- CCTV
- Alarm systems
- Access control
- Intercom systems
- Fire safety systems
- Videodoorphones, doorphones and intercoms
- Electric gate automation systems and barriers
- Networking
- Sound systems
- Switching and Server Cabinets, accessories
- Tools and accessories
- Cables covers and accessories
- Power supply and accumulators
- HDMI
- Accessories for caravans and campers
- Wiring
- Solar energy
- Wind energy
- Contacts
System schemes facilitate the common maintenance of many aisles and the identification of users by means of many identifiers, the integration of other security systems (eg CCTV and SSWIN). The scheme includes several basic elements that contribute to the creation of any access control system.
The main element with which we can integrate this access control system is the controller. Its main task is to store data about user codes, the ability to add, delete or change them, maintain and manage additional modules (readers, additional memory, communication modules) and communication with other equipment (computer, printer, etc.). An important element is the ability to register events and their sequential analysis. The controllers are usually equipped with communication modules, signaling and control inputs / outputs. Controller programming is carried out using special software.
Input systems (both built-in and independent) have an option associated with several states of alarm and tamper, which may appear during the operation of the equipment. The system has an input signaling the opening or closing of the door. Depending on the signal, we can get information about:
* forcing the door (wearable entrance) - opening the door without giving the correct code,
* door delay (door open) - this state is observed when, after opening the door by the system, it does not close after a time specified in the system.
After fixing one of the above-mentioned states, the system sends a signal to one of the alarm outputs. Some systems have additional inputs (for example, for sensors of the PIR type) and are used to signal an alarm condition. The controllers are equipped with reading ports to facilitate the connection of many types of identification equipment eg. proximity card readers, keyboards, biometric readers. In advanced systems, there is a choice of many identification formats (WIEGAND, MOTOROLA, PROTECH, etc.)
Another essential element that integrates the entire system is software. With its help we are able to fold and further manage the entire system. Their main tasks should include the creation and further maintenance of databases (users, passes, time rates, access groups). In addition, manufacturers supply them to the modules for tariffication of working hours, a report function, additional capabilities associated with the maintenance of external equipment (for example, lighting).
The whole circuit is connected by the so-called. communication modules guaranteeing correct operation of individual elements of the access control system using different transmission methods. Currently, the most used format is RS485 or RS232. Communication over the LAN / WAN is becoming increasingly important. Most of the controllers on the market are equipped with communication systems as standard, but manufacturers also offer additional modules to expand the transmission capabilities.
The next element is the systems providing user identification. Among them, we can distinguish several basic methods:
* Proximity cards
Equipped with an electronic system and a soldered antenna. They have an individual code, programmed by the manufacturer, containing the data of the object or the user number. The card identification method is based on the following principle. The reader sends a constant signal that induces a signal in the system (for a passive card) or is caught (for an active card) by the electronic card system. In the case of a passive card, the current syndicated in the coil feeds the internal system, which consequently sends the card code to the reader. The active card, due to its own power supply, independently sends the card code. The pulse is received, processed by the reader and sent to the command controller. Active cards have their own power supply (internal battery), which provides a return, stable signal to the reader. They are perfect for objects with a large human flow or in places where a long distance for reading maps is required (from a few centimeters to even 2m). Passive cards lack internal power. Taking into account the possibility of using the field energy emanating from the reader, they are characterized by a small range (up to several centimeters). They are perfect for objects with little human traffic. Both types are performed in the form of a card (similar to a bank card) or various kinds of key fobs, watches, etc. Active cards also exist in the form of car modules operating at a distance of over 1 meter. A big positive feature of proximity cards is their high resilience and low susceptibility to damage and interference.
* Magnetic cards
Made in the form of a typical bank card, they have a magnetic stripe with several tracks for recording. Reading takes place after inserting the card into the reader's slot. A positive feature of this kind of solution is their low cost. Their negative feature is their short vitality and great flexibility for mechanical damage, removal and simple copying.
* Cards with barcode
They have an individual, written striped code. Reading occurs when approaching the reader. The method is fast and confident. Little popularity.
* With tangent memory
Most often they exist in the form of circles (eg "DALLAS" type) containing a code programmed by the manufacturer. Data transfer occurs after the circle is leaning against the reader socket. Great durability, guaranteed unique code, accuracy of action are the positive features of such a solution.
* Keyboard
The method of directly entering information using the keyboard belongs to the oldest, but still popular, identification method. For simple access control, you can use a keypad with a coded lock that has user codes in memory. Entering the appropriate code results in a signal for the electric lock being sent to one of the outputs. Depending on the manufacturer, they can memorize from several to several dozen individual codes and serve up to several signaling outputs. For system circuits, the keyboard is the equipment for entering the user code, which is further processed in the command controller. The keypad is often used for system programming. Some manufacturers use random flashing of numbers under the keys and an additional shutter that impedes lateral observation to protect against undesirable persons under the code. The solution is cheap and convenient (one keyboard for several persons), but not very practical for frequent use (long time for the user to enter the code).
* Biometric methods
In facilities with a high level of security, systems based on biometric readers are increasingly used. The most commonly used are:
o Fingerprint readers, not based on the method of scanning (using the CCD element) individual papillary lines and further processing by comparing the internal stored sample or the sample stored for ex. magnetic media. Reading time up to 1 second.
o Palm contour recognition, CCD camera scans a 3D image of the palm. In the future, the system compares the captured image with a sample from the internal memory or from external memory, for example. from a magnetic card. Reading time up to 1 second.
o Examination of the retina of the eye, determining the characteristic pattern of the blood vessels. The solution is almost infallible. The downside is the need to place the eye in the immediate vicinity of the reader.
o Examination of the iris, one of the most modern methods associated with a unique picture of the iris. It is characterized by high reliability and the ability to scan from a distance of several tens of centimeters. Very fast identification time less than 1 sec.
o Speech identification, a system that analyzes the password said by the user. The individual voice spectrum ensures high reliability and uniqueness.