Contents
1. One-card function
Most of the projects now require the realization of one-card functions, the core part of which is the access control system, which needs to implement the following functions: access control, attendance, POS consumption, parking lot, visitor, elevator, half height turnstile, online patrol, book lending and other management.
2. Support dual-machine fault tolerance function
Under normal circumstances, one is the main machine in working state, and the other is the slave machine, which acts as a backup machine and monitors the operation of the main machine at all times. When the host is abnormal and cannot support the normal operation of the information system, the slave will take the initiative to take over (Take Over) the job and IP address of the host, and continue to preside over the operation of the information, so as to ensure the uninterrupted operation of the information system. Automatically take over the original job, the slave machine will be the backup machine, and always monitor the operation of the master machine.
3. Photo comparison function
When the cardholder swipes the card, the photo of the cardholder stored in the computer is displayed on the computer, and the security personnel or the CCTV system can perform comparison to confirm the identity of the cardholder.
4. Interlock function
For some areas that require a high level of security, many layers of channels are required to manage, such as banks. When swiping the first door with a pass-through card, the person swiping the card is in the area between the first door and the second door. At this time, the system will detect the door status of the first door. When the system confirms that the first door has been closed, the cardholder will be allowed to open the second door. If it is confirmed that the first door is not closed, even if the card is authorized When entering the second door and swiping the card, the system will also refuse to open the second door. Some systems can also support the interlocking function of multiple doors.
5. Can be linked with CCTV system
The user can carry out protocol linkage with the monitoring system through the protocol built in the software, and program and control the CCTV front-end equipment (for example: call images, control cameras, rotate the pan/tilt, adjust the focus, etc.). At the same time, the access control systems of some manufacturers have been seamlessly integrated with some well-known brands of DVRs at home and abroad, and the recorded images can be called freely in the software.
6. Linkage with fire protection system
In the event of emergency evacuation such as fire or other special circumstances, some designated doors can be forced to open or close through the software’s preset settings, so as to achieve the purpose of personnel escape and protection of important financial and documents.
7. Linkage with alarm system
The system can be linked with the alarm system. When an alarm occurs, it can perform preset actions, such as opening/closing a preset door, and activate sound and light alarms to transmit the alarm information to the monitoring center.
8. Linkage with building control system
Through the open OPC, the system can be integrated with many building control systems for unified management. For example, the system can be set to turn off/on the elevator, insulation, ventilation, air conditioning, lighting, etc. when an employee leaves/enters, so as to save energy and facilitate management.
9. Global linkage can be performed without the PC
When some specific events occur (alarm, card swipe or to a specific time, etc.), pre-set programs can be executed (starting sound and light alarms, opening/closing doors, turning on/off lighting, air conditioners and other equipment, etc.). These executed programs can be linkages within the same controller, or linkages with other controllers in the system. And the system can be extended to perform global linkage without any computer support, even in offline situations.
10. The controller supports dual bus transmission expansion function
(A) Communication backup: When the security level of the area controlled by the system is very high, the user will require the system to monitor the line in real time and display all information in real time. Therefore, some manufacturers have proposed a dual-bus solution, that is: connecting the system through two buses device of. If the first bus (TCP/IP or RS485) is interrupted or the connection fails, the communication will be automatically transferred to the second bus, so that the communication of the system can be guaranteed.
(B) Uploading of alarm events: The conventional access control system uses polling to communicate with the controller, and a large amount of data will be uploaded to the PC at the same time, which will block the communication information and may cause delays in time. In the dual bus system, the first bus interface is used for the normal round-robin mode and handles general event information (such as data such as card swiping information). The second bus is specially used to deal with the information transmission of alarms and special events, and will actively upload the information to the PC at the moment when the alarm is generated. No matter how many controllers and alarm points there are in the network, the transmission is completed in an instant, which can truly achieve real-time alarm.