News

News

Access control system coverage application speed is amazing

2015-01-12 00:00

       The access control system is divided into card access control, biometric access control, and password access control according to the identification source. According to industry stakeholders, card access control can meet the needs of general area security requirements management, password access control is rarely used alone, and generally combined card swiping provides a higher level of security. Since everyone's biometrics are different, biometrics are usually combined with credit cards and passwords, and are suitable for places with high security levels.

 

The access control card market has a large capacity and has attracted many enterprises to enter, including foreign giants such as Honeywell, HID, Bosch, Tyco, Ingersoll Rand, Siemens, as well as a large number of domestic enterprises with very technical strength, such as Dash, Jiesun, Tongfang Rui'an, Supcon Technology, Shenzhen Wanglong, Shenzhen Kesong, Interwet, Hangzhou Zhongzheng and so on.

 

The current mainstream biometric access control includes: face recognition, fingerprint recognition, palm recognition, iris recognition, etc. Fingerprint recognition is small in size and convenient in application, and is currently widely used in access control recognition. Due to the rapid improvement of technology in recent years, the application of face recognition has been expanding, especially in some exhibitions and large-scale conferences. The proportions of various recognition methods are shown in the figure.

 

Biometrics accounts for the share of the access control market

 

Capital intervention has accelerated the survival of the fittest in the access control industry

The growth of market demand is accompanied by a large amount of capital intervention, the direct role of these capital intervention is to make the security industry chain become unprecedentedly dynamic, from raw material providers, product manufacturers, distributors, engineers to system maintenance providers, have achieved great development, in the overall industry investment scale have different degrees of growth.

 

The intervention of capital also accelerates the survival of the fittest, and indirectly improves the quality of all links of the industrial chain. The expansion of the scale of the industrial chain and the improvement of quality will in turn stimulate the benign development of the industry.

 

Traditional means of personal identification can no longer fully meet the needs of modern social and economic activities and social security precautions. From the perspective of eliminating human insecurity, only identification documents that are not easy to be replaced by others, imitated, or even transferable by oneself can be competent. Therefore, from the aspects of ease of use, security, maturity and cost, with the continuous advancement of IT (information technology), with the continuous maturity of identification technology, with the rapid development of computer technology, access control technology has developed rapidly, and is developing from the traditional keyboard and magnetic card to the direction of induction card, smart card and multi-function card with amazing speed.

 

Now access control systems can even use satellite networks to provide global access control services. From the rapid growth of access control systems, it can be seen that the market of this product has gradually matured, changing the situation of alarm and monitoring products dominating the world in the past, and the predictions recently executed by experts show that the market of sensor access control systems is growing at an astonishing rate of 300% per year.

 

Large access control systems are favored by users

With the acceleration of the development of digital networking of security systems, the range of networked products continues to expand, and the access control system has steadily deepened from the traditional RS485 bus transmission mode to TCP/IP network. RS485 communication mode in the number of nodes, transmission distance, communication rate and other aspects of local limitations about its application, especially the application of large access control systems. The access control system based on TCP/IP network communication mode has the advantages of no node limit, wide coverage, fast communication speed and small interference, and is fully ahead of RS485 bus mode, which will naturally be favored by many users, especially large access control system users.

 

It must be noted that some access control systems on the market that use external or built-in network converters are actually intermediate devices that use RS485 to TCP/IP, not network access control in the true sense. In the true sense of network access control, its access controller generally uses 32-bit ARM7/9 microprocessor to achieve.

 

The access control system using full TCP/IP mode can make full use of the existing network resources, the amount of new wiring engineering is small, it can be used across regions without distance restrictions, and the amount of information transmission and storage can be greatly improved. However, if the project originally did not have a network, the special construction of the network increased the initial investment cost, and the current large-scale system with more than 100 doors is mainly used.

 

Another aspect of technological development is the integration of access control systems and other security systems, mainly integrating video surveillance systems, intrusion alarm systems, perimeter detection systems, fire alarm systems, and building automation systems. This combination provides an effective structure to enhance the complementarity of the systems. For example, once there is an event that triggers an alarm, it will signal to the video surveillance system to provide real-time video recording of the event scene, and at the same time link the access control system to block the corresponding access control channel.

 

In addition, the integration of access control and the card system will be closer, the scope will become wider and wider, penetrate into all fields of society, and play an increasingly important role. In addition to access control, attendance, certificates, patrols, dining, consumption, fitness, medical treatment, parking lots, library materials, conference sign-in, visitor management, elevator control management, office equipment management, clubhouse entertainment, three tables and property payment, etc.

 

It also carries out necessary integration and linkage with other intelligent systems, such as anti-theft alarm, closed-circuit monitoring, fire alarm, and even building automation system. In addition, the system will also make data interfaces with ERP and other systems, such as attendance and payroll, personnel management and other interactive data, which are mutually based.