Bathroom renovation portal. Useful Tips

Internet access control and management system. Access control and management system - available about access

Access control and management systems are often found in complex structures or in institutions that require an increased security system. ACS is very convenient, as it controls and controls access automatically.

When choosing a system directly, it is necessary to rely on the degree of secrecy and importance of the building, its area, and also to understand what requirements are put forward for the device (control and management of access, of which type, should be carried out at the facility). There are both complex and standard (simple) automated systems.

Installation of ACS must be entrusted to professionals, since the scope of work requires not only mechanical installation, but also equipment programming. Plus, once a year or in case of a breakdown, you need to think about servicing the devices.

General concepts and requirements

An access control system is not only technical, software devices, but also organizational means due to which the attendance of the building is regulated.

Access control systems have certain requirements:

  1. Control over the movement of personnel / visitors and control of the entrance to the premises. I mean a card or a key with which the device could identify a person.
  2. Organization of enterprise (complex) security. The access control and management system, when installed together with video surveillance and fire alarms, jointly ensures the protection of the territory. This allows you to record unauthorized entry into the premises, damage to property, etc. In an emergency, this makes it possible to freely leave the premises.
  3. Organization of time keeping (registration) of working hours. The device analyzes the time of arrival / departure of employees to the facility or direct place of work.

General provisions for appointment

An access control system consists of many complex elements and parts that have specific requirements. Basically, ACS consists of a controller, identifiers, readers, as well as zones, levels and access points. Depending on the degree of quality and, accordingly, the quantity depends on the reliability of the security of the structure, control of personnel and the functionality of the system as a whole.

Elements of the access control system:

  1. Purpose of the controller. This is a device that allows or prohibits the passage of personnel / visitor when he presents a pass or enters a PIN-code. Alternatively, the equipment can block the path using auxiliary parts. Controllers (network) operate on the same network, and direct control and access control are defined under one (several) computers. The requirements for such computers are high power and the installation of special software.
  2. Assignment of identifiers. These are special identifying elements of the system. In other words, it is a card, electronic key, PIN-code, key fob or biometric data (retinal scanning, fingerprints, etc.). Moreover, each identifier is assigned different access requirements. Information about the personnel (employee) is preliminarily entered into the general database.
  3. The purpose of the reader is a device that reads information from the identifier and transmits it to the controller.
  4. An access point is an ACS object on which the controller and reader are located. In other words, checkpoint: checkpoint, door, barrier, turnstile, gate, etc.
  5. An access zone is also an object of an access control system, but divided into points. These points can be located throughout the structure. Zones and points work together. They calculate the working hours and, on occasion, prohibit re-entry.
  6. The access level is the requirements for access to a particular room on individual rights. That is, one and the same person can enter premises of different classifications or have permission to enter only one of the two.
  7. Software is the elements of the system that control and manage access.

Automated control system

Principle of operation

An automated access control system, depending on the installer's requirements, may have several operating principles, which directly affects the choice of installation of a particular system. The simplest devices have a standard set that controls and controls access, more complex ones include types of several modes. The functions of more complex systems include: prohibition of repeated passage, simultaneous entry into the premises of two or more employees, passage with confirmation, double identification, closed and open modes.

There are the following types of systems operation:

  1. Standard.
    Scheme of actions:
    • staff / visitor approaches the access point where the controller and readers are located;
    • enters / adds an identifier to the reader;
    • the controller considers (makes a decision) to admit or deny access to the employee, fixes the time and identity, transfers it to the computer and stores the information.
  2. No replay.
    The scheme is used so that the identifier cannot be used in another access zone if the employee has not left the previous one. There are several modes here: strict (complete ban), temporary (ban for some time) and soft (logging the fact of violation).
  3. Simultaneous passage of two or more employees to the object.
    The scheme applied to this type:
    • one of the employees brings / introduces an identifier to the controller;
    • the second employee brings / enters his identifier;
    • the controller is considering whether to open access or not;
    • if the controller, reading the information about the level of the level, discovers that one of the employees does not have permission, access is denied.
  4. Passage with confirmation.
    In this case, one of the employees confirms the entrance to the premises of the second. Access control with confirmation can be carried out by an identifier or a special button. This function is supported by the "C 2000-2" controller.
  5. Dual identification.
    For example, the first time the identifier is used with the card, and the second time with the password. A certain period of time can be set for entering the second identifier.
  6. Closed access mode.
    The device of the system can be brought into the phase of "deny passage to any room" for a fixed time or permanently for a specific employee or all personnel (RS-485 command).
  7. Open access mode. The function means that the passage through the point is open without presenting an identifier.

Definition of species

There are three types of access control systems: stand-alone, networked and wireless.

An autonomous device, like a network device, provides a passage to an object (possibly several), but the area of ​​such a structure is often small. The requirements for systems of this type are that the controller should be autonomous, that is, not connected to others and not controlled by a computer. But at the same time, the device must have its own minimum database.

In this case, the access point has a latch or electronic lock, and the card is often the identifier. The scheme of operation of the device has minimum requirements: at the entrance a card, at the exit - a motion sensor or a special button. This is defined as a standard type of operation with open and closed mode functions. An autonomous access control and management system, in comparison with a network analogue, is lower in cost. Also, the automated system does not require laying a large number of cables.

The requirements of the device do not include reporting on working hours, transmission of any information, and the device is not controlled remotely. It is recommended to purchase control and management of autonomous access with a reader that is remote from the controller and has a backup power supply.

Autonomous systems diagram

Networked access control systems are mainly installed at large industrial facilities and other structures where there are a large number of employees. In such cases, turnstiles or gateways are often used, as control and management of access is required to a greater degree. Remote identifiers are often used, which read information from a distance.

The requirements for networked systems are much greater than those for stand-alone systems. Often such a device has a wireless connection or a large number of cables, several computers, etc. Control and management of access to premises is carried out using the dual identification or confirmation mode. The network device records the time and location of personnel, can be remotely controlled and transmit various information.

Such complex systems have several types of work:

  • simultaneous passage of two or more employees;
  • entrance to the premises with confirmation;
  • double identification;
  • re-entry ban;
  • simultaneous entry into the premises of two or more employees;
  • passage with confirmation;
  • double identification;
  • closed and open modes.

Diagram for networked systems

Wireless system

At the moment, only SALTO is represented in Russia. It supplies wireless access control systems. The advantages of this type of equipment are obvious: no wires during installation. Installation is convenient for companies that do not want or cannot lead wires to equipment, for example, a hotel complex with expensive finishing of the premises. The disadvantages include the possible loss of a channel during data transmission, but the manufacturer claims that the wireless network operates on a separate 128-bit key not licensed IEEE 802.15.04, 2.4 Ghz channel, which guarantees system stability.

The SALTO WIRELESS wireless access control system allows you to control the premises in real time. The set of equipment consists of 4 components: electronic locks, gateways, repeaters and the SALTO software platform. All electronics are located in electronic locks. They are compatible with most of the world's lock standards. Therefore, it is enough to simply remove the handles and install new locks, which automatically become not only the ACS, but also an access point for the Internet (the latest innovation).

Control and monitoring systems have many specifications. The choice of system depends not only on the type of work, but also on the principle (autonomous or networked). Requirements for such devices are put forward depending on the number of personnel, the area of ​​the structure, as well as the importance of the facility. The main criteria for choosing equipment are autonomous or networked provision. The scheme of work, which are significantly different. Autonomous access control systems are cheaper and easier to install, while network access is more expensive. But the network device also has more capabilities: it compiles reports, stores a large amount of information and is controlled by a computer. For complete security, ACS is installed with video surveillance and fire alarm systems.

ACS - access control and management system

In the modern world, the world of computer technology, the access control system is far from the last place. Access control management is a complex of a large number of various electronic and mechanical elements, the work of which is aimed at protecting premises and territories. With their help, the problems of access control and control over visits to certain internal premises and open areas are solved, as well as the tasks of effective control over the time spent by personnel in the building and are mounted at such objects as: offices, business centers, warehouses, closed defense enterprises, secret facilities. state-protected, police stations, hospitals, laboratories, government and commercial banks, airports, train stations, school and preschool institutions.

In crowded and large facilities, multi-site, multi-stage access control systems are installed, which include many components to improve efficiency and safety. Installation of ACS on such sites is considered difficult. Therefore, "complex" ACS require a very high-quality and accurate installation. This suggests a reasonable conclusion that the installation of "large" and "complex" ACS should be entrusted only to qualified specialists. You need to know that improper installation of one of the many such nodes will lead to failures and shorten the life of the entire system.

The main functions and tasks of the access control system:

  • Access control of official vehicles to the territory;
  • Operational information from the database for a specific visitor or staff member;

ACS allows you to control access to various zones and premises on the territory of enterprises and offices. There are two types of ACS:

Autonomous access control system

At small facilities with a small number of access gateways, an autonomous access control system is usually used, for example, consider the equipment at such a facility:

turnstiles Is a multifunctional barrier device that is controlled by a proximity card reader. If required, the turnstile can be equipped with a card collector to collect temporary passes of visitors.

Access to the premises is limited by doors equipped with an electromagnetic or electromechanical lock and a proximity card or electronic key reader.

To restrict the passage of vehicles into the territory, it is used barrier, remotely controlled using a remote control.

This system is distinguished by its simplicity of design, high operational reliability, low cost of equipment, installation and operation.

Network Access Control System

In a networked access control system, all devices are connected to the main computer, which makes it possible to expand the functionality of the system: to delimit access rights to various rooms and zones of the facility, integration with other security systems, for example, with a video surveillance system, photoreflection, accounting of the working time of enterprise employees. As a rule, network access control systems are installed in industrial enterprises, large office centers. Consider, for example, equipment at such an object:

The main computer on which the software is installed according to the needs of the customer: access control and management, time tracking, creation of various reports, control of passages and the total number of cars in the parking lot.

At the entrance (checkpoint) set turnstiles Is a multifunctional barrier device that is operated by an operator (human) and / or a proximity card reader. If required, it can be equipped with a card collector to collect temporary passes of visitors. Access to the premises is limited by means of doors equipped with an electromagnetic or electromechanical castle and reader contactless cards or electronic keys.


Full-height turnstile at the checkpoint of the Federal Migration Service

Is it possible to provide automatic filtering of visitors in an enterprise, office or business center? The answer is simple - access control system (ACS) without any problems will provide the possibility of operational control over the movement of employees in your organization. This is fixing the time of passage and the presence of personnel on the territory of the facility, restricting access to certain rooms. After the installation of the remote access control system, all employees of the company are issued with so-called passes - electronic plastic cards. Readers are mounted at the entrance door to the controlled area, recognizes the identifier code from the plastic card and, based on the owner's data, the system decides whether to admit or deny the passage of an employee to the protected area. If the code matches, then the system gives the unlock command and the person can go through. After that, the door, with the help of a closer, is automatically closed and locked with a lock. To exit the controlled room, a door opening button is mounted on the inside of it. For two-way controlled passage, readers are installed on both sides. The access control system uses electromagnetic or electromechanical locks, barriers, turnstiles and automatic doors. To pass through the turnstile, the card is also brought to the reader, after which the code from it is sent to the controller. Each controller ACS, can be programmed as you like. An example of certain conditions of admission is very convenient in cases of passage of specific employees at a certain interval of working hours. For those who still think whether he needs electrical installation remote access control and management systems and doubts the effectiveness of the use of such equipment, we propose to once again weigh the pros and cons.

  • Organization of accounting of the working time of your employees;
  • Access control of official vehicles to the territory of the facility;
  • Operational information from the database for a specific visitor or employee;
  • Control over the access of people to office premises;
  • Organization and accounting of the time of guests and staff on the site;
  • Control of personnel access to individual objects, buildings and premises.

"Against"

  • Dissatisfaction with the control and accounting of the working time of your employees.

To restrict the passage of vehicles into the territory, it is used remotely controlled barrier as part of a system for restricting entry to a protected area by vehicles. These systems are built on the basis of a barrier (one or more, depending on the number of passing car flows. Modern barriers allow them to be supplemented with various additional equipment, depending on the assigned tasks. Barrier can be closed or opened with a remote key fob, with a "touch memory" key or with an "e-marin" type card. With the option of using cards, it is possible to organize the counting of vehicles entering and leaving. It is also possible to interface the barrier with the license plate recognition system (of the "Autoinspector-plus" type). In this case, the system will read the state. the number of the vehicle that has arrived and its comparison with its own database. The command to open the barrier will be given only if the state. car numbers in the system database. To prevent accidental lowering of the boom when the car is in the gate, modern barriers are equipped with photo barriers - the system will not give a command to lower the boom if there is any obstacle in the gate. A wide range of compatible equipment allows you to assemble a system suitable for use at various facilities - from a garage complex to a secure enterprise.

The conclusion suggests itself - thanks to the access control equipment, it became possible to significantly strengthen discipline at enterprises, to control the entry and exit of visitors, the entry of vehicles into the territory and to automatically control the accounting of employees' working time!

We provide assistance in the examination of projects (non-state examination of project documentation), approval of the redevelopment of residential and non-residential buildings and structures in the city of Moscow (shopping centers, warehouses, administrative and office buildings, apartments).

Security systems (SOS)
We turn to the equipment of access control systems and burglar alarms, the installation of which is carried out by our company. Exit buttons, standalone and networked ACS, magnetic card readers, readers with keyboards, metal detectors, motion sensors, reed switches, keyboards, uninterruptible power supplies:
Controller of two-wire communication line Mounting S2000-KDL 4
S2000-KDL
PNSoft-Max Basic Network Software with Access Controller Support
Magnetic contact detector S2000-SMK
S2000-SMK
Rostov-Don KP1 card collector
REVERSE C16 (system controller)
Addressable volumetric optical-electronic detector S2000-IK
PNSoft-VV Real Time Video Verification Module
Addressable surface optical-electronic detector S2000-SHIK
Isolating branch block Installation of the "Breeze" block
Installation of RIP-24 with rechargeable batteries
ST-EX010 exit button
Wiring accessories, installation of cable and minichannel 22 / 1x10 DKS
Corrugated PVC pipe diameter: up to 32 mm
Switching box
ST-EX130 exit button
35 kV cable in laid pipes, blocks and boxes
Cable KPSVV 1х2х0.5
PATROL-401PET infrared detector
Cable up to 35 kV with attachment with patch brackets
PATROL-901 infrared detector
Video control device video intercom DPV-4MT Commax
Devices installed on metal structures outdoor panel AVC-305 Activision
Removable and withdrawable units (modules, cells, TEC)
Power supply unit SKAT-1200D Bastion
Gate-Personnel expansion module
Battery 12V 7A / h Bastion
Electromagnetic lock ML-194.01 Topin
OMA-43.601, card collector
Installing a door closer to metal doors
Hydraulic lever door closer in aluminum casing
Device (button, control key) number of connected ends: up to 2
Exit button KS-04 Daxis
additional network Gate -Terminal AWP of the ACS operator
Code panel DKP-201 Elix
Cable ШВВП 2х0.75
ELTIS B-21
PW-500-EH-S, Card capture reader
Gate-Server-Terminal software
Connection of electrical wiring to devices under the screw: without making rings with maintenance

Autonomous and networked access control systems, contactless and combined controllers:
EM-Contr
Proxy-H1000
PW-301
NC-100K-IP
VEKTOR-100-SKS - built-in controller
Portal keyboard
Gate-8000 Auto
NC-5000
PERCo-CL201.1
ST-SC032EH
ST-SC130EK standalone controller, reader and keyboard
Gate-8000 UPS
SR-SC110
H-Kontr proxi-cards HID
PERCo-SC-820 access control controller
Gate-IC-Antipassback

Readers with keyboards; magnetic card readers:
PERCo-RM-3VR type ISO 2 (ABA)
PR-EH03 proximity cards
PR-P09 (Parsec)
PW-101-EH-G-W (Proxway)
PW-106-E-W (Proxway)
MiniProx
ProxPoint Plus
ProxPro Keypad
CP-Z-2L
Matrix-II-EH
Matrix-IV-EH Keys
PERCo-RP-15.2D
ST-FR032EK
ST-PR040EM
ST-PR160EK
Portal
SR-R111
RW400
R10 iCLASS SE

Metal detectors, turnstiles Rostov-Don, PERCo:
T9 M1 STEP2 (UT)
T273M1 STEP2 (UT)
PR1 / 3M
PR1L / 3M
P2M1 / 3
P2C / 3
TTR-04.1G
TTD-03.2S
KR05.4
KT02.3
AA-01
RTD-15.1R
PD-6500I
CS-5000
RS-3300
SmartScan A2SE
CORDON C2

Security detectors - infrared passive, addressable, outdoor, perimeter, acoustic, combined, optoelectronic, linear, radio wave, vibration, sound (glass breakage):
BX-80N
D&D
LC-171
Foton-10 (IO 409-12)
LX-802N
LC-151 (SLC-151)
STA-453 / M2
XD FIXED B
ID-12E
Piron-8 (IO 409-59)
SPEK-5-125 (IO 209-11 / 2)
AX-70TN
Foton-10B (IO 309-9)
AX-250PLUS
FMW-3/1
SWAN PGB
Barrier-100
Radium-2 (IO 207-4)
Prism-3 / 200HP
Forteza-50
Foton-16A (IO 209-27)
Agat-SP5U (IO 407-15)
Fon-3 / 1T (IO 407-14 / 3)
Zebra-60 (lens type-volumetric)
EDS-2000
Orbit-1 (IO 315-3 / 1)
PATROL-105PET
Foton-20 (IO 409-45)
VIBRO
PATROL-USR
KX15DT
SWAN 1000
MRX-300N
Piron-7
FG-1608
Owl-3 (IO 315-3)
Sokol-3 (IO 414-3)
Sonar-3 (Messenger)
Astra-621 (IO 415-2)
Berkut-Sh (IO 315-6)
Orlan (IO 315-1)
Ikar-1A (IO 409-20)
Foton-21 (IO 409-52)
BV-501 (Bravo-501)
PATROL-801PET
Foton-Sh (IO 309-7)
MR-CRT
Foton-6A (IO 209-8)
TLC-360
Piron-Sh
Colt vc
Piron-4D
Rapid
SRP PET4

general information

A complex of various systems, called ACS, must ensure the safety of protected objects. He also brings order to the access control of buildings. The abbreviation stands for "Access Control Systems". Such automated systems are often used along with security guards to improve the security of protected facilities. In particular, we are talking about those who must be under special control. The system has its own database and uses it to compare to determine whether the specified person has the right to be in the protected area.

Thanks to the development of equipment, the ACS can take on a number of other tasks.

The simplest example of their use, understandable to the majority, will be an ordinary intercom installed on the driveway. But it also includes turnstiles, armored doors, combination locks, biometric data scanners (fingerprints, face recognition). The possibilities provided by the ACS are wide, the tasks solved by them are varied. The abundance of the systems themselves is confusing to any potential buyer. And he needs to study these issues in order to finally understand which of the systems offered by the seller will really suit him. ESMART is the author of several advanced developments and represents its products in this market segment.

Unfortunately, very few modern products are being developed in Russia today. All electronics production is concentrated in China, as a result, our market receives a lot of cheap low-quality equipment that does not meet domestic safety requirements. That is why we recommend paying attention to domestic manufacturers. Having saved 100 rubles on an RFID card, the company jeopardizes the entire security system. After all, low-quality identifiers are easy to copy, and all access control measures become useless. We recommend buying truly secure access control systems with protected RFID cards (smart cards, RFID key fobs and bracelets) at the best prices from Russian manufacturers.

Access Control System Components

The work of any ACS is tied to the comparison of certain features inherent in an object or an individual. They are compared with the information contained about them in the system database. If the results match, a passage opens. In the absence of a combination, the person is informed that he does not have access to this object. The successful implementation of these functions can only be carried out if all the required parts are present in the system. There are three of them in the ACS:

Identifier- the main element of the ACS. This is the carrier of the identification code by which the system determines the access level of its owner. Usually comes in the form of a key fob, electronic tag or access card (RFID card). But passive identifiers have their drawbacks. The main quality of the identifier is ease of wearing and protection from being captured by strangers. You can lose your access token or access card or become a victim of theft. Therefore, the use of data that cannot be lost is considered a more reliable means of identification in ACS. This, for example, knowledge (numeric password) or biometric data of a particular person. These may include both the now common fingerprint and more advanced versions. This is, for example, comparing the shape of the face or the pattern of the retina of the eye. It is becoming popular to use mobile phones or tablets with an installed application as a key. Among ESMART products there are offers of similar systems - with identification by smartphone and. The type of identification directly affects the overall level of protection of the entire access control system.

Reader is called the other main organ of the system. This is the device that contacts the identifier. A contact consists in receiving data from it - an access key. The interaction takes place directly, physically (reading information from the access card when conducting a magnetic tape). Also, reading can be carried out at a distance (reading data from RFID access card). And depending on the nature of this information, the reader can be different in design. To access the object with the help of a tablet, only two contacts are sufficient, closed by it. For an identifier in the form of a fingerprint, a special reader is required, with the ability to disassemble this pattern and transfer it further.

Also, for the effective operation of the reader, the conditions of its location are important, and with them the stability characteristics. So, for example, in a building, the impact of any external factors on its work is minimal. But installing the device on the street can negatively affect the stability of the performance of its duties. This requires protection from bad weather, implemented in the ECMART readers, waterproof and working outdoors at temperatures from -40 ° C to + 85 ° C.

If an ACS or Auto ACS is installed entirely on the street, the Russian conditions should be taken into account. To prevent equipment freezing in extreme conditions, ESMART equips access control systems with heating. Having bought an ACS or Auto ACS from ESMART, the customer will always go to the object. And even the coldest night will not block the exit from the house or residential complex, if the parking lot is purchased at the best price and domestic equipment from the manufacturer ESMART® is installed.

In addition, there are many more dangerous threats. For example, mechanical damage or the actions of intruders. Physical impact can be caused accidentally while using the device. And there may be deliberate attempts to disable it. The latter can have different purposes. Ordinary bullies might just break it down to have fun. Professional cybercriminals believe that breaking a reader, intercepting an identifier by air, cloning or hacking a card will allow them to enter a protected facility. But this is far from the case.

Any identifiers of the standard are additionally supported ISO14443A \ MIFARE in the mode of reading the UID or reading data from the memory of the card.

Retail price - 9,000 rubles.

Installation of ACS at the facility helps to increase the level of security and automatically solve security tasks:

  • Providing general security;
  • Management and restriction of access for employees and visitors in accordance with the internal rules of the enterprise;
  • Control over the movement of employees and visitors;
  • Accounting for the time spent by personnel and visitors in a certain area;
  • Automatic accounting of working hours and keeping a time sheet;
  • Prevention of unauthorized entry;
  • Increasing the level of security by integrating ACS with video surveillance, burglar and fire alarms.

Varieties of ACS

According to the principle of operation, modern access control systems are divided into two types:

  • Autonomous;
  • Network.

Regardless of the type of control, both ACS consist of the same components: controllers that allow or restrict access, identifiers on doors or turnstiles, locks, door closers and other devices. A similar principle of operation is to determine access rights and allow or deny passage to the bearer of the identification key. The difference lies in the set of functions that ACS can offer. The final cost is made up of the functionality.

To identify the visitor's identity, both ACS use contactless cards (EM-Marine, Mifare and other options), key fobs, RFID tags, biometric parameters and combination locks. The access control system can control not only the entrance door at the enterprise, but also control the barrier, entrance gates. This function is used to organize parking. Network and autonomous access control systems can be integrated with other security systems (video surveillance, burglar and fire alarms).

Network access control systems are very popular among users for their extended set of functions. For their installation, a wired method is used using the RS-485 bus, which connects the controllers, or Ethernet. The use of a wire limits the scale of the control system, its length cannot exceed 1200 m. When expanding and increasing the access control system, additional costs may arise. Ethernet networks are a modern and technologically advanced method of data transmission.

Classification of control systems and access control

ACS have a number of characteristics that determine the level of reliability. The price of an access control system depends on the functionality, degree of protection and scale.

What is important to know before choosing an ACS?

According to the principle of operation of the system, there are:

  • autonomous;
  • network.

A set of basic technical characteristics takes into account:

  • identification level;
  • number of control zones;
  • bandwidth;
  • estimated number of users;
  • terms of Use.

The degree of protection is determined by the access level:

  • single-level systems - only one sign is used for identification (for example, a contactless card with access rights);
  • multi-level systems - take into account a set of signs for allowing access (for example, reading a contactless card and entering a code).

The scale of the ACS determines the number of controlled access points - zones that are under the control of the system:

  • low capacity - less than 16 access points;
  • average capacity - from 16 to 64 control points;
  • large capacity - more than 64 monitored zones.

According to the operating conditions, the following are distinguished:

  • Outdoor ACS - when choosing equipment, the conditions of the local climate, temperature range, precipitation, exposure to sunlight, dust and other parameters are taken into account;
  • Indoors - operated at a positive temperature and low humidity;
  • Special operating conditions - imply the need for explosion protection, vandal protection and other conditions.

System capabilities are determined by a set of functions:

  • low-functional - they have a basic set of functions, a low level of secrecy, weak analytics of the data received, they differentiate access rights and provide access to the system logs;
  • medium-functional - they demonstrate an average level of secrecy, have built-in protection against hacking, an automated process for processing the received data, can be quickly reprogrammed if necessary, use a role-based access policy;
  • highly functional - fully automated systems have a high level of secrecy and security of the received data, the system is controlled through an intuitive graphical interface, the equipment can be quickly reconfigured with a change in configuration.

Integration level

  • at the hardware level - devices are connected to each other in a network, but controlled separately;
  • at the software level - security systems interact with each other using special software.

Classes of ACS

According to the degree of protection, ACS are subdivided into 4 classes, which take into account functionality and methods of application. The classes are described in the standard R 78.35.005-99 "Selection and use of access control and management systems":

  1. Insufficient degree of protection class 1

    Class 1 includes low-capacity autonomous access control systems with a single-level degree of protection. They allow:

    • allow or restrict access to the bearer of the identifier, depending on the set program of actions;
    • install light and sound alerts;
    • automatically or manually close the barriers (locks).

    Class 1 ACS are optimal for facilities where it is necessary to restrict access to unauthorized persons, but data collection is not required (time tracking, visit statistics, and others).

  2. Medium protection class 2

    Installed ACS can operate in a network or stand-alone mode. Systems have single or multi-tier architecture, low to medium capacity. Medium-protected access control systems allow:

    • restrict access to protected areas according to a given regime;
    • automatically register events that have occurred in the system, transmit alarm notifications to the security post in case of unauthorized access, burglary, and identifier mismatch;
    • automatically manage limiters (locks);

    The medium level of protection is intended for enterprises where it is important to control the time spent by employees and visitors in a certain area. Class 2 ACS can keep track of time and statistics.

  3. High protection class 3

    These include medium-capacity network access control systems that use a single-tier or multi-tier architecture. The systems include all the capabilities of the second class ACS and additionally provide:

    • control of the movement of employees and visitors around the facility;
    • automatically register events occurring in each zone and keep time logs, statistics;
    • diagnose the system for malfunctions;
    • integration with other security systems.

    ACS with a high degree of protection is installed at facilities where it is necessary to keep statistics on each employee, to control his movement in different zones. The ACS administrator has great opportunities to set the access mode by days of the week or by time interval, promptly exclude the pass from the system and others.

  4. Very high protection class 4

    Includes multi-level network access control systems of medium and large capacity. In addition to the capabilities of the third class ACS, systems with very high protection have advanced functionality:

    • integrated with other security systems at the software level;
    • automatically unblock escape routes in the event of an emergency, for example, during a fire.

    Class 4 ACS are relevant for facilities with increased security requirements. The systems are installed in banks or military institutions. Full automation of processes and integration of all systems allows you to maximize the level of safety.

The main components of the ACS system

Readers are an important element of the access control system. They are installed in front of the entrance to the protected object and interact with the identifier.

Reader is an electronic device that receives information from the identifier and transmits it to the controller for processing, after which a signal is sent to authorize and deny access.

Identifier - a personal device (key) that contains information about the owner and his access rights to various areas of the protected object. There are several types of identifiers: plastic card, key fob, tags and other types.

The most common options for identifiers are:

  • Perforated card - information on the card is applied once during the manufacturing process in the form of holes punched in a special way, belongs to a low security class;
  • Barcode card - information is applied to the card once in the form of a generated barcode, the security level is slightly higher than that of a punched card;
  • Magnetic card - has a higher level of security, information can be rewritten several times;
  • Wiegand card - a high level of security of the identifier indicates that the key cannot be counterfeited, the information is entered on the card once during the manufacturing process;
  • Proximity card is the most popular type of identifier due to its affordable price and high level of security, the card can be scanned by a reader at a distance of up to 90 cm (RFID technology).

Types of readers

  • Contact readers - to scan information from an identifier, you need to attach a key to the panel, for example, a magnetic card, Touch Memory key fob, or dial a code on the keyboard, are common on systems with the first and second protection levels;
  • Proximity readers - scan information from an identifier at a certain distance, for example, Proximity cards, can be combined with systems of any class;
  • Biometric readers - the user is identified by a physiological parameter, for example, by a fingerprint, retina, used in systems of the third class of protection;
  • Combined or multi-format readers - use multi-level identification based on several criteria, for example, reading a proximity card Proximity and scanning a fingerprint, are used in third-class systems.

Due to their versatility and ease of use, contactless readers working with Proximity cards are widely used. They can be installed on ACS with any protection class.

Controllers with a built-in reader stand out as a separate category. Systems can operate autonomously or over a network. The version, which is simple in execution and use, is slightly less reliable and is designed for class 1-3 ACS.

Installation of ACS in Moscow and the region by Mistercom specialists

Work on the installation of access control systems is built in several stages:

  • Project development;
  • Selection of the optimal set of equipment individually for each object;
  • Selection of software with the desired set of functions;
  • Turnkey installation of ACS;
  • System performance testing.

Installation of ACS includes:

  • Preparation and laying of cables, installation of fasteners and cable channels, connection to power supply;
  • Installation of access control devices;
  • Installation of controllers, monitor, server or control computer, blocking elements;
  • Connection of additional elements: sensors, power supply, wiring and other components;
  • Test run of the system;
  • Diagnostics and identification of possible errors in the ACS operation;
  • Final commissioning.

After carrying out a set of works on the installation of ACS, the customer receives a system completely ready for operation.

Installation time depends on the scale and complexity of the project. Small capacity systems (up to 5 control points) are installed and launched by Mistercom engineers within 1 working day. Large projects from 20 control points are assembled in a few weeks. Additional time for commissioning may be required when integrating ACS with other security and video surveillance systems.

The access control system has long ceased to be exotic, having firmly established itself as the most complex and dynamic solution, has become the object of professional jealousy of the security service and IT departments and is now going through a period of mature comprehension of its optimal use.

The division of requirements for access control systems for different objects is very conditional, as advice to motorists about the features of driving around the city and on the highway: in any case, it is desirable to be able to drive a car. The system should at least work. A non-working (read - unreliable) system will not "work" at any facility, no matter how undemanding it may be, that is, it was undemanding.

Ensuring security is one of the main tasks of any organization where people are located (offices, educational institutions, warehouses, etc.). Today, there are institutions with an extensive infrastructure, which operate on the territory of many premises or buildings located at a distance from each other up to location in different cities. Such enterprises are characterized by the organization of security based on distributed access control systems.

The evolutionary development of access controllers is due to the constantly increasing requirements for the access control system (ACS) as a whole

There are no "trifles" in security, but no matter how much they say about it, the details of security systems often create many vulnerabilities, which is clearly visible in access control and management systems, where much needs to be done quite differently

When installing a network access control system, there are a number of common installation errors, which result in unplanned work to eliminate them and delay in starting the facility. The tips below are an attempt to systematize the most typical miscalculations of installers associated with this and therefore can be useful to both beginners and experienced professionals.

Access control systems (ACS) for many have become a familiar attribute of everyday life. Sometimes we do not even think about how this system works, what can be expected from it, except for the trivial opening of the door, and what may be the reason for this or that functionality of a particular system. Let's hope that for those who are just thinking about installing a system or upgrading a once installed long ago, the article will be at least a little useful.

Consider the most difficult issue of organizing an access control system - access control for road transport. Almost all access control systems are able to control people's access to objects very efficiently. This path has been traveled long ago both by trial and error and by the method of accurate calculation and prediction of behavior. Almost any access control system is capable of organizing control of people with a wide variety of customer requirements and solving a huge list of tasks

I know the horror of how many shortcomings there are in my designs, and the only consolation for me is that most competitors are doing even worse. I will not specify which of the problems described below may appear in our system, which… uh… have limitations, and which we do not even know how to solve. I'll just talk about the difficulties that sometimes arise completely unexpectedly at the slightest deviation from the simplest functionality in the simplest system.