关于访问控制系统
2015-08-14
当门打开时,RFID读卡器再次重启,电源指示灯变暗。
1.检查两个读卡器和电锁都共享相同的电流
2.不要与其他单位或设备共享电流,以避免干扰。
当感应到卡而锁没有解锁?
1.检查设备的电源,如果面板的电源亮(红色)。
2.如果RFID卡刷卡OK亮(绿色),检查电锁的连接和电源。
3.果RFID卡刷卡亮(黄色)。这是因为卡未注册的反应。
4.连续闪灯。删除该RFID卡,然后再试一次。
5.检查门开模式(设置为RFID模式)。
6.如果刷卡灯没有回应,卡故障或卡的格式错误。
访问系统通过密码进入,但无法进入设置模式的各功能的选择
1.系统密码不完整输入,请检查是否正确的格式“*#XXXX”(如系统密码XXXX)需要再次手动输入。
2.System password has been changed. Inquirereader’s parameterto get the password if it is networking reader. Contact your nearby agent orreturn to the manufacturer if it is stand-alone reader.
3.Bad wire arrangement which might causeshort circuit of the PC board. Check the power supply and the control wires inorder to avoid the wires pressing on the PC board causing bad contact, shortcircuit and interference.
4.Strong interference from other equipmentsor same type unit caused the new unit is unable to enter Setting Mode or slowresponse from the keypad. Move the new unit to other place to test again
How to stop anti-damage activation or duress alarm activation?
1.RFID the card and open the door asregular basis again to turn it off.
2.Check the activation of the alarm forsecurity purposes.
3.When the alarm is still on and thenetwork software shows the unit is being tampered which means the anti-tamperswitch is not closely mounted onto the wall.
AbnormalRFID response from the reader (wrong Beep sound).
1.Check if any unregistered cards nearby.
2.Do not share the current with otherreaders or equipments to avoid interference.
3.Increase the distance of the readers toavoid interference with each other if there are more than one reader nearby.
Readeris unable to read card, no response from the keypad and unable to enter settingmode.
1.Check the power supply or restart itagain.
2.Check if diodes are loaded as instructedin the manual if the electric lock is functional after restarting.
3.Please contact your nearest agent orreturn to the manufacturer for testing if all of the above solutions are unableto solve the problem.
What is Access Control System?
Access control system refers to thepractice of restricting entrance to a property, a building, or a room toauthorized persons. Physical access control can be achieved by a human (aguard, bouncer, or receptionist), through mechanical means such as locks andkeys, or through technological means such as access control systems.
Physical access control is a matter of who,where, and when. An access control system determines who is allowed to enter orexit, where they are allowed to exit or enter, and when they are allowed toenter or exit.
Historically this was partiallyaccomplished through keys and locks. When a door is locked only someone with akey can enter through the door depending on how the lock is configured. However. . .
Mechanical locks and keys do not allowrestriction of the key holder to specific times or dates.
Mechanical locks and keys do not providerecords of the key used on any specific door and the keys can be easily copiedor transferred to an unauthorized person.
When a mechanical key is lost or the keyholder is no longer authorized to use the protected area, the locks must bere-keyed.
Electronic access control uses computers tosolve the limitations of mechanical locks and keys. A wide range of credentialscan be used to replace mechanical keys.
The electronic access control system grantsaccess based on the credential presented.
When access is granted, the door isunlocked for a predetermined time and the transaction is recorded.
When access is refused, the door remainslocked and the attempted access is recorded.
The system will also monitor the door and alarmif the door is forced open or held open too long after being unlocked.
How the Access Control System works?
When a credential (card, password,biometric etc.) is presented to a reader, the reader sends the credential’s information, usually a number, toa control panel / processor. The control panel compares the credential's numberto an access control list, grants or denies the presented request, and sends atransaction log to a database. When access is denied based on the accesscontrol list, the door remains locked. If there is a match between thecredential and the access control list, the control panel operates a relay thatin turn unlocks the door. The control panel also ignores a door open signal toprevent an alarm. Often the reader provides feedback, such as a flashing redLED for an access denied and a flashing green LED for an access granted.
The above description illustrates a singlefactor transaction. Credentials can be passed around, thus subverting theaccess control list. For example, Alice has access rights to the server roombut Bob does not. Alice either gives Bob her credential or Bob takes it; he nowhas access to the server room. To prevent this, two-factor authentication canbe used. In a two factor transaction, the presented credential and a secondfactor are needed for access to be granted; another factor can be a PIN, asecond credential, operator intervention, or a biometric input.
There are three types (factors) ofauthenticating information:
something the user knows, e.g. a password,pass-phrase or PIN
something the user has, such as smart card
something the user is, such as fingerprint,verified by biometric measurement
Passwords are a common means of verifying auser's identity before access is given to information systems. In addition, afourth factor of authentication is now recognized: someone you know, whereanother person who knows you can provide a human element of authentication insituations where systems have been set up to allow for such scenarios. Forexample, a user may have their password, but have forgotten their smart card.In such a scenario, if the user is known to designated cohorts, the cohorts mayprovide their smart card and password in combination with the extant factor ofthe user in question and thus provide two factors for the user with missingcredential, and three factors overall to allow access.