ACS is ... Access control and management system

The access control and management system (ACS) is an essential element of an integrated security system and an integral part of a modern office, such as an electronic document management system or an air conditioning system.

scud it
And this is fully justified, since it allows you to control incoming and outgoing people, which effectively protects the object from undesirable persons entering its territory. It allows you to distinguish between the passage of visitors and employees to the responsible premises of the enterprise.

It is often integrated into a common security system, and it interacts with video surveillance or burglar alarms. Also, an advanced ACS carries a system for recording working hours. This allows you to control the time of arrival of workers and their departure. What can not but increase discipline in the enterprise.

Key elements of an access control system

There are a great many manufacturers of ACS equipment. However, its main elements are unchanged: a control controller, an identifier reader, and personal identifiers themselves, a locking device and a matching device.

Personal identifier (card, various tokens, key rings)

scud system
It is issued to each employee and serves as a pass so that he can enter the territory of the enterprise. Each such card contains a unique code that is retrieved by contact with a reader. Then the personal code is analyzed by the ACS controller. And if it meets the admission criteria, an automatic signal arrives at the blocking device, the door opens, the barrier rises, the turnstile unlocks. The communication protocols for the personal identifier and reader may vary, and the design organization should take this into account. In Russia, the Mifare, Em-marine protocols are widely used.

Reader

Responsible for extracting information from the code carrier and transmitting it to the controller. The choice of the reader, in addition to the technical parameters, is also determined by the interior of the room where the installation will be carried out.

Controller

installation scud
The main element of ACS. This is the component, the performance and reliability of which will greatly affect the entire future operation of the system. If the task is to find a controller that will not work in conjunction with a computer, then you should pay attention to such characteristics:

  • The number of regulated events.
  • The presence of an internal clock.
  • The maximum number of users.
  • Support for programmable rules, etc.

Matching device

Serves to connect the controller (or several) to the server or office computer. Sometimes this device is embedded in the access controller.

Lock device

Locks, electromagnetic and electromechanical, turnstiles, barriers, locks, gates. The choice of device for locking is carried out based on the specific requirements and nature of the object.

The principle of operation of ACS

access control system
This system has different configurations. The simplest one - designed for one front door, serious ones - are able to control access to banks, factories and large enterprises. An ordinary intercom is an example of a simple ACS.

Access control is carried out according to this principle. At the entrance of the organization, at the entrance to enclosed spaces, an access control device is mounted on the office door: an electromagnetic lock, a turnstile or other, and a reader. These devices are connected to the controller. He receives and processes information obtained from personal identifiers, and controls the executive devices.

Each employee has a personal identifier, which is a contactless access card of any type. In order to get to the territory of the enterprise, the employee must bring his card to the reader, and he will transmit the code according to the chain described earlier. The controller can be programmed to access at certain time intervals (from 8.00 to 17.00) or to allow employees to enter designated rooms. You can also connect security sensors to it.

access control system scud
All events about movements through control points are recorded in the ACS memory. This will subsequently make it possible to use this data to analyze the use of working time by employees and receive reports on labor discipline. Such information will also help with official investigations.

Installation of access control systems will help to control the incoming vehicles. In this case, the driver should present his personal identifier at the entrance to open the barrier.

Types of ACS

Conventionally, they can be divided into autonomous systems and network.

Freestanding are great for small offices and small buildings. They are not connected to a computer, and control is carried out using master cards or jumpers on the controller itself. At large and medium-sized guarded facilities, this type of access control system is rarely used. The exception is control over remote rooms, or as a backup system. An autonomous access control system is installed on the central doors and / or on the emergency exits.

When implementing such a system, doors with a throughput of about a thousand people are equipped with a combination lock or reader, maybe a turnstile or a barrier. In a modest office with a single door, everything can be limited to an autonomous controller connected to an electromechanical (electromagnetic) lock and combined with a reader

Network Access Control Systems ACSs incorporate one or several computers as control elements. It is the PC that monitors what is happening at the facility and controls their parameters. Such a construction is much more flexible and functional. It is network ACSs that are especially popular at facilities of any complexity. And integration with security and video systems allows comprehensive protection at no additional cost.

The connection of several computers at large facilities is due to the fact that one of them may fail. This ensures continuous operation.

The ACS network system with a database allows you to display detailed statistics for a specific identifier and its movement at the protected object. You can see what access rights each employee has.

scud equipment
Key features of access control systems are access control and management

The main function. It allows you to split access rights for employees and deny undesirable people access. It is possible to organize remote control of devices for locking. You can prevent employees from entering the company on weekends and holidays, as well as after a shift.

Collection and delivery of statistics

Information collection is controlled and monitored by the access system constantly. Who went through what point and how many times. For each employee you can get information: time of arrival / departure, attempts to access restricted areas and premises, attempts to enter during the prohibited time. It is possible to track how an employee moves around the territory when the readers pass ACS. All disciplinary violations identified can be recorded in the employee’s personal file, and the offender’s management will be informed properly.

Access staff only with electronic passes

skud readers
An employee, passing through a checkpoint, identifies himself with a card, and information about the employee and a photograph can also be displayed on the security monitor screen. This will eliminate the possibility of penetration by someone else's identifier. In the ACS reaction rules, it is possible to block re-entry through the checkpoint to the enterprise with one access card for a short period of time.

Time tracking

ACS allows you to keep track of working time, based on the marks of the arrival and departure of people from their workplace. As a result, it is possible to calculate the employee’s total working time taking into account “breaks”, lunches, etc. And at the beginning of the working day, she can generate a report on employees who did not pass the control point at the indicated time, which will help to identify late or not coming to work. By analogy, you can create a report at the end of a work shift.

System autonomy

Equipped with uninterruptible power supply, ACS will not stop its work at a centralized power outage. In addition, thanks to the functionality of the controller, it can continue to work when the control computer stops.

Real time security

The access control system for access control provides access to rent and place certain rooms under protection. And you can receive real-time information about emergency situations through an organized warning system through responsible persons. As well as disturbing events are recorded in the database, which will allow you to view this information later.

installation scud

The security officer, thanks to access control systems, can, without leaving the workplace, manage turnstiles and doors, give alarms. It is enough to place floor plans of the building and the layout of control points in his computer.

Management via the Internet or from a mobile phone

When connecting the ACS to the worldwide network, the administration can remotely control the system and monitor its operation.

Integration with other systems

Fire, burglar alarms, video surveillance perfectly integrate with ACS. Integration with video surveillance provides visual control over the protected area. And it allows as soon as possible to identify, if possible, identify and block the offender.

Combination with a burglar alarm allows you to configure a joint response to unauthorized entry. So you can make the siren work in the security room in the office, light an alarm lamp or simply lock the doors in the right part of the enterprise.

Integration with fire alarms is vital. This will automatically unlock all control points in case of fire. That will greatly simplify the evacuation of workers in a critical period.

A few words about design

When developing an ACS project, first of all, one should take into account the imposed restrictions on the number of card passes. The number of the latter must be calculated taking into account the growth of the company, otherwise you may find yourself in a situation where the number of employees reaches the maximum value for the system and you have to change it to a more capacious one. The best design solution is to install a modular system that can be upgraded or expanded. With a limited budget, it will be useful to take into account the possibility of integrating ACS with other systems responsible for security. The advantages of such a combination were described above. Clear tech. the task will help designers to create exactly the system that the customer needs. A clearly drafted project, in turn, will greatly facilitate the work of the installation organization. And it is better when one company is engaged in design and installation. She can also take service in the future.

Source: https://habr.com/ru/post/G25737/


All Articles