Access control system is a set of elements that to a large extent combines surveillance software with executive devices to perform specific activities and their registration in a database. Each activity carried out by a connected device under the control of such a system is recorded and processed in order to ensure the security of the supported access application.

The hardware components of the access control system are interface converters translating Ethernet interface signals in both directions to a CAN interface. Converters connect to CAN via the interface door controllers controlling in turn via the RS-232, 1-Wire or WIEGAND interface RFID proximity readers, readers granted on the cards granted to users - and granted by the access control system - access rights for given doors or selected partitions. Therefore, it is obvious that without proper authorization we are not able to get to the room. This is the essence of access control, thanks to which property administrators and managers can grant access rights appropriate for each user in the system. However, if the authorization is successful, the proximity card reader using the relay output, controlling the electric lock, electric lock or other device such as: turnstile, gate, barrier - will allow the user to enter the given zone. Linking a specific user to an individual access key (card, key ring, password) reveals another valuable property of the access control system, namely the possibility of recording (recording) of working time - the so-called RCP . As all activities are carried out using individual access rights, there is a simple possibility of registering data on the presence of data of persons in a given zone - in a warehouse, office, parking lot, school, kindergarten or other places where recording the presence of a person in a given place is important to his safety or to calculate his work efficiency.

How does the access control system work?

Security of access control systems

For an access control system to be reliable it is very important that it is resistant to all kinds of tampering. Hence, among others, adding mechanisms to increase its security by implementing event memory in readers, which will record data when the system unexpectedly goes offline in the event of e.g. power failure, infrastructure failure resulting from sabotage - unauthorized interference. At the moment of regaining efficiency and establishing a connection, the event memory of readers will be sent to the supervisory application. The event memory implemented in devices makes access control system can operate autonomously. As proximity readers are the first and visible barrier of the access control system, they can become the object of a tampering test, therefore they must be equipped with a system that detects unauthorized opening through, among others, a built-in anti-tampering contact. tamper , which is pressed by the housing during normal operation, and is released in the event of unauthorized opening by activating the alarm system.

A valuable feature that increases security is the so-called a anti-passback function that prevents you from re-entering a given zone without leaving it first - it prevents you from using the same authentication again to enter the zone. There are two variants of the anti-passback function in the form of a hard version - when access is categorically denied (access data), and soft when access is granted, but this is immediately recorded in the system, including notifying the appropriate person about the unusual situation of repeated use of the same certificate to enter a given zone without first leaving it.

Cooperation with Netronix is always the right decision!

Without stopping, we change with the changing market.
We offer our clients not only ready-made products, but also individual solutions.