Stairs.  Entry group.  Materials.  Doors.  Locks.  Design

Stairs. Entry group. Materials. Doors. Locks. Design

» Access control control is poor. Access control and management system - what is it? Features of skidding systems for organizing traffic in parking lots

Access control control is poor. Access control and management system - what is it? Features of skidding systems for organizing traffic in parking lots

Access control and management system (ACS) is required element integrated system security and an integral part of modern office, like an air conditioning system.

And this is completely justified, since it allows you to control people entering and leaving, which effectively protects the facility from unwanted persons entering its territory. Allows you to delimit the passage of visitors and employees into critical premises of the enterprise.

It is often integrated into an overall security system and interacts with video surveillance or burglar alarms. Also, an advanced access control system includes a system for recording working hours. This allows you to control the time of arrival and departure of workers. Which cannot but increase discipline at the enterprise.

Basic elements of an access control system

There are a great many manufacturers producing access control equipment. However, its main elements remain unchanged: the control controller, the identifier reader and the personal identifiers themselves, the blocking device and the matching device.

Personal identifier (card, various tokens, key rings)

Issued to each employee and serves as a pass so that he can enter the territory of the enterprise. Each such card contains a unique code that is retrieved upon contact with a reader. Then the personal code is analyzed by the ACS controller. And if he meets the admission criteria, an automatic signal is sent to the blocking device, the door opens, the barrier rises, and the turnstile unlocks. Communication protocols between the personal ID and the reader may differ, and the design organization must take this into account. In Russia, Mifare and Em-marine protocols are widely used.

Reader

Responsible for retrieving information from the code carrier and transmitting it to the controller. The choice of reader, in addition to technical parameters, is also determined by the interior of the room where the installation will take place.

Controller

The main element of the access control system. This is the component whose performance and reliability will greatly affect the entire further operation of the system. If the task is to find a controller that will not work in conjunction with a computer, then you should pay attention to the following characteristics:

  • Number of regulated events.
  • Presence of an internal clock.
  • Maximum number of users.
  • Support for programmable rules, etc.

Matching device

Used to connect a controller (or several) to a server or office computer. Sometimes this device is built into the access controller.

Locking device

Locks, electromagnetic and electromechanical, turnstiles, barriers, gateways, gates. The choice of blocking device is based on the specific requirements and nature of the object.

Operating principle of ACS

This system has different configurations. The simplest - designed for one front door, serious - capable of controlling access to banks, factories and large enterprises. An ordinary intercom is an example of a simple access control system.

Access control is carried out according to this principle. At the entrance of the organization, at the entrance to enclosed spaces, at office door an access control device is installed: an electromagnetic lock, turnstile, etc. and a reader. These devices are connected to the controller. It receives and processes information received from personal identifiers and controls executive devices.

Each employee has a personal identifier, which serves as access or another type. In order to enter the territory of the enterprise, the employee must present his card to the reader, and he will transmit the code through the chain described earlier. The controller can be programmed to allow access during certain time periods (from 8.00 to 17.00) or to allow employees to enter designated areas. You can also connect security sensors to it.

All events about movements through control points are recorded in the memory of the access control system. This will further make it possible to use this data to analyze the use of working time by employees and obtain reports on labor discipline. Such information will also help during official investigations.

Installing an access control system will help control incoming vehicles. In this case, the driver must present his personal ID upon entry in order to open the barrier.

Types of access control systems

Conventionally, they can be divided into autonomous and networked systems.

Freestanding ones are great for small offices and small buildings. They are not connected to the computer, and control is carried out using master cards or jumpers on the controller itself. At large and medium-sized protected facilities, the installation of access control systems of this type is rarely used. The exception is control over remote premises, or as a backup system. Installed autonomous system ACS on central doors and/or at emergency exits.

When implementing such a system, doors with a capacity of about a thousand people are equipped with either a reader, maybe a turnstile or a barrier. In a modest office with a single door, everything can be limited to an autonomous controller connected to an electromechanical (electromagnetic) lock and combined with a reader

Network access control systems ACS include one or more computers as control elements. It is the PC that monitors what is happening at the facility and controls its parameters. This structure is much more flexible and functional. It is network access control systems that are especially popular at facilities of any level of complexity. And integration with a security and video system allows for comprehensive protection without additional costs.

Connecting several computers at large sites is due to the fact that one of them may fail. This ensures continuity of work.

A network access control system with a database allows you to display detailed statistics on a specific identifier and its movement in a protected facility. You can see what access rights each employee has.

The main capabilities of ACS are access control and management

Main function. It allows you to divide the access rights of employees and deny access to unwanted persons. Possible organization remote control blocking devices. You can prohibit employees from entering the enterprise on weekends and holidays, as well as after their work shift.

Collection and distribution of statistics

The access control and management system collects information constantly. Who passed through which point and how many times. For each employee, you can obtain information: time of arrival/departure, attempts to access restricted areas and premises, attempts to enter during prohibited hours. You can track how an employee moves around the territory when passing through ACS readers. All identified disciplinary violations can be recorded and the management of the violator will be properly informed.

Access for employees only with electronic passes

An employee, passing through a checkpoint, identifies himself with a card, and information about the employee and a photograph can also be displayed on the screen of the security monitor. This will eliminate the possibility of penetration using someone else's ID. In the ACS response rules, you can block re-entry through a checkpoint to an enterprise using one access card for a short period of time.

Time tracking

ACS allows you to keep track of working hours based on people's arrival and departure from their workplace. As a result, you can calculate the total work time employee, taking into account “smoke breaks”, lunches, etc. And at the beginning of the working day, it can generate a report on employees who did not pass the checkpoint at the specified time, which will identify those who were late or did not show up for work. By analogy, you can create a report at the end of a work shift.

System autonomy

Equipped with uninterruptible power supply, the access control system will not stop operating during a centralized power outage. In addition, thanks to the functionality of the controller, it can continue to operate even when the control computer is stopped.

Real-time security

Provides the ability to rent and arm certain premises. And you can receive real-time information about emergency situations through an organized process through responsible persons. Alarming events are also recorded in the database, which will allow you to view this information later.

A security officer, thanks to access control systems, can operate turnstiles and doors and give alarms without leaving his workplace. It is enough to place floor plans of the building and diagrams of the location of control points into his computer.

Control via the Internet or mobile phone

When the access control system is connected to the worldwide network, the administration can remotely manage the system and monitor its operation.

Integration with other systems

Fire, burglar alarms, and video surveillance are perfectly integrated with access control systems. Integration with video surveillance provides visual control over the protected area. And it allows you to identify, if possible, identify and block the offender in the shortest possible time.

Combination with a security alarm allows you to set up a joint response to unauthorized entry. This way you can make the security siren sound in the office, light an alarm lamp, or simply block the doors in the desired part of the enterprise.

Fire alarm integration is vital. This will automatically unlock all control points in the event of a fire. This will significantly simplify the evacuation of workers during a critical period.

A few words about design

When developing an access control system project, first of all, you should take into account the restrictions imposed on the number of pass cards. The number of the latter must be calculated taking into account the growth of the company, otherwise you may find yourself in a situation where the number of employees reaches the maximum value for the system and you will have to change it to a more capacious one. The optimal design solution is to install a modular system that allows for modernization or expansion. If the budget is limited, it would be useful to take into account the possibility of integrating ACS with other systems responsible for security. The advantages of such a combination were described above. Clear tech. the task will help designers create exactly the system that the customer needs. A clearly drawn up project, in turn, will greatly facilitate the work of the installation organization. And it’s better when one company handles the design and installation. She can also take service in the future.

ACS (access control and management system) is a collection technical means aimed at controlling entry and exit to the premises in order to ensure security and regulate visits to a particular facility.

Using an identification system (card, key fob, fingerprints, universal code, etc.), the program individually calculates for each person their work schedule, time of arrival and departure, time spent on breaks and lunch.

The main objectives of control systems are:

  • imposing entry restrictions;
  • access to the premises for a certain circle of persons;
  • control of the working day;
  • security;
  • payroll calculation, when integrated with the accounting system.

Advantages of ACS

Safety. The system allows you to configure access time for each employee individually. An outsider who is not included in the list of admitted persons will not be able to enter the office premises.

Working time control. The access control system allows you to set and control the time an employee is present and absent from the workplace. In addition, the manager will be able to take into account all overtime hours, the amount of time spent on breaks and lunch, individually for each employee.

Economical. Despite the number of functions, the system does not require large amounts of electricity, has a long service life, and also helps save on additional security.

What types of access control systems are there?

Despite their rather narrow focus, ACS are divided into several types in terms of installation and use. Distinctive Features different types are their autonomous ability, operating principle and equipment.

As a rule, access control and management systems have the following components:

  • blocking device ( electromagnetic locks, doors, turnstiles);
  • identifier (card, key fob, fingerprint);
  • controller – a mechanism that determines the throughput capability of the identifier;
  • reader - a device that determines the identifier code and transmits it to the controller.

Software and any additional hardware may also be included in the system, depending on its type.

Traditionally, it is customary to distinguish three groups of systems:

Autonomous systems. Such devices are an alternative to door locks, usually in commercial premises. The codes of access cards that are allowed to enter are entered into the system. If the card matches the programmed code in the system, the lock is unlocked. These systems do not require connection to a computer and have a minimal set of functions.

Network. Such access control systems have more capabilities: they can set up access to the premises according to a schedule, control the work schedule and integrate with video cameras, security and fire protection systems. Network systems are connected to a computer and controlled remotely.

Biometric systems. These access control and management systems have an individual focus: a unique code for each employee. Fingerprints or an iris pattern are entered into the program. This approach provides a higher level of security and provides more full information for each employee of each department. Using a biometric system, it is possible to keep a log of visits and control the time spent by an employee on breaks and business trips.

Which access control system is better to install in the office?

Such control systems are installed, as a rule, in banks, offices, private homes, administrative institutions, places of passage of cars, public spaces. In areas with high traffic, preference is given to simplified systems, or ACS is not used at all.

When talking about office space, it is worth considering the scale of the company. For large organizations employee access control is an important factor in helping to maintain discipline and maintain accountability for each employee. For such companies, the best solution would be biometric systems, where everyone has their own unique “code”, which determines their ability to enter the office and fixes their work schedule.
Autonomous systems are more suitable for a business center as a whole, where security must also be maintained.

Summing up

ACS is a mechanism for tracking entry and exit to premises and recording work schedules using identifiers. The main components of the system: blocking device, identifier, reader and controller. Depending on the components and range of functions, systems are divided into three groups: autonomous, network and biometric. The latter are the most convenient solution for offices, as they provide more complete reporting and also have a high level of security. That is why many managers install a similar control system in their office.

Currently, the Russian market has enough big choice access control and management systems, both foreign and Russian made. At the annual “Security Technologies” forum, there are usually several dozen Western brands alone. Quantity Russian manufacturers has now exceeded one hundred. In such conditions optimal choice specific ACS model is very problematic.

What basic parameters should be used to evaluate access control systems from different manufacturers? For this purpose, it is most appropriate to use such a characteristic as the cost of a specific manufacturer’s system to implement standard or identical functions.

Why do we need ACS systems?

The abbreviation ACS (Access Control and Management System) actually hides a device (or a set of devices) that operates on the principle of a smart lock on your door, at the entrance to an office building or to a warehouse, in general, “on site.” An access control system is needed if you are faced with the need to solve the following problems or a combination of them:

  • Recording of entries and exits of personnel and/or visitors
  • Monitoring the time spent on site (for example, recording working hours)
  • Access control within an object depending on the powers of the subject

Access control and management system functions

Access control:

  • For each facility, it is determined for each employee which premises he has the right to enter, as well as whether he has the right to arm and disarm the premises;
  • By status. Access cards are issued to employees depending on the rights assigned to them;
  • By time, each employee is given an individual access schedule to the facility; the access control and management system supports multi-shift work modes, sliding schedules and a holiday calendar.

Working time tracking:

  • Time of arrival and departure of each employee;
  • Time of presence at the workplace;
  • Being late;
  • Premature departures.

Security system mode:

  • In the event of emergency situations, the ability to arm the premises. The access control and management system will issue an alarm; all events related to the alarm are recorded by the system.

Enhanced access control (multi-level identification system):

  • Video identification mode (the image of the person presenting the card is compared with the reference image of the cardholder stored in the access control and management system);
  • “Forced entry” mode - hidden issue alarm signal, invisible to others;
  • Organization of access provided “card + set of Pin code”;
  • Access with two cards - only two people can enter by meeting together;
  • Access with additional selective security control (timed or random).

Re-entry prohibition:

  • The access control and management system supports the Antipassback function - or the prohibition of repeated passage - this is a functionality of the system that excludes the passage of two employees using one card, or passage without using a card.

Issuing a visitor pass:

  • To enter the protected facility, the visitor receives a temporary access card. When leaving the facility, the visitor returns the card, and it can be used for re-issuance;
  • To ensure that the guest card is not accidentally taken away by the visitor, it is recommended to use a card reader in the ACS system. Until the guest card is inserted into the card reader, the exit will be blocked;
  • All information is stored in an offline database, from where you can get a report on visitors.

ACS is a set of software and hardware tools and organizational and methodological measures with the help of which the problem of monitoring and managing visits to individual premises and territories is solved, as well as operational control of the movement of personnel and the time they spend on the territory of the facility.

In fact, ACS, being a hardware and software complex of technical security means, becomes an important structural component of the personnel movement control system. The block diagram of a simple access control system is shown in Fig. 1.

Fig.1 Block diagram of ACS

In general, an access control system may include the following elements:

  • actuators (locks, turnstiles, gateways);
  • electronic identifiers (plastic cards, “electronic tablets” and other devices);
  • readers (plastic cards and other electronic identifiers);
  • personal code (PIN) input devices;
  • biometric personal identification devices;
  • control devices for actuators (controllers, concentrators);
  • equipment for interfacing the local ACS network with a computer;
  • system administrator software.

The basis of any system is concentrator blocks with connected identification key readers, security sensors and electromechanical locking devices (locks, barriers, turnstiles).

Controller– This is the main part of the access control system. It is the controller who decides whether or not to let a person through a given door. ACS actuator controllers are complex electronic devices that can be implemented as separate units or built into the body of the corresponding actuator. The controller stores identifier codes in its memory with a list of access rights for each.

In addition to exchanging information with ACS concentrators via communication lines, the following is carried out: analysis of information received from electronic identifier reading devices, PIN code input devices and biometric identifiers, issuing, on the basis of this analysis, control signals for unlocking (locking) actuators; monitoring the status of actuators (open or closed); storage of a movement log in non-volatile RAM; registration of unauthorized access attempts. It is important that the controller can operate even in the event of a power failure and has a backup power source.

According to the control method, ACS controllers are divided into three classes: autonomous, centralized (networked) and combined:

  • Autonomous controllers. A completely complete device, designed to serve, as a rule, one access point without transmitting information to the central console and without operator control. There are a wide variety of variations: controllers combined with a reader, controllers built into an electromagnetic lock, and so on. Standalone controllers are designed to accommodate a wide variety of reader types. As a rule, stand-alone controllers are designed to be serviced without large quantity users, usually up to five hundred.
    Autonomous systems are cheaper, easier to operate (often installing and configuring such a system is accessible even to a not very trained person), and in terms of efficiency they are sometimes no worse than network ones. But they cannot create reports and transmit information on events, and they cannot be controlled remotely. At the same time, autonomous systems do not require laying hundreds of meters of cable, interface devices with a computer, or the computer itself.
  • Network controllers. A term denoting the ability of controllers to operate on a network under computer control. In this case, the decision-making functions fall on a personal computer with specialized software installed. Network controllers are used to create access control systems of any complexity. At the same time, the administration receives a huge number of additional opportunities. In addition to simply allowing or denying passage, you usually have the following options:
    • receiving a report on the presence or absence of employees at work;
    • you have the opportunity to almost instantly find out exactly where the employee is;
    • you have the opportunity to keep an automatic time sheet;
    • you have the opportunity to get a report on who went where for almost any period of time;
    • you can create a time schedule for the passage of employees, i.e. who can go where and at what time;
    • you get the opportunity to maintain an employee database (electronic file cabinet), in which you enter all the necessary information about employees, including their photographs;
    • the operator can quickly control system devices - remotely lock the locks or open them (for example, in case of fire)
    • and many many others. That is, there is always the opportunity to fulfill the most exotic wishes of the owner of the access control system.
    In such a system, all controllers are connected to each other via a computer. Network systems are used to manage multiple access points (checkpoints, office rooms, premises with a high level of security, outdoor facilities). The unit cost of one access point in a network system is always higher than in an autonomous one. However, networked systems are indispensable for large facilities, since managing dozens of doors on which autonomous systems are installed becomes a very big problem.
  • Combined controllers. Combines the functions of networked and standalone controllers. If there is a connection with the control computer (on line), the controllers operate as a network device; if there is no connection, they operate as autonomous devices.

Computer control in these systems for the operator has priority over his own. The modular construction principle allows you to design and expand the access control system depending on current needs. It is possible to select exactly those system functions that are needed today and add certain options as needed. The versatility of the ACS involves ensuring the operation of a network of ACS actuators using universal interfaces. Important for ensuring the universality of the access control system is the ability to ensure its interaction with fire-fighting systems burglar alarm, security television, perimeter security, life support of the facility, differentiation of access to information resources at the logical and hardware-software levels, use of a single electronic identifier throughout the entire protected object and a single database of the facility security administrator, as well as output of alarm information in a unified form to the administrator’s computer in real time (integrated systems).

ACS architecture

Network controllers, as their name suggests, are networked. And this, oddly enough, can be done in different ways! Moreover, the method of integration is influenced both by the design principle of the controllers themselves and by the system software. Let's look at this in a little more detail...

Network rank

Networks can be peer-to-peer (single-level) and multi-peer (multi-level), where the number of levels rarely exceeds two. A peer-to-peer network has a single bus (if it is extended by repeaters or splitters, this does not count). In a peer-to-peer network, all its nodes (in our case, access controllers) have equal rights. Among the popular representatives of this family are Northern Computers, Kantech, Parsec and most other systems, including those made in Russia.

Disadvantages of peer-to-peer networking: g>

  • The need to have a complete database in each controller (list of users, their rights, and so on). Given the modern cost of semiconductor memory, this, admittedly, is practically irrelevant.
  • The impossibility of implementing some global functions that require the interconnected operation of several controllers (for example, global “anti-passback” - prohibition of repeated passage). This drawback occurs only in networks where the computer is the master, that is, information exchange occurs only on its initiative. Strictly speaking, taking into account the computer, such a network is already multi-rank. Most modern access control systems have exactly this architecture. If the controller network operates on the principle of random access, there is no disadvantage.

Advantages:

  • Maximum “survivability” of the network, since each controller has everything necessary for autonomous operation when the computer is turned off (“frozen”) or the network is damaged. For security systems this is a significant factor.

Multi-rank controller networks.

In a two-rank network there is a leading, or “master” controller, which coordinates the work of “slave” controllers that actually control one or more access points. The most famous representative in Russia is the Apollo system.

Disadvantages of a multi-peer network:

  • Disruption of system operation when the connection between the master controller and slave controllers is damaged, since a significant part of the information and algorithms are the prerogative of the master controller.
  • Increase in cost of small systems due to the high cost of the master controller (due to its obvious redundancy).

Advantages:

  • Centralized memory for databases, which is of little importance today (see above).
  • Implementation of all functions even when the computer is turned off.
  • Gain in the cost of one access point for medium and large system sizes.

Controllers with Ethernet bus

An increasing number of ACS manufacturers are advertising controllers that can directly connect to a computer network (usually an Ethernet network). Is it good?

Firstly, such controllers are usually more expensive than controllers with the RS-485 interface standard for systems. Secondly, you will need a significant increase in the number of network (computer) equipment - hub, switch, and so on, which will further increase the cost of the system.

But controllers with such an interface have, in rare cases, obvious advantage: if it is impossible to lay an RS-485 network between remote areas of your facility, but there is a computer network (for example, between remote checkpoints and the main building), then such a checkpoint can be included in the access control system without an additional computer.

An Ethernet-based controller network is redundant in both cost and performance. Judge for yourself: why do you need a transmission speed of 10, and even more so 100 megabits where, at best, once a second an event occurs, the description of which takes a couple of tens of bytes? But... if the controller's database is several tens of thousands of people and it needs to be completely rebooted, then, of course, Ethernet is better...

ACS identifiers

Any access control system has some identifier (key), which serves to determine the rights of the person who owns it. The following can be used as electronic identifiers in ACS: barcode, magnetic or smart (smart cards) plastic cards; “electronic tablets” (Touch Memory); Wiegand cards, where the information carrier is the material from which they are made; remote reading cards (proximity) emitting a radio signal. In addition, a code typed on a keyboard, as well as a number of biometric characteristics of a person, can be used as an identifier.

An access card or ID key fob can be given to another person, stolen or copied, and the code can be spied on. More reliable from this point of view b imetric authentication devices. They provide identification of employees and visitors by comparing certain individual biological parameters of the person with the parameters stored in their memory and providing information about the identification result to the actuator controller. However, it is possible to easily fake some biometric features (fingerprints are the most easily reproducible), so in organizations that require a high level of security, several identifiers are used simultaneously - for example, a card and a code, a fingerprint and a card or code. Today, cards with a high level of security are issued (powerful cryptography schemes are used), where the encryption keys can be assigned by the user himself.


(from the English touch memory is sometimes found in English contact memory or English iButton) - a class of electronic devices that have a single-wire protocol for exchanging information with them (1-Wire), and are placed in a standard metal case (usually shaped like a “tablet”). The code information is written into the memory of this circuit. The device is activated at the moment of contact with the reader. Read and write operations are performed almost instantly during contact. Reading time – 0.1 sec. Some models allow you to enter user information. The advantages are compactness, high resistance to mechanical damage, corrosion, temperature changes and low cost (comparable to the cost of cards with a magnetic stripe). The small size allows you to attach the contact memory to almost any medium - product, card, key fob.

.

A barcode card is a plate with black stripes (stroke) printed on it. The code information is contained in the varying width of the strokes and the distance between them. The code from such a card is read by an optical reader. On a magnetic card, code information is recorded on a magnetic stripe. The bar code can simply be stained with dirt. A magnetic card can be easily scratched in your pocket.

Perforated card is a plate (plastic or metal). Code information is applied to a perforated card in the form of holes arranged in a certain order. The code from the cards is read by mechanical or optical readers.

Code information on Wiegand card contained on thin metal wires arranged in a certain way, glued special glue. Information from the card is read by an electromagnetic reader.

Proximity technologies have a lot of advantages - much greater reliability and durability compared to other identification methods, lack of a power source (in passive cards). The proximity reader constantly sends a radio signal. When a card enters the reader’s coverage area, it receives its radiation and in response sends a signal containing a code written on the chip. The distance between the reader and the card depends on the power of the reader and varies from 5 cm to several meters. The absence of mechanical contact during operation allows you to make identifiers of any shape (even in the form of a nail), the identifier can be implanted into an identification object. The advantages are the difficulty of counterfeiting and the possibility of using cryptographic algorithms (encryption).

In the literature, another name for this technology is sometimes used - radio frequency identification and registration of objects (RFID systems). They also identify an object by a unique digital code, emitted by an electronic transponder tag attached to an object. Both active (powered by a built-in battery) and passive transponders are used. Transponders are available with different types of memory organization. These are RO (Read Only) transponders, containing a unique code recorded at the factory, and R/W (Read Write) transponders, into which the code is entered by the user, multi-page transponders with a user memory of up to 1 kB, as well as transponders whose memory is protected “ floating" code. Systems differ in the carrier frequency of the signals used, the type of modulation, radio communication protocol, and the amount of information returned by the transponder.

Currently, there are three main frequency ranges in which RFID systems operate:

  1. Low frequency range (up to 150 kHz). The disadvantages of low-frequency RFID systems are the low radio transmission speed and the complexity of manufacturing highly inductive transponder antennas. Low speed exchange does not allow the reader (reader) to distinguish between several transponders simultaneously located in the field of its antenna.
  2. Mid-frequency range (13.56 MHz). The system's exchange range is about 50 cm and allows you to identify up to 30 transponders simultaneously located in the reader's antenna field per second.
  3. High frequency range (850–950 MHz and 2.4–5 GHz). Used to identify objects moving at speeds of up to 200 km/h at fairly large distances (10–15 m). Long ranges of high-frequency RFID systems are achieved through the use of highly directional reader antennas and high powers of the request signal. The cost of such systems is significantly higher.

A smart card (“smart card”) is a plastic card that has a built-in microcontroller with all its attributes (processor, RAM, non-volatile memory with a file system, input/output facilities, additional coprocessors). The main advantages of smart cards are a large amount of memory and high security of information from attempts to modify and duplicate. The disadvantage is the high cost. Is standard equipment corresponding automated systems can be quite simply implemented into almost any arbitrary system.

PIN code. The carrier of code information is human memory. The user autonomously types a code on the keyboard and thereby gives a signal to the actuator.

Biometric identification systems are the most effective, since they recognize not physical media, but the signs or characteristics of the person himself (unique personal information). Access and information security systems based on such technologies are not only the most reliable, but also the most user-friendly today. All biometric devices have specific software and hardware requirements. In any authentication system, users must first be registered. Many biometric systems allow users to do this themselves.

Human fingerprints (papillary patterns) are of particular interest as a source of information for personal identification due to unique individual characteristics. The percentage of denied access to authorized users is less than 0.000001.

Currently, there are several practically used systems that have a reaction time of 1–3 s and are based on approximately the same approaches to recognition, but differ in a number of parameters. There are two fundamental algorithms for fingerprint recognition: by individual details (characteristic points) and by the relief of the entire surface of the finger, as well as a combination of these algorithms. Fingerprint access control systems use algorithmic solutions to distinguish a “living” finger from a “dead” one, such as determining the temperature of the applied finger, tracking over time the dynamics of sweating on the surface of the skin of the finger and the nature of the deformation of the pattern of papillary lines on the scanner window. Fingerprint readers cause some discomfort in people, although modern fingerprint readers do not store the fingerprints themselves, but only some of them. mathematical model, from which the fingerprint cannot be restored.

Facial thermography– identification of a person based on the arrangement of the blood vessels of the face (similarly, recognition occurs based on the pattern of veins on the arm). In terms of reliability and time required for the entire identification procedure, this method is comparable to fingerprinting. Facial thermography is based on research showing that the veins and arteries of each person's face create a unique temperature map. A specially designed infrared camera allows you to scan information for fixed areas of the face. The result of the scan - a thermogram - is a unique characteristic of a person. The system allows identification even when a person is at the other end of an unlit room. The accuracy of the thermogram is not affected by any heat body, nor cooling of facial skin in frosty weather, nor natural aging of the human body. The system provides recognition accuracy close to 100%, regardless of the use of special masks or even plastic surgery, since a thermogram is a diagram of the location of internal blood vessels.

There are four other facial recognition methods:

  • analyzing grayscale images for distinctive facial characteristics;
  • analysis of distinctive features (the method is adapted to changes in facial expressions);
  • analysis based on neural networks, based on comparison of “special points”, capable of identifying faces in difficult conditions;
  • automatic processing of facial images is based on identifying distances and distance ratios between easily identified features of a person’s face.

A system of automatic identification and tracking of persons through television cameras is built on these four principles. The system's capabilities allow you to record images of faces based on the best angle found during the capture process. Based on the received video signal, special algorithms are used to process the image to identify faces. A photo library of faces is compiled and stored in the archive. You can search the database of faces by time and date.

Technology identification of a person by hand shape is based on the analysis of a three-dimensional image of the hand. This method is not highly reliable, which is due, first of all, to the great variability of the shape of the hand both during a person’s life and in a relatively short time. A less significant drawback is comparatively big sizes receiving device (the minimum dimension in the plane cannot be smaller size brushes, and is more than 20 cm in height). Some dignity this method is a small volume of mathematical “portrait” of the hand (only 9 kB).

More often identification by voice characteristics used in security systems to control access to information. Usually done by saying a passphrase. Voice identification – convenient way, but not as reliable as other biometric methods.

The main difficulty in identifying a person by voice is the wide variety of manifestations of one person’s voice - it can change depending on mood, health, age and much more. Another serious problem in the practical application of personal identification by voice is taking into account the noise component.

The person's signature. Identification of a person by his signature is a reliable method of biometric personal identification, but recognition procedures still look cumbersome and clearly inconvenient to use. Mostly signature identification devices use special pens, pressure-sensitive tables, or a combination of both. So far it has not come to their serious use, and they are very rarely used.

Iris and retina. In terms of the reliability of the identification procedure, this method is comparable to fingerprinting. The scanning device is essentially a high-quality television camera. A pattern of iris spots is found on the surface of the eye. A video image of the eye can be scanned from a distance of about a meter. Such devices are still very expensive. The retinal scan uses a low-intensity infrared beam directed through the pupil to the blood vessels in the eye. back wall eyes. In this case, the image of the iris must be clear at the back of the eye, so cataracts may adversely affect the quality of the iris image. With age, the location of spots on the iris can change, and quite dramatically. Negative identification error can occur with even the slightest injury to the eye, due to insomnia or increased eye strain.

Fragments of genetic code. None of the personal characteristics of a person listed above can compare in reliability of recognition with papillary finger patterns. Their only “competitor” is the human genetic code. However, practical identification methods based on the use of unique individual characteristics fragments of genetic code are currently rarely used due to their complexity, high cost and the inability to ensure system operation in real time.

Biometric readers are still very expensive, although various scanners cost around Lately decreased significantly. In addition, they have a relatively long identification time (for a large flow of people this may be unacceptable). All biometric readers are not designed for outdoor use.

The indicator of correct identification of various systems determines the reliability coefficient. The reliability coefficient shows the probability of errors and can be of the first and second types.

Error of the first type ( FRR-False Rejection Rate) is the rate of erroneous refusals to a client with access rights. Error of the second type ( FAR-False Acceptance Rate) is the probability of mistakenly identifying someone else as one’s own. In some systems it is possible to adjust the sensitivity threshold. This allows you to configure them in accordance with security requirements. But an increase in the sensitivity of the system is accompanied by an increase in identification time and an increase in the likelihood of a false refusal.

A reader is a device designed to read special code information stored in an identifier and transmit it in the form of a predetermined signal to the controller. Readers can be manual, stationary and stationary automatic, connected to the system.

Depending on the operating principles of the identifier, the technology for reading the code also changes.

The reader must be separated from the controller so that the circuits through which the lock can be opened are inaccessible from the outside. It is preferable to use the reader in a vandal-proof version. The most vandal-resistant are contactless card readers.

Passage point. Some obstacle (barrier) equipped with a reader and an actuator. The access point can be fully controlled and monitored at the entrance. In the first case, the passage is equipped with two readers - at the entrance and at the exit. In the second case - only with a reader at the entrance, exit is carried out freely or using the RTE button.

RTE button. The "RTE" (Request To Exit) button is used to force the crossing of the passage point, i.e., in other words, to open the actuator. In this case, the fact of opening is recorded in the controller’s memory, but who exactly passed through is unknown. Such buttons are installed to ensure unhindered exit from the premises.

ACS actuators

Locks. If the task of the access control system is to limit the passage through regular doors, then the actuator will be an electrically controlled lock or latch. Here you can use remote-type readers with a long reading distance.

Electric strikes inexpensive, easy to install on almost all doors. They are recommended to be used where the likelihood of break-in is minimal (doors inside the office). Doors equipped with an electric latch are usually locked with a mechanical key at night. Electric strikes can be voltage-opened (that is, the door will open when power is applied to the lock) or voltage-closed. The latter open as soon as the supply voltage is removed from them. All doors used for escape in the event of fire must be equipped with voltage locking devices.

Electric locks are divided into electromechanical and electromagnetic.


There are many different types. This is a fairly burglar-resistant lock. In electromechanical locks, in addition to the electrical circuit, there are mechanics similar to the mechanics of a conventional lock. This type of lock can be opened in three ways: with keys, with a mechanical button located on the lock body, or with an electrical signal. These locks can be overhead or mortise. Some disadvantage is the presence of rubbing parts. Most locks have a mechanical reset, which means that if an opening pulse is applied to the lock, the door will remain open until it is opened and closed again.


They are a powerful electromagnet. They are relatively inexpensive and easy to install. To close the lock, voltage is constantly supplied to it; opening is done by turning off the power (the locks are suitable for installation on escape routes in case of fire). The disadvantage is that the lock requires constant power to keep it closed. It is recommended to use a door closer in combination with such locks.

Turnstiles There are two main types of execution: waist and full-length. The operating principle of all turnstiles is approximately the same. The user presents the identifier to the reader, and if the identifier is valid, the turnstile is unlocked. The turnstile allows only one person to pass through with one card. Bar rotation sensors allow you to record passages through the turnstile and ensure correct recording of working hours in the access control system. Belt turnstiles should be installed only in an area of ​​constant surveillance by the security service, since such devices are easy to jump over, you can crawl under them or throw any objects over the turnstile. Turnstiles can be equipped with alarms that are triggered when attempts are made to bypass or jump over. For this, IR barriers, weight-sensitive sensors, etc. are used.

– the most popular and widespread type of turnstile, the most affordable compact device. The design is based on three rotating barrier bars; only one person can be between the bars at a time. There are two main types of tripods: mounted and stationary. The majority of models are electromechanical. Once passage is permitted, the drive is unlocked and the user must manually rotate the booms to the locked position. There are models of turnstiles in which the bar is rotated by a built-in motor. Today, turnstiles with “breakable” bars are produced for possible quick evacuation in case of an emergency.


They can be half-length or full-length. They provide a greater degree of security than a tripod and a gate, but also require more space for installation. The principle of operation is simple - three or four rotating blades are attached to the column, you need to push the barrier bars in the permitted direction, then the electric drive is turned on, and after a person passes, the turnstile automatically rotates to closed position. To ensure free movement in any direction, a free passage regime is established.

When installing rotary turnstiles, a problem arises related to the passage of oversized cargo through these turnstiles. Therefore, when installing rotor turnstiles, additional passages should be provided. Such passages are also required by the rules fire safety. The turnstiles can be retrofitted with a metal detector, a weighing panel, an internal additional means of identification, and a reinforced blocker.


Subway turnstiles have the largest capacity, but they are very bulky. Models are produced with different types of sashes, different body designs, and different technologies for opening the sashes. Such structures can be either normally open or normally closed. The photocell system allows you to track the direction of the user’s passage and open (close) the doors depending on the situation.

Usually this is a partitioning bar (for example, in the form of a door), which must be pushed when passing. There are different types of gates - from a mechanical one, locked with a key or simply working only as an exit, to a gate with an electric motor, capable of opening at a given angle and closing independently after a delay time or after the photocell is triggered. When using them, it is easy to create the “normally open” mode. A motorized gate opens automatically either from the security guard's console or from a visitor identification device. But it also has a low level of protection for the protected object.

When equipping passageways with turnstiles various types It often turns out that the passage area is not completely blocked and there is a need to install additional barriers. Nowadays modular fencing is offered, made in the same design with turnstiles of various models and easily integrated with them. The fence posts have a shock-resistant and wear-resistant coating. It is possible to attach readers of all types to fences.

One of the main characteristics of access control and management systems is the throughput of turnstiles. It depends on three time parameters: the time the person presents the identification device; the time of reading the code and processing the request by the program of the access control and management system, the time of operation of the actuator. Bandwidth approximately 15–20 people per minute for three-bar turnstiles, 11–16 for rotary turnstiles.

They are classified as blocking type blocking devices. Used in enterprises with enhanced security requirements. In gateway mode, the turnstile can be stopped in an intermediate position, blocking the user's movement in order to request additional identification confirmation. Some companies produce models with an integrated weighing platform, which allows for control of one pass at a time. In this case, the ACS can compare the current weight of the user who presented the card and entered the controlled segment with information from the database.

The entire range of models of airlock cabins can be divided into automatic and semi-automatic airlocks. In automatic gateways, doors are opened and closed using various electromechanical actuators controlled by gateway logic. Semi-automatic gateways use conventional swing doors, opened manually and closed with closers.

They manufacture cabins with revolving doors that combine the features of full-height turnstiles and automatic gateways.

Gates and barriers are most often used at entrances to enterprises and in car parks. For this purpose, ACS includes special vehicle identifiers, readers for installation under the road surface, and remote readers. The main requirement is resistance to climatic conditions and the ability to control from the ACS controller.

Classification of ACS by consumers

Small system consumers. Traditional consumers of small systems are small offices, enterprises retail and so on. Today, a new consumer has emerged among them - educational institutions, which are characterized by the use of access control systems in two main modes. Firstly, this is personal identification. This mode requires the installation of two readers for registration - at the entrance and at the exit. When a visitor presents a card, a photograph and brief information about the card holder appear on the monitor of the security post. Identification of the individual and delimitation of the passage is carried out by the duty officer of the security post. This mode is usually used in educational institutions with small flows of people.

Secondly, control and restriction of passage. In this mode, one or two tripod-type turnstiles are installed at the entrance. Typically, inexpensive turnstiles from domestic companies or “budget” models are used. foreign manufacturers. Passage through the turnstiles in both directions is possible upon presentation of a legitimate card. This mode is usually used in educational institutions with high traffic volumes. As a rule, in this case, CCTV cameras are installed above the turnstiles. In both modes, Prox cards are used for access, which are supplied to all employees and students educational institution. At such facilities, ACS is most often used without integration with other security systems and the main control is carried out at one (main) entrance. If integration is carried out, then, as a rule, with television surveillance systems.

Other features common to small systems are:

  • installation of access control equipment on the doors of all premises in the service area;
  • installation of dual technology readers on the doors separating the client area from the service area to increase the level of security.

Consumers of mid-level systems. One of the trends characteristic of traditional consumers of medium-sized access control systems (office buildings of large companies, business centers, wholesale trade enterprises, supermarkets, etc.) is the close integration of access control systems with a security alarm system (OS). The functioning of the access control system and the OS is closely interconnected, and at some facilities equipment for this purpose is installed from one manufacturer with full hardware compatibility. OS detectors in rooms equipped with access control means are connected in this case as follows:

  • to the ACS controllers themselves, equipped with resistive inputs;
  • to additional OS inputs on ACS interface modules;
  • to the inputs of security alarm panels connected to a single central ACS and OS controller.

At the same time, it is quite common to use access control systems and operating systems from different manufacturers with integration at the software level, which makes it possible to connect equipment already installed at the site to a single control center. This solution is more flexible, but less reliable in terms of stability of subsystem communication. For the user, the integration of ACS and OS means the ability to arm and disarm premises by presenting the user's Prox cards on dedicated arming and disarming readers installed on the floors, or using dedicated Prox cards on access control readers to the premises.

This scheme is especially convenient for business centers: the tenant independently arms/disarms their premises, while the duty officer at the central post controls this process in real time, and the access control database records who armed the premises and when armed or disarmed. Another trend in the consumer market for mid-level systems is the mandatory connection with fire alarm and building control systems at least at the level of dry contacts to unblock escape routes in emergency situations. To prevent the deliberate use of fire alarm system signals for the purpose of uncontrolled entry into the building, the unlocking of doors on evacuation routes of fire zones is controlled by the security service.

The next trend is the use of the capabilities of the access control subsystem to organize control of the reverse movement of employees' vehicles in parking lots.

And finally, the widespread use of ACS capabilities to control the movement of vehicles in underground parking lots. A request to enter or exit from the underground parking floor is generated by placing the car on the induction loop and presenting the driver's Prox card on the reader. Depending on the priority set for a given user, a route for the vehicle to pass is organized using traffic lights and demarcation devices. As a rule, to control traffic in underground parking lots, long-range readers from HID or INDALA and equipment for regulating vehicle access - barriers, gate drives, etc. are used. To prevent a break into the building, a lift-type hydraulic blocker can be installed at the entrance. The use of Radio-Frequency Identification (RFID) technology for identifying vehicles when managing traffic in parking lots has not yet found wide application. This is explained by the customer’s reluctance to have two cards on hand (for himself and for the car) or to install additional equipment on the bottom of the car. However, interest in such systems is growing, as is the volume of their purchases, despite the high price.

Some manufacturers of RFID transport systems offer interesting solutions based on integration with classic Prox technologies from well-known global manufacturers. These are dual technology cards, as well as specialized devices that allow you to transfer the code of standard passive Prox cards to long distances(up to 15 m).

Consumers of top-level systems. In the market of traditional consumers of large access control systems (large corporations with branches in one or several cities, powerful manufacturing companies, airline and transport companies with a distributed network of ticket sales and passenger service offices, etc.), a number of trends can also be identified. One of them is the construction of integrated security systems based on access control systems, combining into a single complex subsystems that allow solving various problems in the field of technical security equipment. The central part of such integrated systems is the software core, which provides logical integration and control of all subsystems:

  • maintaining a unified log of events for all subsystems;
  • processing any events of all subsystems;
  • programming reactions to events through a scripting language;
  • setting complex algorithms for interaction of subsystems.

Another trend is the use of a distributed, customizable network architecture when building an integrated security system. The operation of the system does not depend on the location of objects; all objects interact at the kernel level. Changes to the configuration are made without stopping or restarting the system, that is, automatically at all objects via communication channels. In case of temporary communication failure, changes are made immediately after the communication channel is restored. Large consumers are also characterized by the use of dual technology readers and cards (Prox or Smart card plus fingerprint) in access control systems, increased requirements for operational and technical parameters actuating equipment for restricting passage and their appearance.

Characteristics of network controllers

Basic characteristics

Let us immediately make a reservation that for multi-rank networks all the arguments look somewhat different than those given below. But, given the small number of such access control systems, this will not be a significant omission.

We will include the basic quantitative characteristics, such as:

  • Number of supported access points
  • Event Buffer Volume

Number of access points

Many years of practice have suggested the optimal solution, expressed in the ratio: one network controller per two access points. Why is this so? Because then such common resources as a housing, a power supply with a battery are required in smaller quantities. Controllers with big amount serviced doors exist in nature, but in small quantities. Why?

Yes, because a 4...5 amp power supply with redundancy is already quite expensive.

The cost of communications between the controller and the doors begins to become significant. In addition, if the doors are located far from each other, then laying the lock's power wire becomes a problem - with current consumption of about an ampere on ordinary wires, up to half of the power may “disappear”, and the lock will stop working.

From a technical point of view, a single-door controller is ideal, since this ensures maximum system survivability and minimizes wiring. But, if we take into account the economic aspect, then two doors are optimal.

User database size

This characteristic is determined solely by the number of people who will walk through the most intense point of passage (the classic case is a factory entrance). When choosing a system, compare this characteristic of the system in question with your prospects for the next 5 years, and you will receive your requirements for this parameter.

With a controller serving more than one access point, it is naturally necessary to take into account the total traffic through all access points, taking into account the intersection of these sets.

Event Buffer Volume

This characteristic determines how long your network system can operate when the computer is turned off (frozen, burned out) without losing information about events. For example, for an office with about 20 employees, an event buffer volume of 1000 may be enough for up to a week. And for a factory entrance, through which 3,000 people pass, a buffer for 10,000 events is hardly enough for a day.

But is it really possible to talk about a serious corporate system in which the security system cannot “revive” the computer within 24 hours?

The most “advanced” controllers make it possible, when configuring the system, to redistribute the total amount of memory between the user and event databases.

// Send the request

You can send a request for additional information or a commercial offer.

ACS(access control and management system) is a critical component for ensuring the security of a large office building or modern enterprise. Only the installation of an access control system can provide maximum protection of an object from the penetration of persons who do not have any right to do so.

An access control and management system (ACS) is a set of hardware and software, the purpose of which is to provide the opportunity to pass or travel to a certain territory or certain premises only to those persons who have the appropriate permission.

Installation and installation of access control systems are designed to solve the following tasks:

  • Installation of an access control system (ACS) prevents unauthorized persons from entering the facility.
  • Recording of the number of persons passing through the checkpoint in one direction and the other.
  • Ensuring the possibility of limited access for employees, that is, the access control system prohibits the passage of some employees into certain premises, while allowing them to move freely to others.
  • Restricting the movement of employees around production premises on weekends and holidays, as well as at certain times of the day.
  • Compare the face of the person who used the pass with a photograph stored in the ACS data bank.
  • Installing an access control system provides control over the movement of enterprise employees, and thereby monitors their work activities.

If your business has reached the level where the issue of restricting access of outsiders to office and production premises requires a solution, then the most optimal would be buy and install ACS.

The advantages of installing ACS are obvious

  • Absence " human factor" Devices and software perform their job equally well at any time and under any circumstances.
  • Work 24 hours a day - ACS does not get tired, is not distracted and does not need a shift.
  • There is no need to maintain a large staff of watchmen - control of the activities of all access control systems in the building can be concentrated on the console of one operator, who is needed to make a decision in the event of an unusual situation.
  • Combining several useful functions in one software and hardware complex, such as: restricting access, recording the number of passages, video recording the moment of entering and exiting a building or premises, and much more.

The Videoglaz company, which has been installing and selling access control systems since 2002, offers all interested parties a modern, high-quality access control system thought out to the smallest detail. Our proposal is worth paying close attention to because:

  • We are ready to develop and make installation of access control systems of any complexity, with any additional functions, because the design of access control systems in our company is carried out by specialists with extensive experience who received higher specialized education at MSTU. N.E. Bauman.
  • Videoglaz LLC offers its clients the latest technologies in the field of installation of access control systems, since it is an official partner and dealer of leading manufacturers of security systems.
  • “Videoglaz” sells access control systems (ACS) of its own design and production at reasonable prices, and also has the opportunity to inexpensively sell access control systems from other manufacturers, because our company receives components, software and finished products at special prices.
  • The company "Videoglaz practices" comprehensive approach to the sale of access control systems. For us, selling ACS means developing an individual system that optimally meets all customer requirements, producing and installing all necessary devices, debugging and providing the best service within the country.

Proof of our competence in the field of creating access control systems are numerous certificates, letters of gratitude from clients and the presence of a stable client base. Many enterprises have appreciated the benefits of cooperation with our company, thanks to which the number of our regular customers is growing, and we will be glad if you become one of them - one of the managers who care best about control over their business.

We have been creating the security foundation for leading Russian companies for more than eight years. Take advantage of our developments - provide yourself reliable protection from uninvited guests. Order installation and installation of an access control system from the Videoglaz company.

Buy access control systems - access control systems: installation of access control systems, installation of access control systems, cost meager. Here you can choose and buy ACS.

ACS - access control and management system

IN modern world In the world of computer technology, the access control system occupies far from the last place. Access control management is a complex of a large number of various electronic and mechanical elements, the work of which is aimed at protecting premises and territories. With their help, problems of access control and control over visits to certain internal premises are solved and open areas, as well as the tasks of effective control over the time spent in the building of personnel and are installed at such facilities as: offices, business centers, warehouses, closed defense enterprises, secret facilities protected by the state, police stations, hospitals, laboratories, state and commercial banks, airports, train stations, schools and preschools.

In crowded and large facilities, multi-node, multi-stage access control systems are installed, which include many components in order to increase efficiency and security. ACS installation at such facilities is considered difficult. Therefore, “complex” access control systems require very high-quality and accurate installation. This suggests a reasonable conclusion: the installation of “large” and “complex” access control systems should be entrusted only to qualified specialists. Need to know that incorrect installation one of many such nodes will lead to failures and shorten the life of the entire system.

Main functions and tasks of the access control system:

  • Control of access of official vehicles to the territory;
  • Current information from the database for a specific visitor or staff member;

ACS allows you to control access to various areas and premises on the territory of enterprises and offices. There are two types of ACS:

Autonomous access control system

At small facilities with a small number of access gates, an autonomous access control system is usually used; for example, consider the equipment at such a facility:

turnstiles is a multifunctional blocking device that is controlled by a contactless card reader. If required, the turnstile can be equipped with a card reader to collect temporary visitor passes.

Access to the premises is limited by doors equipped with an electromagnetic or electromechanical lock and a contactless card or electronic key reader.

To restrict the passage of vehicles into the territory it is used barrier, remotely controlled using a radio key fob.

This system is characterized by simplicity of design, high operational reliability, low cost of equipment, installation and operation.

Network access control system

In a network access control system, all devices are connected to the main computer, which allows you to expand the functionality of the system: to differentiate access rights to different rooms and zones of the facility, integration with other security systems, for example, with a video surveillance system, photo verification, recording the working time of enterprise employees. As a rule, network access control systems are installed at industrial enterprises and large office centers. Consider, for example, the equipment at the following facility:

The main computer on which software is installed according to the customer’s needs: access control and management, time tracking, creation of various reports, control of passages and the total number of cars in the parking lot.

At the entrance (checkpoint) they install turnstiles is a multifunctional blocking device that is controlled by an operator (human) and/or a contactless card reader. If required, it can be equipped with a card reader for collecting temporary visitor passes. Access to the premises is limited by doors equipped with electromagnetic or electromechanical castle And reader contactless cards or electronic keys.


Full-height turnstile at the entrance of the Federal Migration Service

Is it possible to provide automatic filtering of visitors in an enterprise, office or business center? The answer is simple - access control and management system (ACS) will easily provide the ability to quickly monitor the movement of employees in your organization. This is recording the time of passage and presence of personnel on the territory of the facility, limiting access to certain premises. After installing a remote access control system, all company employees are issued so-called passes - electronic plastic cards. Reading devices are installed at the entrance door to the controlled premises, recognize the identifier code from the plastic card and, based on data about the owner, the system makes a decision on whether to allow or deny entry of a particular employee into the protected area. If the code matches, the system gives an unlock command and the person can pass through. After which the door, with the help of a closer, automatically closes and is locked with a lock. To exit the controlled room, a door opening button is mounted on the inside of it. For two-way controlled access, readers are installed on both sides. The access control system uses electromagnetic or electromechanical locks, barriers, turnstiles and automatic doors. To pass through the turnstile, the card is also brought to the reader, after which the code from it is sent to the controller. Each controller ACS, can be programmed at your discretion. The example of specific pass conditions is very convenient in cases where specific employees pass through a certain working time interval. For those who are still wondering whether they need electrical installation remote access monitoring and control systems and doubts the effectiveness of using such equipment, we suggest once again weighing the pros and cons.

  • Organizing time tracking for your employees;
  • Control of access of official vehicles to the territory of the facility;
  • Current information from the database for a specific visitor or employee;
  • Control over people's access to office premises;
  • Organizing and recording the time of guests and staff on site;
  • Control of personnel access to individual objects, buildings and premises.

"Against"

  • Dissatisfaction with monitoring and recording the working hours of your employees.

To restrict the passage of vehicles into the territory, d remote controlled barrier as part of a system for restricting entry into a protected area by vehicles. These systems are built on the basis of a barrier (one or several, depending on the number of passing traffic flows. Modern barriers allow them to be equipped with various additional equipment, depending on the assigned tasks. Barrier can be locked or unlocked using a remote key fob, a touch memory key or an e-marin card. When using cards, it is possible to organize a count of vehicles entering and leaving. It is also possible to pair the barrier with a state license plate recognition system (such as “Auto Inspector-Plus”). In this case, the system will read the state license. license plate numbers of the arriving car and comparing it with your own database. The command to open the barrier will only be given if it complies with the state regulations. car numbers in the system database. To prevent accidental lowering of the barrier arm while a car is in the gateway, modern barriers are equipped with photobarriers - the system will not give a command to lower the boom if there is any obstacle in the barrier area. Wide range compatible equipment allows you to assemble a system suitable for use at various facilities - from a garage complex to a sensitive enterprise.

The conclusion suggests itself - thanks to ACS equipment, it has become possible to significantly strengthen discipline at enterprises, control the entry and exit of visitors, the entry of vehicles into the territory, and automatically control the recording of employee working hours!

We provide assistance in the examination of projects (non-state examination project documentation), coordinating the redevelopment of residential and non-residential buildings and structures in the city of Moscow (shopping centers, warehouses, administrative and office buildings, apartments).

Security systems (SOS)
We move on to the equipment of access control and security alarm systems, the installation of which is carried out by our company. Exit buttons, standalone and networked ACS, magnetic card readers, keypad readers, metal detectors, motion sensors, reed switches, keyboards, uninterruptible power supply devices:
Two-wire communication line controller Installation S2000-KDL 4
S2000-KDL
PNSoft-Max Basic network software with support for access controllers
Magnetic contact detector S2000-SMK
S2000-SMK
Rostov-Don KP1 card reader
REVERSE C16 (system controller)
Addressable volumetric optical-electronic detector S2000-IK
PNSoft-VV Real-time video verification module
Addressable surface optical-electronic detector S2000-SHIK
Branching-isolating block Installation of the “Breeze” block
Installation of RIP-24 with batteries
ST-EX010 exit button
Electrical installation products, installation of cable and mini-channel 22/1x10 DKS
PVC corrugated pipe diameter: up to 32 mm
Switching box
ST-EX130 exit button
35 kV cable in laid pipes, blocks and boxes
Cable KPSVV 1x2x0.5
PATROL-401PET infrared detector
Cable up to 35 kV with fastening with overhead brackets
PATROL-901 infrared detector
Video monitoring device video intercom DPV-4MT Commax
Devices installed on metal structures calling panel AVC-305 Activision
Removable and retractable blocks (modules, cells, TEZ)
Power supply unit SKAT-1200D Bastion
Gate-Personnel expansion module
Battery 12V 7A/h Bastion
Electromagnetic lock ML-194.01 Topin
OMA-43.601, card reader
Installation door closer to metal doors
Hydraulic lever door closer in aluminum housing
Device (button, control key) number of connected ends: up to 2
Exit button KS-04 Daxis
additional network Gate-Terminal workstation of ACS operator
Code panel DKP-201 Elix
Cable ShVVP 2x0.75
ELTIS B-21
PW-500-EH-S, Card reader
Gate-Server-Terminal Software
Connecting electrical wiring to devices with a screw: without making rings with maintenance

Autonomous and networked access control systems, contactless and combined controllers:
EM-Contr
Proxy-H1000
PW-301
NC-100K-IP
VECTOR-100-SKS - built-in controller
Keyboard "Portal"
Gate-8000 Auto
NC-5000
PERCo-CL201.1
ST-SC032EH
ST-SC130EK standalone controller, reader and keyboard
Gate-8000 UPS
SR-SC110
H-Kontr proxi-card HID
PERCo-SC-820 access control controller
Gate-IC-Antipassback

Keyboard readers; magnetic card readers:
PERCo-RM-3VR type ISO 2 (ABA)
PR-EH03 proximity cards
PR-P09 (Parsec)
PW-101-EH-G-W (Proxway)
PW-106-E-W (Proxway)
MiniProx
ProxPoint Plus
ProxPro Keypad
CP-Z-2L
Matrix-II-EH
Matrix-IV-EH Keys
PERCo-RP-15.2D
ST-FR032EK
ST-PR040EM
ST-PR160EK
Portal
SR-R111
RW400
R10 iCLASS SE

Metal detectors, turnstiles Rostov-Don, PERCo:
T9 M1 STEP2 (UT)
T273M1 STEP2 (UT)
PR1/3M
PR1L/3M
R2M1/3
Р2С/3
TTR-04.1G
TTD-03.2S
KR05.4
KT02.3
AA-01
RTD-15.1R
PD-6500I
CS-5000
RS-3300
SmartScan A2SE
CORDON C2

Security detectors - infrared passive, addressable, street, perimeter, acoustic, combined, optical-electronic, linear, radio wave, vibration, sound (glass breakage):
BX-80N
D&D
LC-171
Foton-10 (IO 409-12)
LX-802N
LC-151 (SLC-151)
STA-453/M2
XD FIXED B
ID-12E
Piron-8 (IO 409-59)
SPEC-5-125 (IO 209-11/2)
AX-70TN
Foton-10B (IO 309-9)
AX-250PLUS
FMW-3/1
SWAN PGB
Barrier-100
Radium-2 (IO 207-4)
Prizma-3/200HP
Forteza-50
Foton-16A (IO 209-27)
Agat-SP5U (IO 407-15)
Fon-3/1T (IO 407-14/3)
Zebra-60 (lens type - volumetric)
EDS-2000
Orbita-1 (IO 315-3/1)
PATROL-105PET
Foton-20 (IO 409-45)
VIBRO
PATROL-USR
KX15DT
SWAN 1000
MRX-300N
Piron-7
FG-1608
Owl-3 (IO 315-3)
Sokol-3 (IO 414-3)
Sonar-3 (Messenger)
Astra-621 (IO 415-2)
Berkut-Sh (IO 315-6)
Orlan (IO 315-1)
Icarus-1A (IO 409-20)
Foton-21 (IO 409-52)
BV-501 (Bravo-501)
PATROL-801PET
Foton-Sh (IO 309-7)
MR-CRT
Foton-6A (IO 209-8)
TLC-360
Piron-Sh
Colt V.C.
Piron-4D
Rapid
SRP PET4