SUBSCRIBE TO NEWS
Subscription by Email - news

Discard subscription
117

The access control system and the principle of its work

2015
24
Dec.
Admin
viewsViews: 538         commentsComments:

control System and access control (ACS) is used to control in automatic mode exit and entrance for visitors and employees at the enterprise, exit and entry of vehicles into its territory. Installation of this system will ensure the highest level of security in your company. You will also get accurate information to keep your employees work schedule, you will be able to set access modes to acetylate and monitor working hours (including mixed and individual work schedules), to restrict access by time of day, by red, by day of week, etc. based on the data of the monitoring system and access control it is possible to calculate the salary. The most famous ACS domestic production is the Sheriff made the ITC-PROMIX . By the way, in Ukraine it can be ordered on the website: .

the

the Principle of operation of CSAC?

All visitors to the company and its employees receive electronic key (ID), often is a trinket or a plastic card with an individual code that it contains. An electronic key is issued immediately after the registration of the aforementioned persons by means of the system. Information and photo of the owner of the electronic key to make a personalised e-card". Next, the code of the electronic key and a personal electronic card associated with each other and contribute in a special database on the PC.

In the room you want to monitor install the readers, which, in turn, reads the code from the card, as well as information about access rights of its owner. Next readers pass the received information to the controller of the control system and access control.

The ACS put all codes according to the information on the rights of the owner of the electronic card. On the basis of a situation in which made a card and matching the above-mentioned information, the system makes the relevant decision: the controller locks or unlocks the doors (turnstiles, locks), an alarm is triggered, the object translates in the protection mode, etc.

All submission of electronic cards and follow-up actions (alarms, aisles, etc.) are recorded by the controller and stored on the computer. And information about all the events that occurred after the presentation of electronic cards, in the future it will be possible to use in order to receive a report on the violation of work discipline, working time, etc.

Author:
RATE PUBLICATION
0   (votes: 0)
Read more with:
Thinking about the choice of hours: Watches Casio G-Shock.
Thinking about the choice of hours: Watches Casio G-Shock.
The Japanese firm Casio has long been established itself as one of the...
2013
5
Sep
Yuriy Smetana
Views: 623 Comments: 0
What is cleaning the air conditioner
What is cleaning the air conditioner
Air Conditioning - is a special equipment which requires careful maintenance....
2015
5
March
Views: 744 Comments: 0
3D printer and how it works
3D printer and how it works
Designed machine for printing three-dimensional parts. 3D printers are able...
2013
24
Oct
Admin
Views: 1475 Comments: 0
 1   2    3    4    5    ...  7  

To add comment, please, authorize.
Authorize using Yandex Google Mail.ru Twitter