Scud management. Access control and management. Functions of the automated inventory control system

ACS is an access control and management system, which is a set of software and hardware used to register people, vehicles arriving, staying and leaving the territory (premises) of controlled objects through installed access points: checkpoints, gates, doors.

Installation of access control systems allows you to effectively solve problems of regulating (limiting) access of unauthorized persons to the territory or premises of enterprises and organizations. Network access control systems are more effective and functional, with the help of which you can provide identification, organize the recording of the use of working hours and develop schemes for delimiting and controlling access.

ACS systems that we install

Autonomous access control systems (ACS)

Autonomous access control systems, as a rule, are mounted on the door of the premises and allow the passage of employees and visitors using special identification cards or key fobs. Autonomous access control systems are easy to install and operate. It includes the following devices:

  • reader (device to which users attach their individual cards);
  • lock;
  • control controller;
  • exit button.

In some cases, autonomous access control systems are installed optional equipment– video intercom, which serves to identify visitors to premises and open doors by pressing a button.

Network access control and management systems (ACS)

Network access control systems include significantly more various devices, allowing you to solve a wide range of problems in organizing access control, monitoring and managing the operation of equipment at facilities of any scale.

As a rule, a network access control and management system includes the following devices:

  • network controllers;
  • readers of various types;
  • locking devices:
  • identifiers (key fobs and cards).

Installation of network modifications of access control systems makes it possible to effectively solve the following problems:

  • ensure control of access of visitors and employees to the premises, formulate their rights in accordance with work schedules;
  • organize a record of actual working time, as well as time of lateness, delays in coming to work, etc.;
  • use locking and barring devices of any type (gates, barriers, turnstiles, locks) for access control;
  • use various identification methods (fingerprints, key fobs, personal cards) to ensure security;
  • perform personalized video identification of subjects (visitors and employees).

The cost of installing an access control and management system

Autonomous system for 1 door, entry by cards, 10 cards included, all materials and installation work included

From 9,900 rubles

Order

Network access control system for 1 door, card entry, 50 cards per set, ability to track employee working hours, all materials and installation work included

From 33,900 rubles

Order

Network access control system for 4 doors, card entry, 100 cards per set, ability to track employee working hours, all materials and installation work included

From 129,500 rubles

Order

Capabilities of ACS systems

Access control to premises

Organize access control. The system will make it possible to enter only those objects or premises to which access is permitted. It can be configured at different levels (for visitors and employees).

Time tracking

Keep records of the use of working time. Installation of access control systems can significantly improve labor discipline in an organization or enterprise and provide convenient and multi-level access to offices using individual cards and control over it. The equipment automatically generates reports on the attendance of objects and premises by employees and visitors.

Organization of a checkpoint with a turnstile

Set up a checkpoint with a turnstile in the office. The ACS security system makes it possible to organize electronic checkpoints in company offices, equipped with various types of locking devices. The system will register and record all visitors and create a database of their movements.

Video intercom and door opening with button

Use a video intercom. Installing a video intercom and equipping door opening devices with buttons allows you to see all visitors, negotiate with them, and, if necessary, open the door by pressing a button.

Integration with video surveillance system

Integrate with a video surveillance system. Installing an access control system with an additional video camera will make it possible to eliminate cases of manipulation with passes. The security service will be able to view video recordings and check whose cards were used for the pass.

Fingerprint login

Log in using your fingerprint. The access control system can be equipped with devices that use fingerprints as an identification feature. Modern biometric technologies are the most advanced today and almost completely eliminate the possibility of manipulation of identification.


What equipment is used?

Manufacturers

LLC "Era of New Technologies" has developed software that allows you to fully reveal the capabilities of access control and management systems. The system is distinguished by its favorable cost and user-friendly interface, which allows you to quickly master the program.
Production: Russia.

Since 1997, the company has been successfully developing and producing access control systems (access control systems) under the Parsec brand. Big choice equipment and software allows you to meet the needs of various objects: from small office premises to huge city-forming industrial complexes.
Production: Russia.

Under the Smartec brand, a line of devices from various manufacturers is supplied to the Russian market, each of which was selected based on the results of technical tests and comparison of their technical and operational characteristics with those of analogues of well-known world brands. The line uses biometric readers and controllers.
Production: China / Russia.

Where to begin?

1. Contact us

We are always in touch. We are available from 9:00 to 20:00 on weekdays and weekends by phone, e-mail and through contact forms on the website.

2. Budget estimate in 30 minutes

You get the optimal solution to the problem. We regularly conduct market research and select best solutions by cost and characteristics.

Qualified system selection by professionals. A certified engineer will carefully examine your facility, conduct a demonstration of the equipment and calculate an estimate.

Prompt preparation for installation. We will complete your system in an average of 3 working days from our own warehouse of more than 200 items.

Accurate installation right on time. Full-time specialists (more than 1 year of experience / at least 50 installed systems) using professional tools will install everything within the time period specified in the contract.

Providing extended warranties. 30 days of free service under the contract, 365 days of warranty on work and lifetime technical support.

Do you have any questions during operation? Prompt assistance and service from the technical support department.

8. Quality control of the system

Be confident in the quality of the installed security system. During our cooperation, each system goes through several stages of control, the operation of all elements is checked.

Installation of access control systems

Installation of access control systems at various facilities is a significant contribution not only to security, but also to business development. This equipment makes it possible to form a real picture of employee employment.

Network ACS systems are difficult to install and maintain. The installation of such equipment is best left to qualified and experienced personnel with appropriate technical knowledge in the field of networking technologies.

For small offices with one door, it is best to use budget installations autonomous systems access control and with the ability to record working hours. Such equipment is in great demand in the capital and the Moscow region, its price is 35,000 rubles (with turnkey installation), and the work is completed within 1 day.

“Medium” ACS systems, as a rule, are designed for objects with 2-20 access points. The cost of implementing the ACS system project for 4 checkpoints will be 129,000 rubles. Installation of equipment will take from 2 to 14 days.

By contacting us by email or phone, you can receive the company’s full price list with prices for all types of equipment designed to provide access control, and for all types of work performed.

  • Access Controller is a device designed to control access through controlled access points by analyzing user identifiers read using readers (checking rights). Access controllers can make their own decisions to grant or deny access if user IDs are stored in the controller's memory (in which case local access is said to be used). Also, user IDs can only be recorded in the network controller (in the software database). In this case, the access controller performs the functions of a relay - it sends code to the network controller and receives from it a decision on granting or not granting access (in this case we talk about centralized access). Access controllers control barring devices using relay contacts;
  • Identifiers– unique characteristics of ACS users. The identifier can be a Touch Memory electronic key, a contactless Proxy card, a radio key fob, a PIN code, biometric data (fingerprint, palm print, iris or retina pattern, geometric characteristics of the face, etc.). In the access control system, each identifier is assigned certain powers, in accordance with which access controllers allow or deny access;
  • Readers– devices designed to read the user ID code and transmit it to the access controller;
  • Access point– the logical object of the access control system is actually a physical barrier equipped with an access controller and a reader. The access point can be a door, gate, turnstile, barrier, gateway, etc. Access points can operate in two modes: with and without control of the direction of passage. Access points with access direction control can be either bidirectional (equipped with two readers) or unidirectional (with one reader, without the ability to pass through reverse direction). Exit through access points without controlling the direction of passage is most often carried out using a button;
  • Access area– ACS logical object. Access zones are areas into which the territory of a protected enterprise is divided. Access points with the direction of passage are always located at the boundaries of access zones. Access zones are configured for access points if the system uses functions such as working time calculation and re-entry prohibition (antipassback rule);
  • Access level– individual access rights, which determine the rules for passage through points and presence in access zones assigned to the user ID. Based on these rights, access controllers (or network controllers) decide whether to grant or deny access;
  • Windows of time– a set of time intervals during which passage is allowed. Time intervals can be set for each access point or zone individually;
  • Software– component of the access control and management system. Using the software, ACS controllers are configured, including setting user IDs, access levels and time windows in them. The software is also used to implement such additional functions as relaying events about passages to implement a re-entry ban, real-time monitoring of employees and visitors of a protected facility, logging (and accumulation in the system database) of access control events, recording time worked by facility employees , creation of various reports on ACS events.

Standard pass mode. Each access point in the enterprise that is subject to control is installed with an access controller and reading devices. In order for employees to be able to pass through access points, each of them is given a unique user identifier; biometric information can also serve as an identifier. The identifier is stored in advance in the memory of the access controllers or network controller, where access levels are assigned to it. If the system is controlled by software (AWS), then usually part of the employee’s personal data is also entered into the AWS database. Upon presentation of the identifier, the device or network controller makes a decision to grant or deny access to the employee. All facts of passages through access points, as well as events associated with them, are stored in the memory of the access controllers, and are also transmitted to a PC and entered into the workstation database. Subsequently, based on these events, you can receive various reports, calculate the time worked by employees, etc.

Anti-passback(rule antipassback) is used to ensure that one identifier cannot be used again to enter any access zone without first leaving it. The access controller's response to an antipassback rule violation depends on the antipassback mode set for the access level of the identifier in question. One of the following modes can be used:

  • Strict - the system prohibits repeated entry into the access area until exit;
  • Temporary - during the specified time, the system prohibits repeated entry into the access area until exit;
  • Soft - the system will not deny access, but the fact of violation of the antipassback rule will be recorded in the event log.

The anti-passback rule can only be used for doors with directional control. Supported only by the S2000-2 controller.

Access according to the rule of two (or more) persons. To control access to access areas with increased security requirements, the passage mode can be used according to the “rule of two (three) persons” with agreed access levels. When the first identifier is presented, the access controller goes into standby mode for the second identifier. If the key presented after this has an inconsistent access level, the controller will deny access. If the access level is agreed upon, access will be provided (in the case of using access via rule of three individuals, this procedure will be repeated for the third key). This pass mode is an access parameter for the identifier and is configured independently for each pass direction (for each reader) in the access level. This function is supported only by the S2000-2 controller.

Access with confirmation. If not all persons participating in the access procedure according to the two (three) person rule are expected to enter the protected access zone (for example, a security officer confirms the access of another employee), then the “Confirmer” access mode is set for the access level of such persons. Independent access using a key with this access mode is impossible, and when accessing according to the rule of two (three) persons using such a key, the “Access granted” and “Passage” messages will not be generated. This function is supported only by the S2000-2 controller. The S2000-2 devices, starting with version 2.0x, also support the ability to organize confirmation not only with an additional identifier, but also with a special button.

Double identification. Each of the controller readers can operate in a mode where identification requires the presentation of two identifiers (for example, a Proxy card and a PIN code). This mode can be enabled independently for each reader. With double identification, the procedure for granting access begins with providing the main code (first identifier). If the key is recognized and there are no violations of the access mode, the controller goes into standby mode for an additional code. If an additional code is presented, the identification procedure is considered successfully completed. We recommend using “Proxy-KeyAH”, “Proxy-KeyAV” (for EM-Marine cards), “Proxy-KeyMH”, “Proxy-KeyMV” (for Mifare cards) as readers for this access mode.
The device can also be temporarily switched to “Open” or “Closed” access mode.

Access under duress. It is possible to alert the security of the facility that access or arming/disarming control is being carried out under duress. To do this, the user, instead of the usual identifier, presents a “Coercion Code” on the reader. In this case, an alarm message is generated, but otherwise the use of such an identifier does not differ from the usual one. There are two ways to present the Duress Code. In the first method, the user is given two identifiers instead of one. In normal mode, the first identifier is used, and under duress, the second. If dual identification is used, then you can use the second method to present the “Coercion Code”. To do this, in addition to the usual additional code, a second special “Additional duress code” is added to the main user code. Most often, with double identification, a PIN code is used as an additional key code. Therefore, the user only needs to have a single primary identifier and remember two PIN codes - a regular one and a duress code.

Closed access mode. In this case, all types of access through the managed point are prohibited. The device can be switched to this mode by a centralized command via the RS-485 interface, upon presentation of a key of the “Closing” type, or upon arming of access-blocking alarm loops. The mode can be used to temporarily block access to certain premises object.

Open access mode. There is free passage through the controlled point without presenting identifiers. In the “Access Open” mode, the controller constantly provides an opening action to the corresponding relay (the relay in a given direction is either continuously on or continuously off), so this access mode generally cannot be used for some types of locking devices, for example, electromagnetic latches. The device can be switched to this mode by a centralized command via the RS-485 interface, upon presentation of a key of the “Opening” type. In “S2000-2” devices, starting with version 2.0x, the possibility of fully opening free access has been introduced using electromechanical latches, which open with a short pulse and go into the “closed” state only after opening and then closing the door. In this case, when the “Access Open” mode is turned on, the relay will turn on briefly (for the same time as when access is granted) each time the door is closed and the lock will be open all the time. Also, the new version of the “S2000-2” devices can be switched to the mode open access by an external relay signal detected by the device's AL.

The following important parameters are configured in the “S2000-2” device and the “S2000-4” block:

  • View of the interface of connected readers - Touch Memory, Wiegand, Aba Track. This parameter is responsible for the method of transmitting the code of the read identifier to the controller.
  • Passage sensor - the parameter indicates that the controller uses a passage sensor. The main purpose of the sensor is to generate a “Pass” message when this circuit is triggered after access is granted. The presence of the “Passage” event is necessary for the implementation of the antipassback function and for the correct operation of the “Work Time Accounting” function in the automated workplace;
  • Door blocking control - when the door is opened during passage for a time exceeding the “Blocking timeout”, an alarm message “Door blocked” is generated;
  • Burglary control - when this parameter is enabled, when a door is opened without granting access, an alarm message “Door is hacked” is generated;
  • Access zone number - from 0 to 65535. Number of the access zone, the entrance to which is controlled by this reader (65535 - access zone number is not defined - for walk-through doors);
  • Turn off when opening the door - early interruption of the “opening” relay program when the door is opened (the relay turns off after the passage sensor is triggered). This function it is advisable to turn on when using electromechanical locks (which do not make sense to supply power when the door has already been opened);
  • Turn off when closing the door - early interruption of the “opening” relay program after closing the door (the relay turns off after the passage sensor is restored). It is advisable to turn it on when using the turnstile, when after turning the turnstile you can begin a new procedure for granting access. When using a gateway, this option is always considered enabled, since when leaving the gateway, you cannot enter it again without presenting an identifier, and you can exit from inside only after pressing the exit button;
  • Access controller relays can operate as either closing or opening switches. The relay operating tactics are selected depending on the locking mechanism used.

To organize one or several autonomous access points at an object in ISO "Orion", you can use a specialized access controller "S2000-2", a control panel "S2000-4" with access control functionality and biometric access controllers "S2000-BIOAccess-MA300" , “S2000-BIOAccess-F22”, “S2000-BIOAccess-PA10”, “S2000-BIOAccess-SB101TC”, “S2000-BIOAccess-W2”. The S2000-2 access controller can be used to organize bidirectional and unidirectional access points with and without control of the direction of passage. For access points organized using S2000-2, you can apply the antipassback rule, use access with confirmation or according to the rule of two (or more) persons. A reception and control unit with access control functionality “S2000-4” and biometric access controllers allow you to organize a unidirectional access point with or without control of the direction of passage.


The access controller “S2000-2” has the ability to operate in several modes: “two doors per entrance”, “one door per entrance/exit”, “turnstile”, “barrier”, “gateway”. The controller memory can store 32768 user IDs; 32768 events in case of lack of communication with the network controller, 100 time windows and 100 access levels. The logic of the controller depends on the selected operating mode. “S2000-2” also has two alarm loops, to which you can connect contact security detectors, signals for switching the controller to open access mode, and signals for allowing reading identifiers. The controller can be configured to lock the door if any security loops are under protection. You can control the acquisition and removal of loops from the same reader and the same identifier that is used to control the access control system. To ensure the possibility of providing access to a wide range of people whose identifiers are difficult or impossible to enter into the controller’s memory (for example, there are too many of them), provided that the code of all these identifiers satisfies some well-known rule, access templates are implemented in S2000-2.

Operating modes of "S2000-2"
Two entrance doors

In this mode, the controller controls access through two independent access points, and granting access in one direction (entrance) requires the presentation of identifiers, and to grant access in the opposite direction, the “EXIT” button is pressed.
For each reader, you can configure dual identification, access based on the rule of two (or more) persons, and access with confirmation. Both readers in this operating mode of the device operate independently of each other. Those. when free access is opened (or, conversely, access is closed) on one reader, the second will function in standby mode until the corresponding command is also sent to it. In general, in this mode of operation, the antipassback rule cannot be used for doors (since the doors are not access points with control of the direction of passage in this case). However, if the exit button for one of the access points will not be used, antipassback mode can be configured for it.

One entry/exit door

This mode is designed to control access through one door, which has only one locking device and is controlled by one passage sensor. Providing access in both directions requires the presentation of user IDs. Exit buttons can also be used to provide access (for example, to open a door from a security post).
In this mode, the antipassback rule, access according to the rule of two (or more) persons, access with confirmation, and double identification can be used. In the “One door per entry/exit” operating mode, when free access is opened, the controller readers work synchronously - when a command is sent to one reader of the device, the second reader will automatically be switched to the same mode.

Turnstile

In this operating mode, the S2000-2 controller controls passage through the electromechanical turnstile. The turnstiles have two control circuits for each direction of passage (usually these control circuits are located in the remote control unit that comes with the turnstile). Moreover, providing access in each direction requires the presentation of user IDs on readers installed on both sides of the turnstile. To remotely provide access, the operator can use the “Exit” buttons. If it is necessary to authorize access and register passage by an identifier that would be denied access in normal mode (the time window is not active, the validity period has expired, antipassback is violated, or the identifier is not stored in the controller’s memory at all), an additional “Permission” button can be connected to the controller. . The “Resolution” button can be used for all operating modes of the device, except for the “Gateway” mode.
In the “Turnstile” mode, the antipassback rule, double identification, access according to the rule of two (or more) persons, and access with confirmation can be used. Both readers in this operating mode of the device operate independently of each other. This means that when free access is opened (or, conversely, access is closed) on one reader, the second will function in standby mode until the corresponding command is sent to it too.

Barrier

In this mode, the controller controls bidirectional access through one access point with one blocking device - a barrier. The first relay of the controller controls the opening (raising) of the barrier, and the second relay controls the closing (lowering). Typically, the controller relays are connected to the barrier control unit. Providing access in both directions requires the presentation of user IDs on readers installed on both sides of the barrier. For remote (manual) control of the barrier, the “Enter” and “Exit” buttons can be used. Car passage sensors, in addition to registering passage, perform the function of protection against lowering the barrier onto the car. As long as at least one of the passage sensors is in the activated state, the barrier will not lower. For this reason, passage sensors (usually optical beam sensors are used) are placed on both sides of the barrier so that any vehicle located under the barrier will trigger at least one sensor. To increase imitation resistance, vehicle presence sensors in the reader area can be connected to the controller alarm loops. In this case, the identifiers will be perceived by the controller only if there is a car near the reader. It is possible to control traffic lights using switching devices “UK-VK/06”. To turn traffic lights on/off, the reader LED control outputs are used. UK-VK/06 devices can switch voltages up to 220 V (AC) and currents up to 10A, which allows you to control almost any traffic lights.
In the “Barrier” operating mode, the antipassback rule, double identification, access according to the rule of two (or more) persons, and access with confirmation can be used. In the “Barrier” operating mode, when free access is opened, the controller readers work synchronously - when a command is issued to one reader of the device, the second reader will automatically be switched to the same mode.

Gateway

In this mode, the controller controls access through one access point, which is two doors with confined space between them (gateway), and both doors cannot be opened at the same time. At the entrance to the gateway, two readers are installed on each side (outside the gateway). At the security post that controls the operation of the gateway, two “Exit” buttons are installed so that the guard can let a person into the gateway without presenting an identifier, two “Confirmation” buttons to let the person out of the gateway, and a “Ban” button to deny access. To go through the first door (entrance to the gateway), you must present an ID. The second door opens either automatically, after closing the first door, or after the guard presses the “Confirmation” button (set when describing the access level). If there is no security post and the gateway operates exclusively in automatic mode, then the “Confirmation” buttons still need to be connected so that the person has the opportunity to exit through the door through which he entered if he changes his mind or stays inside longer than the allotted time. The allowed time for a person to stay in the gateway is set by the “Time to confirm access” parameter. During this time, any of the “Confirm” buttons can be pressed and the corresponding door will open. If during this time none of the “Confirmation” buttons was pressed, then the access procedure is considered incomplete and the gateway is free. A person can be released from the gateway after the “Time to confirm access” has passed only through the door through which he entered by pressing the “Confirmation” button for that door. On the one hand, the “Time to confirm access” must be selected sufficient for additional identification; on the other hand, if a person presented an identifier but did not enter the gateway, then during this time it will not be possible to start new procedure access. When you press the “BAN” button, the “Access Denied” message is generated and no door opens. You can only let a person out of the airlock through the door through which he entered by pressing the corresponding “CONFIRMATION” button. If you equip the gateway with a presence sensor and connect it to the “BUSY” input of the controller, then there will no longer be a strict time frame - additional identification can be carried out as much as necessary. Doors must be equipped with opening sensors (the “Passage sensor” parameter is considered to be always on). In this operating mode, the antipassback rule, double identification, and access with confirmation can be used. In the “Gateway” operating mode, when free access is opened, the controller readers work synchronously - when a command is issued to one reader of the device, the second reader will automatically be switched to the same mode.

Organization of complex access points

When organizing complex access points, if during access through the reader of one controller “S2000-2” ver. 2.0x it is necessary to block access through the readers of other similar controllers, their operation can be synchronized using the “Busy” signal. In this case, upon presentation of the identifier, the device analyzes the “Busy” input and provides access only if the input is not active. From this moment until the fact of passage is registered, the controller activates its “Busy” output in order to block the readers of other controllers for this time. The “Busy” contact is both an input and an output of the device. To synchronize several “S2000-2”, it is enough to connect their “Busy” contacts to each other (as well as the “GND” contacts if the controllers are powered from different power sources). In addition, it is necessary to enable the “Accept BUSY” and “Issue BUSY” parameters for the reader, so that access through this reader is blocked when accessed through readers of other controllers, and vice versa, so that when accessed through this reader, readers of other controllers are temporarily blocked. At the same time, the “BUSY” signal can be used to connect a presence sensor if the next access procedure can only be started after the access point is released.

This scheme can be used, for example, when equipping the entrance to a two-level parking lot. One device controls the barrier from the street side, and the other two control the barriers at the entrance to the first and second levels. Presence sensors monitor the presence of a car on the ramp. To block the simultaneous entry of a car onto a ramp from different levels, it is necessary to set the parameters “Issue BUSY” and “Receive BUSY” at one of the readers of each controller (the one that allows entry to the ramp). For those readers that control exit from the ramp, these parameters should be turned off.


The “S2000-4” block can control access through one access point, and providing access in one direction requires the presentation of user IDs, and to provide access in the opposite direction, the “Exit” button is pressed. When using the access control functionality in the block, the first loop is used to connect the exit button and the passage sensor, and the first relay is allocated to control the locking device. “S2000-4” has access blocking functionality if any (or all) of the unit’s alarm loops are armed. You can control the acquisition and removal of loops from the same reader and the same identifier that is used to control the access control system. Since using the block you can only organize a unidirectional access point without controlling the direction of passage, you cannot configure an antipassback rule for it. The block supports dual user identification mode.
The block supports up to 4096 user IDs, and the block event buffer is designed for 4088 events. Up to 16 time windows can be stored in memory.


When using inexpensive proximity cards (EM-Marine standard) or Touch Memory keys as identifiers, the security service or facility operation may encounter cases of cloning (copying) of identifiers by users. Reliable protection against card copying will be the use of specialized readers with the anti-clone function “Proxy-5MSG”, “Proxy-5MSB” and MIFARE standard cards (MIFARER Classic 1K (S50), MIFARER Classic 4K (S70), MIFARER Plus S 2K, MIFARER Plus S 4K, MIFARER Plus SE 1K, MIFARER Plus X 2K, MIFARER Plus X 4K).
In the first option, the factory unique card number will be used to identify the user, but the reader will transmit it only if authorization is successful. Authorization is carried out using a secret word written in a protected area of ​​the card’s memory, which is checked by the reader.
In the second option, not the factory code of the card will be used as an identifier, but the code stored in its protected memory area. This code is written to the card directly at the facility.
The third option is similar to the second. The difference is that the card code, stored in a protected memory area, is additionally encrypted. This option is recommended for use with less secure MIFARER Classic cards.
Selecting the operating mode of the “Proxy-5MSG”, “Proxy-5MSB” readers and setting the parameters for working with protected sectors is carried out using a master card. To create master cards and user cards, the Proxy-5MS-USB reader and free SecurityCoder software are used.
The readers have a Dallas Touch Memory output interface and are compatible with all ISO Orion devices.


Just like the “S2000-4” block, the “S2000-BIOAccess-MA300”, “S2000-BIOAccess-F22”, “S2000-BIOAccess-SB101TC”, “S2000-BIOAccess-W2” controllers can control access through one access point, Moreover, providing access in one direction requires the presentation of user identifiers, and to provide access in the opposite direction, the “Exit” button is pressed.
Fingerprints are used as the main user identifiers when working with “S2000-BIOAccess-MA300”, “S2000-BIOAccess-F22”, “S2000-BIOAccess-W2”. “S2000-BIOAccess-PA10”, along with a fingerprint reader, is equipped with a palm vein reader, and “S2000-BIOAccess-PA10” is equipped with cameras for identification based on the geometric characteristics of the face. Also, all controllers are equipped with a built-in proximity card reader and, with the exception of the S2000-BIOAccess-MA300, a keyboard for entering a password to provide access using a combination of any identifiers (biometrics, proximity card, password).
The controllers are connected to the system via an Ethernet network (TCP/IP). Since devices can only be used to organize a unidirectional access point, you cannot configure an antipassback rule for it.

Attention! In "S2000-BIOAccess-W2" it is used new algorithm biometric data storage, incompatible with other controllers. It makes sense to use it only in new systems that are not planned to be supplemented with controllers of other modifications.


Based on contactless keyboard “Proxy-Key” readers of various modifications, it is possible to implement the maximum budget solution for access control through one point. Moreover, providing access in one direction requires the presentation of user identifiers, and to provide access in the opposite direction, the “Exit” button is pressed. Proximity cards or passwords are used as user identifiers. The products do not connect to the system via information interfaces and operate only in offline mode.
Readers support up to 1000 key codes or 8 passwords.


Integrating several access controllers with an RS-485 interface into a single system can provide the ACS with the following advantages and new functions.

Network and zonal antipassback

If there is a network controller (S2000/S2000M console or APM), messages about passages through access points will be automatically relayed to all access controllers. Thus, the antipassback rule will be triggered for all access points that allow the identifier into the access zone in question. The described operating mode of the system is called “Network antipassback”.
The antipassback rule can be made more strict by setting the “Zonal antipassback” (“Route Control”) parameter in the access level. In this case, passes to any access zone are taken into account, and if an attempt is made to pass through one of the access controller readers, then to fulfill the antipassback rule it is required that the last registered pass was to the zone where this reader is located. That is, it is possible to move from zone to zone only in order - 0, 1, 2 and in reverse order.

Integration with security systems

To unblock escape routes in case of fire, the “S2000-2” device and the “S2000-4” block can be switched to open access mode by centralized commands via the RS-485 interface coming from the “S2000M” consoles or the workstation that controls the fire alarm. ACS readers can be used for remote centralized acquisition/removal of alarm loops from other devices. In this case, the same identifier and reader can be used both for local access control and for centralized control of the security system.
The “S2000-BI” and “S2000-BKI” display blocks allow you to display the status of access points and readers controlled by the “S2000-2” and “S2000-4”: “Dress”, “Door hacked”, “Door locked”, “Door open”, “Door closed”, “Access open”, “Access closed”, “Access OK”.
The “S2000M” remote control can control the outputs of the BOD and relay units related to the fire alarm system upon the fact of breaking, blocking, opening and closing doors, as well as opening and blocking free access.

Centralized configuration. Event collection and processing

Often, even in small facilities with several access points, there is a need to add new or edit the powers of existing identifiers simultaneously in many access controllers. It is most convenient to perform these manipulations centrally, when you only need to carry out the adding/editing procedure once, and then write new data to all devices. In addition, the functionality of generating reports on ACS events and calculating time worked is in demand. For these purposes, software (AW) is used.


ISO "Orion" uses the following software to work with ACS: Uprog, BAProg, automated workplace "Orion Pro". Uprog software allows you to freely configure the configuration parameters of the S2000-2 access controllers and the S2000-4 unit, namely:

  • operating mode, dual identification, access according to the two (three) person rule, number of the controlled access zone, interface type of connected readers, enable/disable the use of the passage sensor, blocking control, blocking timeout, etc.;
  • recording and editing access level controllers, time windows and user IDs in memory.

BAProg software allows you to freely configure similar configuration parameters of biometric access controllers “S2000-BIOAccess-MA300”, “S2000-BIOAccess-F22”, “S2000-BIOAccess-PA10”, “S2000-BIOAccess-SB101TC”, “S2000-BIOAccess- W2".
When using Uprog and BAProg, it is not possible to configure several devices at the same time. Thus, these programs are used only for the initial setup of devices. During subsequent operation of the Uprog and BAProg systems, it is advisable to use only for small systems (no more than 5 devices).

The Orion Pro automated workplace software allows you to implement the following:

  • accumulation of ACS events in the database (passes through access points; blocking and unblocking of access points; unauthorized attempts to pass, etc.);
  • creating a database for a protected object - adding ACS logical objects (access points and zones) to it. And also their arrangement on graphic plans premises to implement the possibility of centralized provision of access and monitoring of the condition of these objects;
  • formation of a user database - entering the details of employees and visitors, indicating for each person all required attributes(full name, information about affiliation with a company, division, work and home address and telephone number, etc.), as well as setting access rights (authorities to pass through access points, stay in the access zone). The Scanner software allows you to automate the entry of personal data of employees and visitors into the database by recognizing documents (passports, driver’s licenses, etc.);
  • creating a database for recording working hours - creating work schedules, as well as calculation rules for various employees;
  • polling and management of controllers connected to a PC, as well as integration with storage systems for keys, small items and electronic safes (software " Electronic safe»);
  • group configuration of access controllers - centralized recording of time windows, access levels, user IDs into the device memory;
  • network antipassback operation;
  • configuration and operation of zonal antipassback;
  • displaying the state of ACS objects on graphic floor plans;
  • displaying information about the employee’s location accurate to the access zone;
  • displaying CCTV cameras, as well as managing the status of these cameras;
  • recording video at the command of the officer on duty, when a motion detector alarms, or according to a control scenario (for example, according to the event of granting access or an attempt at unauthorized passage);
  • Thanks to the integration of the license plate recognition module into the Orion Pro video system, it becomes possible to use the video surveillance system not only for photo and video verification, but also as additional means identification in ACS: providing access through barriers upon successful recognition of a license plate (Orion Auto system).

It is worth noting that the devices are physically connected to the system computer on which the Orion Pro Operational Task is installed. When organizing distributed systems, remote objects can be connected to a single “Operational task” according to local network using S2000-Ethernet converters. It is also possible to install “Operational tasks” directly on remote objects. The second option will require large material costs, however, it will be more preferable if it is necessary to organize photo verification at remote sites (this function will be available even in the event of a communication channel failure between objects).
It is recommended to connect no more than 500 S2000-2 devices to one operational task.
To enter user IDs into the database of the Orion Pro automated workplace, you can use USB readers: “Proxy-USB-MA” (for EM-Marin, HID and Mifare cards), “Proxy-5MS-USB” (to implement the “anti-clone” function ) and “S2000-BioAccess-ZK9500” (for fingerprints of all biometric controllers with the exception of “S2000-BIOAccess-W2”).
Software modules can be installed on computers arbitrarily - each module on a separate computer, a combination of any modules on a computer, or installation of all modules on one computer. On structural diagram ISO "Orion" shows the number of jobs that can be used in the system.



The “S2000-2” controller, designed for the access control and access control system in the ISO “Orion”, is powered by a low-voltage power supply (IE) with a voltage of 10.2 to 15 V, biometric controllers “S2000-BIOAccess-MA300”, “S2000- BIOAccess-F22", "S2000-BIOAccess-PA10", "S2000-BIOAccess-SB101TC", "S2000-BIOAccess-W2" from IE with voltage from 9.6 to 14.4 V, and the "S2000-4" block supporting ACS functions, has a supply voltage range from 10.2 to 28.4 V, which allows the use of sources with a rated output voltage of 12 V or 24 V accordingly (Fig. 36-40). A special place in the access control system can be occupied by Personal Computer from the workstation of the duty operator or administrator. It is usually powered by AC power and its power supply is provided by UPS type sources.
To ensure the continuous execution of ACS tasks, it is advisable to implement a redundant power supply system using built-in RIP or external low-voltage batteries. The current regulatory document - GOST R 51241-2008 “Means and systems for access control and management” recommends that the IE have a low battery indication below permissible limit. At the same time, for stand-alone ACS systems, the discharge indication can be light or sound, and for networked systems, the battery discharge signal can be transmitted to the operator’s console. Distributed placement of equipment throughout a large facility, which is easily implemented in ISO "Orion" through the use of communication lines of the RS-485 interface, requires power supply for ACS devices (controllers, electromagnetic locks and electromechanical latches) in places where they are installed. Depending on the size of the object, you may need from one IE to several dozen. There is a wide range of power supplies recommended for ACS.
In small systems, you can use RIP-12 version 11 (RIP-12-1/7P2) (output current 1 A, light indication of battery presence, charge and discharge). For systems with significant current consumption, the following are used:

  • RIP-12 isp.02, RIP-12 isp.04 with an output current of 2A.
  • RIP-12 isp.01 with an output current of 3A.

For network systems, with the transmission of messages about the state of the power supply to the operator console, you can use any RIP for fire automatics that has relay outputs, or a RIP with an RS-485 interface.

For the S2000-2 device and the S2000-4 unit, the following recommendations should be taken into account. The electromagnetic lock (latch) can be powered from the same power source as the controller, or from a separate power source. When powered from one source, the controller's power supply circuit and the lock's supply circuit must be made of different pairs of wires, which are combined only at the terminals of the power supply. If the readers have a current consumption of more than 100 mA or they are located at a long distance from the controller (100 m or more), then to power the reader it is necessary to use a separate pair of wires going directly to the power source. If the reader is powered from a separate power source, then the “GND” contact (negative power circuit of the reader) must be connected to the “GND” (for “S2000-2”) or “0V” (for “S2000-4”) contact of the device.
For free-standing controllers it is convenient to use “RIP-12 isp.20”. With a rated output current of the source equal to 1 A, the RIP is capable of delivering up to 1.5 A to the load for a long time. A design feature of this RIP is the presence of “two tiers”: a power supply module is attached to the rear of the case, and above it, due to the presence special U-shaped corners - the selected device is placed and fixed with screws (for example, “S2000-2” or “S2000-4”), functionality which are not limited in any way (see figure).

IN bottom part The housing is equipped with a 12 V battery with a capacity of 7 Ah. Placing inside the access controller will save on installation work and further maintenance.
Network access control systems may also require reliable power supply to communicators, modems, and splitters. For these purposes, you can effectively use RIP-24 isp.06, converter modules MP isp.02 and a switching protection unit BZK. The ability to install rechargeable batteries with a capacity of 2x40 Ah in the RIP-24 isp.06 allows you to repeatedly increase the operating time of the system in the absence of mains voltage compared to other power supplies. The MP module isp.02 converts the 24 V voltage to the required level: 3.3; 5; 7.5; 9; 12 V. The UPC protects each power bus separately, i.e. Malfunctions in one of the devices will not affect the performance of the remaining equipment.

Access control and management systems are often found in complex structures or in institutions that require increased system security. ACS is very convenient because it controls and controls access automatically.

When directly choosing a system, you need to be based on the degree of secrecy and importance of the building, its area, and also understand what requirements are put forward for the device (access control and management, which type must be carried out at the facility). There are both complex and standard (simple) automated systems.

Installation of access control systems must be entrusted to professionals, since the scope of work requires not only mechanical installation, but also equipment programming. Plus, once a year or if it breaks down, you need to think about servicing the devices.

General concepts and requirements

An access control system is not only technical and software devices, but also organizational means through which the attendance of a building is regulated.

Access control systems have certain requirements:

  1. Control over the movements of personnel/visitors and control of entrance to premises. This refers to a card or key with which the device could identify a person.
  2. Organization of enterprise (complex) security. The access control and management system, when installed together with video surveillance and fire alarms, jointly ensures security of the territory. This allows you to record unauthorized entry into the premises, damage to property, etc. In an emergency, this makes it possible to leave the premises without hindrance.
  3. Organization of timesheets (registration) of working time. The device analyzes the time of arrival/departure of employees at the site or direct place of work.

General provisions for use

An access control system consists of many complex elements and parts that have certain requirements. Basically, an access control system consists of a controller, identifiers, readers, as well as zones, levels and access points. Depending on the degree of quality and, accordingly, quantity, the reliability of the structure’s security, personnel control and the functionality of the system as a whole depends.

Access control system elements:

  1. Purpose of the controller. This is a device that allows or denies the passage of personnel/visitors when they present a pass or enter a PIN code. Alternatively, the equipment can block the path using auxiliary parts. Controllers (network) operate on the same network, and direct control and access control are defined under one (several) computers. The requirements for such computers are high power and installation of special software.
  2. Purpose of identifiers. These are special identification elements of the system. In other words, it is a card, electronic key, PIN code, key fob or biometric data (retina scan, fingerprints, etc.). Moreover, each identifier is assigned access requirements of different levels. Information about personnel (employee) is pre-entered into a common database.
  3. Purpose of the reader. This is a device that reads information from the identifier and transmits it to the controller.
  4. An access point is an ACS object on which the controller and reader are located. In other words, a checkpoint: a checkpoint, a door, a barrier, a turnstile, a gate, etc.
  5. An access zone is also an object of an access control system, but divided into points. These points can be located throughout the structure. Zones and points work together. They're counting work time and on occasion they prohibit repeated passage.
  6. Access level is the requirements for access to a particular premises on an individual basis. That is, the same person can enter the premises different classifications or have permission to enter only one of the two.
  7. Software is the system elements that control and manage access.

Automated control system

Principle of operation

An automated access control system, depending on the installer’s requirements, may have several operating principles, which directly affects the choice of installing a particular system. The simplest devices have standard set, which controls and manages access, more complex - includes types of several modes. The functions of more complex systems include: prohibition of repeated passage, simultaneous entry into the premises of two or more employees, passage with confirmation, double identification, closed and open modes.

The following types of system operation are distinguished:

  1. Standard.
    Action plan:
    • staff/visitor approaches the access point where the controller and readers are located;
    • enters/attaches the identifier to the reader;
    • the controller considers (makes a decision) to allow or deny entry to the employee, records the time and identity, transfers it to the computer and stores the information.
  2. Re-entry prohibited.
    The scheme is used so that the identifier cannot be used in another access zone if the employee has not left the previous one. There are several modes: strict (complete ban), temporary (ban for some time) and soft (logging the fact of violation).
  3. Two or more employees entering the facility at the same time.
    The scheme applied to this type:
    • one of the employees brings/introduces the identifier to the controller;
    • the second employee brings/enters his/her ID;
    • the controller considers whether to open access or not;
    • if the controller, reading information about the level level, detects that one of the employees does not have permission, access is denied.
  4. Passage with confirmation.
    In this case, one of the employees confirms the entrance to the premises of the second. Access control with confirmation can be carried out by an identifier or a special button. This function is supported by the “C 2 000-2” controller.
  5. Double identification.
    For example, the first time the identifier is used with a card, and the second time with a password. A certain period of time can be set for entering the second identifier.
  6. Closed access mode.
    The system device can be put into the “prohibition of entry into any room” phase for a fixed time or forever for a specific employee or all personnel (RS-485 command).
  7. Open access mode. The function means that passage through the point is open without presenting an identifier.

Definition of species

There are three types of access control systems: standalone, network and wireless.

An autonomous device, like a network one, provides access to an object (possibly several), but the area of ​​such a structure is often small. The requirements for systems of this type are that the controller be autonomous, that is, not connected to others and not controlled by a computer. But at the same time, the device must have its own minimum database.

In this case, the access point has a latch or electronic lock, and the identifier is often a card. The operating diagram of the device has minimum requirements: when entering a card, when leaving - a motion sensor or a special button. This is defined as standard type work with the functions of closed and open modes. An autonomous access control and management system, in comparison with a network analogue, is lower in cost. Also, the automated system does not require laying a large number of cables.

The device requirements do not include reporting of working hours, transmission of any information, and the device is not remotely controlled. Autonomous type access control and management is recommended to be purchased with a reader that is remote from the controller and has a backup power supply.

Autonomous systems diagram

Network ACS are mainly installed on large industrial facilities and other structures where there are a large number of workers. In such cases, turnstiles or gateways are often used, since access control and management is required to a higher degree. Remote identifiers are often used that read information from a distance.

The requirements for networked systems are much greater than for standalone ones. Often such a device has a wireless connection or a large number of cables, several computers, etc. Control and management of access to premises is carried out using double identification or confirmation mode. The network device reports on the time and location of personnel, can be controlled remotely and provide various information.

Such complex systems have several types of work:

  • simultaneous passage of two or more employees;
  • entrance to the premises with confirmation;
  • double identification;
  • prohibition on re-entry;
  • simultaneous entry of two or more employees into the premises;
  • passage with confirmation;
  • double identification;
  • closed and open modes.

Diagram for network systems

Wireless system

Currently, only SALTO is represented in Russia and supplies wireless access control systems. The advantages of this type of equipment are obvious: no wires during installation. Installation is convenient for companies that do not want or cannot install wires to the equipment, for example, a hotel complex with expensive interior decoration. The disadvantages include the possible loss of a channel during data transmission, but the manufacturer claims that the wireless network operates over a separate, unlicensed IEEE 802.15.04, 2.4 Ghz channel protected by a 128-bit key, which guarantees system stability.

The SALTO WIRELESS wireless access control system allows you to monitor the premises in real time. The equipment set consists of 4 components: electronic locks, gateways, repeaters and the SALTO software platform. All electronics are housed in electronic locks. They are compatible with most lock standards around the world. Therefore, it is enough to simply remove the handles and install new locks, which automatically become not only an access control system, but also an access point for the Internet (the latest innovation).

Command and control systems have many specifications. The choice of system depends not only on the type of operation, but also on the principle (stand-alone or networked). Requirements for such devices are put forward depending on the number of personnel, the area of ​​the structure, and the importance of the facility. The main criteria when choosing equipment are standalone or network support. The scheme of work, which differs significantly. Standalone access control systems are cheaper and easier to install, while network access control systems are more expensive. But a network device also has more capabilities: it generates reports, stores a large amount of information and is controlled by a computer. To fully ensure security, ACS is installed with video surveillance and systems fire alarm.

Access control and management system (ACS) - a single organized structure technical means and safety measures ensuring full control and registration of entry and exit points from premises, allowing to track the movement of people or vehicles in a protected facility. Access control ensures integrity and availability, not only for valuable information contained on physical media, but also guarantees security for guests and employees of the enterprise. Installing this system is an integral part of any organization that wants to increase the level of security and reduce the cost of organizational security measures.

Scope of application of ACS

ACS help protect against unauthorized entry into a facility and can be used in:

  • public transport (metro, tram, trolleybus, etc.);
  • educational structures (schools, universities, etc.);
  • offices and enterprises;
  • shopping centers;
  • banks;
  • parking for vehicles;
  • residential complexes or private houses;
  • places of leisure (stadiums, museums, concert halls, cinemas).

Functions, tasks and goals that are achieved using access control systems

  • control of access to the protected area (restriction or permits);
  • identification and authentication of a person having access and admission to a protected area;
  • employee time tracking;
  • recording the time of employees’ presence (time of arrival and departure);
  • control over the movement of personnel from one protected facility to another;
  • registration and notification of illegal stay in the protected territory;
  • interaction, if any, with other security devices (video surveillance, fire and burglar alarms).

Types of access control systems

There are three types:

  • autonomous control;
  • network control;
  • their joint work (combinations of two methods).

Controls that are easy to operate do not require a controller, cable lines, operator control. Due to the fact that this type is relatively cheap, it also has a number of disadvantages: there is no ability to generate reports, monitor employee work time, transmit information received about access or illegal entry, and there is no remote control.

Autonomous systems limit access to a protected area (entrance, office, warehouse). The type is implemented on the basis of an independent controller located indoors and a reading device (for identification) located outside. A person can leave the premises by pressing the exit button or also using a reader.

To ensure complete security, when choosing and installing autonomous systems, you should keep in mind that:

  • in case of power outages, the controller must be equipped with a backup source;
  • the reader must have a vandal-proof housing for protection;
  • the wires through which the controller and reader communicate, regulating the ability to open and close the lock, should not be accessible outside the protected object, i.e. outside.

They are more expensive, and therefore provide a better and more effective level of security for the facility. Management goes through the controller, which analyzes the information transmitted by identification devices. IN in this case, it is possible to fully control access and admission to the facility, create reports on visits to the territory by employees and visitors, and keep track of staff time. Network access control systems can also integrate with other security devices (video surveillance, burglar and fire alarms).

Since the system is controlled through a central computer, this gives large enterprises a number of advantages, since it allows you to control dozens of doors without much difficulty. It is worth using a network access control system if:

  • you need to enter various access privileges for a group of users;
  • it is necessary to obtain information about personnel (identity of the employee, time of entry, exit and presence at certain points);
  • it is necessary to establish mutual work with other sources of security at the site.

In certain cases, due to the impossibility of laying certain communications, lack of budget, etc. Together with network access control systems they can use wireless technologies, such as:

  • Wi-Fi - the peculiarity of this channel is its fairly wide coverage area (hundreds of meters), which will be relevant for objects with a large territory;
  • GSM - allows you to cover the entire protected area;
  • Bluetooth is essentially an analogue of Ethernet, but there is no need to lay communications for the interaction of system components.

Each of the systems has its place and is effective in its own way for protecting the protected area. Which one to choose depends on many factors that need to be fully analyzed and taken into account.

ACS devices and equipment

From the simplest (with access through one door to enter and exit) to the most complex (with dozens of objects, rooms, entrances and exits), access control can contain various modifications and configurations. One way or another, each system necessarily contains:

Access restriction equipment

Installed on a passage or driveway of a protected area:

  • turnstiles - installed in those places where it is necessary to carry out controlled passage of people (office, public transport, etc.). Turnstiles are distinguished:
  1. waist;
  2. full height.
  • barriers and gates - installed at the entrance to the protected territory of the organization, in car parks, on private territory. Some of the requirements:
  1. good resistance to weather changes;
  2. possibility of remote control.
  • airlock cabins - used in facilities with increased security measures. There are two types:
  1. vestibule-type gateways (a person enters the 1st door and finds himself in a kind of vestibule. Presents a personal identifier (biometric parameters: retina, fingerprint, voice), personal identification, and only if they match, the 2nd door opens in front of him, otherwise, the person remains locked in a room between two doors until the circumstances are clarified);
  2. rotant gateways (similar to the first method, only it has a higher throughput, since turnstiles are used instead of doors).
  • bollards are road poles that can be lowered and raised if necessary, thereby providing access or blocking unauthorized vehicle access to a protected facility.

Access identification equipment

Identification of a person is carried out using a reading device that receives and processes information contained on a special medium.

Identification devices are distinguished by type:

  • magnetic (cards with magnetic details or Wiegand technology);
  • electronic (corresponding keys, distance cards);
  • optical (special tags, cards with bar codes);
  • acoustic (transmission using encoded sound signal);
  • biometric (fingerprints, face shape, retina);
  • combined (not one, but a number of the technologies described above are used).

ID readers distinguish between:

  • contact (by pressing buttons on the keyboard, directly applying a key, turning mechanisms);
  • contactless (by bringing the identification device at a certain distance to the reader);
  • combined.

Controller

The entire system requires a central computer (controller), which will collect, analyze and store information from identification devices. The identifier provided by a person is analyzed by the PC, compared with information stored in memory and, accordingly, the controller will decide who is granted access and who will not receive it for any reason. He also manages security systems, if any were provided: video surveillance, burglar and fire alarms.

Auxiliary devices and equipment

To ensure the installation of a full-fledged access control system and the interaction of the system with each other, auxiliary elements will also be required. These include:

  • cable;
  • medium converters;
  • mounting hardware;
  • power supplies (batteries, uninterruptible power supplies);
  • door closers;
  • sensors (reed switches, motion);
  • exit buttons;
  • CCTV Cameras;
  • detectors (security and fire alarm devices);
  • software.

ACS maintenance

In order for the access control and management system to ensure the most efficient operation of the enterprise security system, when carrying out maintenance of the access control system, it is necessary to take into account and perform:

  • checking ACS for compliance regulatory requirements;
  • software configuration and diagnostics;
  • inspection of mechanical and electrical equipment;
  • detection and analysis of false positives, subsequently eliminating them;
  • checking the functioning of autonomous power supplies;
  • Periodic updating of identification and reading devices.

Installation and installation of access control and management system

Installation of ACS implies:

  • placement of cables on site;
  • installation of access restriction equipment (turnstiles, barriers, gateways, bollards, etc.);
  • introduction of identifier reading devices;
  • supplying the facility with a controller (central computer);
  • software installation (if necessary);
  • checking and analyzing the functioning of the system;
  • working with the organization’s personnel;
  • integration with other types of security at the facility (if necessary);

ACS price

The price of an access control system can start from several thousand rubles and end in millions. The cost of installing an access control system is one of the issues that arises when there is a desire and need to use an access control and management system. There is no single price list; there are many factors that are taken into account. In particular:

  • it is necessary to take into account the requirements and wishes of the customer;
  • draw up technical specifications;
  • perform an analysis of the feasibility of installing certain protection devices;
  • assess the scale of the protected area requiring the installation of access control systems and many other details.

Conclusion

In the field of security, ACS is one of the most important and necessary elements. It makes it possible to provide full automated control in a protected area. With due attention and configuration, the system will allow you to continuously protect the required object, 24 hours a day, 7 days a week. In this regard, the choice of access control systems must be approached responsibly and always make informed decisions regarding whether the installation of a particular system is advisable.

type of mounted system

A significant part of the system installation cost is station equipment, controllers, readers and software. The choice of system is made based on customer requirements, the problem being solved and the number of access points

requirements for actuators

The cheapest option is to install electromagnetic locks and tripod turnstiles. If it is necessary to ensure the secrecy of locking devices, installation of integrated electromechanical latches or business class pedestal turnstiles, then the cost of installation increases

method of laying cables to actuators

ACS readers are usually mounted on the wall, turnstiles are on the floor, it is also necessary to lay cables to exit buttons, door sensors, electromagnetic locks. If there are requirements for concealed wiring, the cost of installation may increase due to the need to perform finishing works. The cheapest way is to lay the cable in plastic cable channels, or to lay the cable at the stage of construction and finishing work.

Unimax specialists will help you find the optimal solution in terms of cost and functionality. Great experience and knowledge of modern developments allow us to offer the best value.

Loading...
Top