employee account that needs to be prohibited from entering or leaving the access control monitoring server, the transferred employee can no longer access the specified access control immediately;
Access time authorization management: Each access control can be individually or uniformly (or through monitoring and management software) for personnel access settings for day-to-day working hours. This ensures that workers who are not allowed in and out of the working hours are Fingerprint certification can not open the access control, and it plays a role in reducing the hidden dangers in the security protection.
March 08, 2024
November 29, 2023
อีเมล์ให้ผู้ขายนี้
March 08, 2024
November 29, 2023
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
Fill in more information so that we can get in touch with you faster
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.