Q : What are the advantages and disadvantages of each kinds of access control? A : The identification system can be divided into two types: “digital” and “biotechnology”. Biotechnology: There are several forms of biometric identification employed in access control: fingerprint, hand geometry, iris and face recognition. The use of biometric technology significantly increases security level of systems because it eliminates such problems as lost, stolen or loaned ID cards, and forgotten or guessed Pins. These expensive systems are used in high confidential areas.![]() A :Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.
Q :How many frequency bands used in RFID access control? A :There are three types of frequency bands used in RFID access control: 125 KHz, 13.56 MHz and 2.54GHz. A : In general, the distance between a card and the reader is about 5~20cm. The inductive distance is also influenced by other factors (different shapes, circuit size, capacitor quality, etc). However, there is no relationship between frequency band and inductive distance .
Q : Are there any additional functions of access control? A :The most important additional functions of access control are as follows:
Q : How’s the combination of access control and other system (monitoring system, anti-theft system, fire-fighting system, etc.)? A :The monitoring system uses access control lists to control what services users are allowed to use. If any abnormal situations occur, the anti-theft system will alert. When the firefighting system detects any emergency, the access control system automatically opens emergency exits to allow for faster evacuation.
Q : What is the basic equipment of access control system? A : The four basic equipment of access control system are identification system, electric lock, power supply and request-to-exit devices. Identification system When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted. Electric locks Power supply An uninterruptible power supply (UPS), also known as a battery back-up, provides emergency power and, depending on the topology, line regulation as well to connected equipment by supplying power from a separate source when utility power is not available. Request-to-exit devices Request-to-exit devices can be a pushbutton or a motion detector. When the button is pushed or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened.
Q :What places are suitable for using these electric locks? A :
Q : What is electric dropbolt? What is electric strike? A : Electric dropbolt locks are commonly used locks which are compatible with virtually any access control system and are available in fail- safe and fail- security configurations. Electric strikes are designed for in-swinging doors; these units are suitable for use with most hollow metal door frames. Their stainless steel construction ensures strength and long life.![]() Q :What is electromagnetic lock? A : Electromagnetic locks are designed to take advantage of the physics behind electromagnetism. An electromagnetic lock comprises two main parts, an armature plate made of a magnetic material and a metal plate surrounded by a coil of wire which can be magnetized. When current is passed though the coil, the metal plate becomes magnetized and strongly attracts the armature, locking the door.
A : The shear lock comprises of a lock bolt and a shear keeper and operates through use of an electromagnet. To lock the door, the armature plate with its shear keeper is attracted to the electromagnet that has the lock bolt. The lock bolt fills the holes in the shear keeper resulting in a mechanical locking action. This lock has a high physical shear holding force.
Q : What is electromechanical lock? A : Electromechanical Lock has a special lock bolt. When the door is closed, the lock bolt will automatically deadlocks which it provides enhanced security and greater convenience. If the access control system is not opened for the reasons of that the proximity reader is out of order or that unexpected accident happens, the user has the alternative of using the key cylinder.
Q : Does all access control system are low-power products? A : Yes, the access control is one of low-power engineering industries. Low-power electronics means that the consumption of electric power is deliberately low and some dangerous factors can be avoided, e.g. high-voltage power. However, the access control system is also suitable for high-voltage and heavy loaded equipment, e.g. roll-up door.
Q :How’s the anti-theft effect of access control system? A : The main features of access control system are promptness, convenience and record. The anti-theft system should be installed additionally. The separation design readers are recommended to prevent intrusion, i.e. the plate and reader are installed separately. Some controller are installed the intrusion detection system. If the door is opened by unauthorized person, the anti-theft system will alarm.
Q : What are the notifications of installing the electric locks? A : Door opening direction:in-swing, out-swing, double-swing, etc. Material of door frame:metal (aluminum alloy, stainless steel), wood, glass, etc. The crack between door and frame Height of door:the height and weight of door Quantity of door leaf: single or double Passages function: emergency exit, warehouse door, aisle, etc Other requirements
Q : How’s the importance of electric lock in access control system? A : The electric locks are passive components of access control system. However, inappropriate installation causes inconvenient usage and injury.
Q : What is fail-safe? What is fail-secure? A :Fail-secure, also called fail-locked or non-fail safe. In this configuration, applying electrical current to the strike will cause it to open. In this configuration, the strike would remain locked in a power failure, but typically the knob can still be used to open the door from the inside for egress from the secure side. These units can be powered by AC which will cause the unit to "buzz", or DC power which will offer silent operation, except for a "click" while the unit releases. Fail-safe, also called fail-open. In this configuration, applying electrical current to the strike will cause it to lock. In this configuration, it operates the same as a magnetic lock would. If there is a power failure, the door would open merely by being pushed/pulled open. Fail safe units are always run using DC power.![]()
Q : What kind of electric lock is better? Fail-safe or fail secure? A : Generally, the fail safe is suitable for places of safety consideration. In case of emergency, the doors will be opened for escaping. The fail secure is for places of goods storage e.g. warehouse.
Q : If I installed the fail-safe type, would the entire door opened when power failure? A : It may be required the UPS (Uninterruptible Power Supply) to remain locked during the power failure. For example: Installing the accumulator into GPS -3A、PSB series can be UPS system.
Q : What is Door Position Sensor? What is Bond Status Sensor? A :Door status sensor output: Door Status Sensor will indicate the door is opened or closed status (10002DS, 10002NDS, 10020DS ...etc. White-Brown: Com.-N. C. contact, White-Orange: Com.-N. O.contact). Magnetic Bond Sensor indicates the door locked or unlocked status.
Q : What is residual magnetism? A :When an electromagnetic lock is turned on for a long period of time, it induces magnetism into its corresponding armature plate. If the power is then turned off there will be residual magnetism between the electromagnet and the armature plate. This residual magnetism leads to the door remaining held shut even when there is no power being supplied.
Q : Why the doors cannot be locked when installing electric strike on double swing door? A : The main reason is that door leaf can’t be correctly positioned. This problem results from the quality of hinge. If the hinge is not heavy enough as the door, gradually the door leaf can not be correctly positioned.
Q : Is there any replacement for changing hinge? A : The simplest way is to change the opening direction to one-way opening: in-swing, out-swing, pull inside or push outside, etc.
Q : What are the notifications of installing access control in new building? A : The low-power engineering of a building comprises the structure of building, monitoring system, access control system, etc. The construction supervisor should contact with the elevator supplier to coordinate the installation of readers. The by pass switch should be installed to cancel the control for examination. The construction supervisors should negotiate the installing position and dimension of each doors, emergency exits, windows, etc. with suppliers. The installation height of a proximity reader is 120cm. The height of proximity reader should be the same as that of the interphone. The distance between the proximity reader and interphone should be 20cm. The gate switch button should be 12cm from the door edge beside the wall and the height is 120cm. Reference A&S http://www.asmag.com.tw/
A : It’s issued by the banks, telecommunication company, home builders, etc. Smart cards can be used for identification, authentication, and data storage. The embedded Mifare card in NFC cell phone is used to do the access control through RFID induction technology. Reference A&S http://www.asmag.com.tw/
Q :What is biometric identification? A : Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Fingerprint identification:It’s an early development technology and the price is cheaper. Identification time is about 1 to 6 seconds. Today it’s applied in Mouse, laptop, PDA, access control, etc. IRIS recognition:It’s the most precise technology. A key advantage of iris recognition is its stability, or template longevity as, barring trauma, a single enrollment can last a lifetime. The only disadvantage is that it takes 7 to 10 seconds for recognition. The voice recognition,lso known as speech recognition, is widely used in Internet communication industry. Speech recognition applications include voice dialing (e.g., "Call home"), call routing (e.g., "I would like to make a collect call"), domotic appliance control and content-based spoken audio search (e.g., find a podcast where particular words were spoken), and in aircraft cockpits (usually termed Direct Voice Input). Palm vein recognition: Everyone’s palm vein is different. Comparing the palm can identify the user’s identity within 1 second. Palm vein patterns are invisible and virtually impossible to forge, making the system highly secure. Facial recognition:There are two techniques in facial recognition. One is the three-dimensional face recognition. This technique uses 3-D sensors to capture information about the shape of a face. This information is then used to identify distinctive features on the surface of a face, such as the contour of the eye sockets, nose, and chin. Reference A&S http://www.asmag.com.tw/ Q: What is electromagnetic door holder? A :The electromagnetic door holder is a fail-safe unit energized by a power supply installed on large-scale building, between fire escape doors. It is designed to allow fire and smoke doors to be held open under normal conditions, but to automatically close under their own spring return mechanism when a fire or smoke alarm system is activated. Q: What is “call point switch”? A :The call point switch, also known as emergency push button, can be allowed to activate under emergency conditions. It is typically located on the emergency exits or fire escape doors. The main function is to override the electrical locking/release devices in case of emergency. With key to replace glass or reset unit. Q: What does the color of call point switch represent? A : Red:Call points for use in fire protection systems are always red, and meet a defined color requirement according to Fire Standards. There are no other formal standards which dictate the use of particular coolers for different applications, although individual territories have adopted the generic colors for different needs. Green:Green is normally associated with Access Control Systems and Door Release Applications. Yellow:Yellow is associated with Gas Release, Extinguishing Systems or occasionally Venting Systems. White:White is used in Electrical Systems to match standard white fittings.
Q: Why should we install 2 sets or more call point switch? A : It’s a secure design. Under emergency condition, the button must be activated without any error. In order to ensure its accuracy, the emergency button is suggested to install two sets in order to prevent the breakdown. The emergency call button is part of an emergency response system. When you press the call button, an alarm system is activated. The alert system automatically contacts the security service center, opening the line of communication between the user and the response center.
A :Install Key Switch in the outside and parallel (or series) connect with the power supply and electromagnetic lock. If the electromagnetic lock is not be opened for the reasons of that the proximity reader is out of order or that unexpected accident happens, please switch N. C. or N. O. contacts by the key to compel the fail-safe(Power to Lock) or fail-secure(Power to open) electromagnetic lock opened. This is a precaution of the access control system.
A :The door loops are wire extension protector when you install on doorframe to the door. It gives attractive and neat result for the wiring. Door loops can be chosen depending on the type (and size) of door on site.
Q: What kind of lock could be used with electric strike? A :The electric strike is recommended for spring latch bolt application only and not for use with dead bolts. The ANSI sized electric strikes are compatible with locksets with deep lock keepers, e.g. cylinder locks are suggested to be used with ANSI sized electric strikes.
|
Copyright © 2008 Gianni Industries, Inc. All Rights Reserved.