Card reader technology improves access control development

<

Card reader technology improves access control development Access control equipment has always existed independently as a gate security management function. With the integration of integration and integration concepts in recent years, diversification has become one of the major development directions of the access control market. In the development of the access control system in these two years, the development and introduction of functions has become a means for manufacturers to build core competitiveness. This article gives a brief introduction to the development of access control readers.

Access control system skills research and development are valued in the security field in the past two years, the network has become the main wind direction of the security market. With the rapid application of network monitoring, the network has quickly spread to alarm, buildings, and all corners of access control. As a control method that makes the control and maintenance of the access control more convenient, the networked application greatly enhances the controllability of the user's access control or time attendance system. Whether it is in the equipment detection, setting, or the maintenance and maintenance of some functions, they have achieved very convenient results. As an important promoter of the entire security industry transformation, networking is bound to play a greater role in the future application of security products. For the access control, it will bring more flexible, safe and timely control to the equipment.

In the past two years, although the real estate market is facing a difficult winter, the application of the access control market has not shown as much impact as the smart home. The market remains at a high level. However, domestic manufacturers did not fully enjoy the benefits brought by the market.

At present, in the R&D of the market, foreign companies increasingly value the R&D and innovation of the access control system skills, while local companies focus on marketing, although such models can be quickly adapted to market demands, but due to the Weakness makes it difficult for domestic manufacturers to truly enjoy a comprehensive market profit. There is news on the Internet that many of today's major overseas companies are the "one-card" access control trivial, their director is costly, easy to install, but because of the lack of product standards and industry norms, poor resolution, low-cost negotiations and other topics More and more. Therefore, the future of our country's access control companies should also pay more attention to upgrading the level of technology, or more will be the foil of international brands.

The improvement of reader technology into the development direction of access control from the derailment process of traditional access control can reflect some future trends.

First, the robustness of reader technology is constantly improving. Since tape swiping is bound to cause wear, non-contact technology can avoid this problem. The life of the card is limited due to the material of the card being worn and worn out, or needing to be renewed or reissued. With the advancement of technology, new passes will be biometrics, which will solve the problem of card life. When the existing limitations of some old systems are eliminated, the function of biometric systems will inevitably increase. In order to create this degeneration, biometric identification must be integrated into the access control system.

The second trend of access control development is the decentralized control function. In view of locks and keys, control is given to the authorizer. Once the system is electronic, its control will also be distributed from the central security control system to the "smart" controller through a simple reader interface. This trend has been extended by further embedding control functions in card readers and even in cards. Smart cards are of great significance to the access control industry. They can store large amounts of data, can be read and updated, can provide advanced encryption and passwords to protect the stored data, and can also provide processing power through computational programs.

There may be a new specification for the access control system - storing biometric and access control data in the card and encrypting it so that only the local reader can use the data. Biometrics will be used to interpret the data in Cary and get permission to pass it. The reader must connect to the authorization database in some way and update the card's information as needed.

Data communications have evolved from scratch, from mechanical lock systems to wired systems using proprietary protocols to the use of network standard communication protocol systems. The greater the development of data communications, the less reliance on the equipment connection cable. Wireless communications are becoming more and more popular and network services will become the cornerstone of future database dissemination information systems.

The reliability of the access control card reader is not bragging about the port protection: because the card reader will involve wiring during the installation (power cables, signal cables, etc., at least 4 to 6, and as many as ten), during the construction process, The wrong line is unavoidable. If there is no protection for the port, causing damage to the card reader, it will cause a lot of trouble for the contractor. Therefore, the product must choose the access control card reader with port protection function. The identification method is to perform the reverse connection of the power line in the case of 12V, wrong connection, short circuit of the power supply and the signal line, etc. If it can last for more than 30 minutes reverse connection, wrong connection, the device card reader is not damaged, then the quality It's fine.

Wide-voltage design (driving capability): Considering the problem of voltage drop of the power supply when considering the long-distance wiring of the card reader, if it is not designed for wide voltage, it is likely to be in actual projects (such as The reader is 100 meters away from the controller. The reader is not working properly. In general, the reader works normally with a voltage of 7~30V, and its voltage adaption range is relatively perfect. The test method is also very simple, directly use the adjustable power supply to access the card reader power cord to test. Or use a 100-meter cable directly to connect the read head and controller to see if it works properly.

Anti-interference: mainly refers to some occasions, the reader is inevitably installed on the surface of metal objects (iron doors, stainless steel doors), there is a case of access to the card, in order to install the beautiful, in and out of the read head Needs "back-to-back" installation. If it is a product with weak anti-interference, when installing on the surface of metal objects, the reading distance will be significantly reduced, even if the card is not read. However, if products with “back-to-back” installation are not strong enough to interfere, it is very likely that they will swipe their cards when they enter the door, and the card readers will sense them. This is very inconvenient to use. The method of judging the anti-jamming performance is very simple. When the card reader is selected, look for a piece of iron plate and attach the card reader to the iron plate to see if there is a change in the reading distance. It is recommended to select the read head test of the IC. (IC reader distance is generally 3 ~ 5CM). The other is to connect two card readers, and place the two card readers side by side at a distance of no more than 5 CM. Then, each card reader is swiped to see if it is a "serial number".

The reader design emphasizes security and stability. The reader in the access control system is the most peripheral device. It bears a series of functions such as reading card information, man-machine interface interaction, and data verification upload. Its importance is self-evident, so readers The design of the device should have the following features.

Security: Security is the basis of card readers, including the security of card readers, the safety of communication methods, anti-violence design, dust and waterproof design, tamper design, and flood control mechanism design.

Stability: The reader's stability refers to the reader's ability to work stably. The reader's stability will be an integral part of the system's stability, including: wide temperature design, electromagnetic compatibility, and lightning protection.

Beautiful appearance and harmonious environment: The development trend of readers shows that the concept of specifically designing readers based on different use environments has gradually entered the hearts of people. Different applications, different user groups, different architectural styles and other complex needs introduce more detailed industrial designs to readers. The readers are no longer just the vanguard of the one-card system, but have become the entire application. The natural, harmonious part of the scene.

Human-machine interface friendliness: With the continuous development of reader technology, the functions provided by the card reader simply read out the card number and upload it to the controller. However, to add more friendly design, it is necessary to provide a variety of user-friendly features. And operation methods.

The economy and convenience of installation and commissioning: In addition to providing users with safe, stable use and beautiful and harmonious appearance, the success of the design of the card reader is still largely reflected in the economy and convenience of installation and debugging. . For example: pay attention to the installation hole position, use full connector design, economical and flexible wiring, input/output port design, and so on.

Energy saving and environmental protection design: Energy saving and environmental protection will be an important trend in the development of readers in the future, including low-power design and electromagnetic radiation for reducing energy consumption. The low-power design needs to start from the software and hardware aspects, such as from the power supply voltage, microcontroller structure, system clock design and low-power modes and other aspects of comprehensive design, while optimizing the software design to minimize the amount of CPU computing, control I The intermittent use of the /O module allows the CPU to sleep for most of the time (90%), greatly reducing power consumption.

Split Joint Mosaic

Split Joint Mosaic,Split Joint Mosaic Tile,White Split Joint Mosaic,Glass Marble Mixed Split Joint Mosaic

Foshan Guanyu Group , http://www.guanyu-group.com