2[1].英文翻译格式和要求

发布时间:2012-04-18 17:20:35   来源:文档文库   
字号:

Access control system principle

The field of national security and mainstream providers, attendance systems, access control card system. The best solutions and attentive service! For office integrated security solutions provide better security protection.

Access control system is only in recent years in domestic widely used another high-tech security is one of the facilities, has become a symbol of modern architecture of the intelligent. In more and more attention to business intelligence and security today, to import some important organs, scientific research laboratories, archives, as well as related to the beneficial to the people's livelihood utilities control center, civil aviaton airport and other places of the staff, to import authorization control.

Economic growth is sometimes triggered by the occurrence of crime, the pursuit of security in modern buildings on the security system requirements are also getting higher and higher. Building security system includes not only the closed-circuit television and anti-theft alarm, in addition also includes some door locks, anti-theft doors, anti-theft network and security personnel, the people can not meet the increasing safety requirements.

Security management function, can be set using the permissions and access time, can and will use the person's name, age, job, photographs of up to 18content data is input to the computer, convenient query statistics and verification of identity;

Attendance function, can according to the actual situation of staff designation classification, according to various holidays, a working day attendance record;

Patrol function, can record the patrol route, time and patrol point events such as the door is damaged, elevator fault;

Multiple access modes, you can set the door lock is not only into a long, a timing switch, multiple functions and various combinations of;

Emergency and statistical functions, this system can be displayed on the computer of a designated cardholder of the physical location, to facilitate the timely contact. In case of fire and other emergency situations, fire doors will open automatically, facilitate the escape, access can also be opened automatically; when the illegal to import, will automatically alarm; the system also can according to customer needs, print out all kinds of statistics.

Access control system is a system of public security category. The buildings within the main zone management, import and export, elevator hall, main equipment control center computer room, valuables warehouse and other important department a passageway, installing magnetic switch, electric control lock or reader control device, central control room monitoring system using computer, multiple tasks, to the port of each channel location, traffic object and passing time in real time control or set up procedures to control, to a number of banks, finance and trade building and office building integrated public security management.

Access control system function lies in the management of population and control area, restrict unauthorized person import and specific area, and has been authorized to import more forthright in. System available induction card, fingerprint, password, as authorized identification, by controlling the machine programming, recording import person date and time, and can be matched with the alarm and closed-circuit television system to achieve optimum management. Applicable to all types of office, computer room, database, parking and storage.

Gateway access control system to take the card to replace the key in the door way. A user with one card can open multiple locks, the door lock opening can also have a time limit. If the card is lost, without replacing the lock, just from the control host cancellation. Gateway access control system is based on the import and export of access control, management and recording device for whom, when and where to detailed tracking, in order to achieve the center on the import and export of24 hours, for control, monitoring and management.

Each one of the entrances and exits of a card reader, which reads the card through the controller parameters judgement analysis: access, lock open, personnel may pass. Ban is not action and lock alarm immediately and make the appropriate records; the user can select various types of card reader: a magnetic card reader, card reader, Wei radical induction type card reader, hands-free reader, remote infrared reader, can also use digital password keyboard lock; management the software can not only to different access card reader opening time, access time for programming, but also on each piece of card allows access to the area, time limit to prevent people" fall into a wrong path", and can query access; according to the specific requirements of customers customized software attendance, overtime, late time statistics, times, and calculate the monthly salary, should deduct the wages and real wage; the unit leader in special personnel, can have special permissions settings, so as to achieve each entrance and each separate programming staff, unified management of the system as a whole; each movement, such as which opens, time is long, who opens the door and so on, all documented management center. Once the accident happens, these records will become strong and could not change the evidence.

System with return prevention transfer function: prevent people to enter an area, the card back to the regional foreign graph with the same card into another staff; has a staff of tracking function: in the outer door was not closed before, could not open the door; if forced the door open, malicious destruction of the card reader or the keyboard, invalid card or bad password attempts to open the door and other abnormal events, management center immediately informed and to remind the guard on duty. System startup scene searchlight, recorders and other related equipment.

Induction card characteristics

Because the induction card listed, then the user does not need to carry the key from the key from being copied, more troubles, again also need not worry about property may incur losses. Induction type signal transmitter for package form has many kinds, including card, key ring type, pen type, glass tube, Mike pen ... ... And so on, with the volume of the size difference, while the volume size is often correlated with the induction distance proportional to, in general, the use of personnel to access and parking control, in order to facilitate carrying, usually made of card type, it is commonly known as the inductive card.

Action principle:

The inductive card ( Promixity Card ) to contact card called, magnetic card in use must have " swipe" action to achieve the purpose of regulation. Usually a card with IC chip, an induction coil and capacitor components. Induction card for the transponder end, while the inductive card reader for receiving end, similar to generator, continuous transmit frequency. When the card close to the card reader sends RF rate range, card within the coil will be receiving this frequency and generate energy, the energy stored in the capacitor, when the energy reaches the excitation state, will the card IC chip are burned to send password card reader card reader identification passes, can open the door there, the brand of card reader emitted by different frequency, so the card does not have exchange and can use condition.

Set access control management system the main purpose is to guarantee the regional and area safety equipment for personnel, the reasonable flow of these critical areas, enter personnel to implement various forms of import license management, in order to limit free import. When the staff to enter the regulated area, must be at the door of the card reader card, the door can be opened. Each side of the door card reader through the control interface unit and a system controller by the monitoring terminal control. Each card according to the system settings, only within the time specified in the scope of the provisions of the door open. At the same time preventing foreign agents barge in, if someone forced the door open or work didn't close the door, a door control device sends out warning signal, monitor terminal immediately display alarm door. The design of access control system is designed to realize personnel access privilege control and access information recording.

Access control system principle

1, to take control of the exit and entrance, installed by the locking device and sensors ( such as: electronic cipher keyboard, a card reader, fingerprint reader ) is controlled by the door;

2, authorized personnel holding a valid card, or the password and his fingerprints, can open the gate control;

3, all access to information, are recorded by the computer; the computer can be modified at any time the authorized personnel import permission;

4, the system can also join the attendance system function;

System requirements

A high degree of integration with other systems: the complete linkage, including : fire alarm system, CCTV system, elevator system, information and communication systems, parking systems and building control system.

Gao Baoan: requires that the entire system performance is stable, safe and reliable, strong security.

Redundancy rate: with large capacity expansion, such as the need to expand without additional equipment, main control part, only need to increase front end equipment and field control unit.

System function

Rights management: personnel access permissions settings, change, cancel, recovery.

Storage: store staff out of date, time, number, whether illegal and other relevant information.

Centralized management function: the backstage management workstation can establish the database users, regular or real-time acquisition of each import and export import data, at the same time according to the user query, summary, classification, printing.

Abnormal alarm: illegal intrusion, destruction of door lock occurs the system will send out alarm information is transmitted to the management center.

Linkage function: may realize the fire, when a fire happens, by in the center of unified open access, can start the CCTV implementation of real-time monitoring of transport.

Access control system of microcomputer management function

System management:

This software is the function of the system all the equipment and data management, have the following content

-- equipment register

For example, in increasing controller or the card, need to register, in order to make it effective in reducing the controller card; or is lost, when the people change the failure.

-- level set

In the registered card, which can pass through those doors, which can not by. A controller can be made which card through which, not allowed by. For computer operation to set a password, to control what people can do.

-- time management

You can set certain controllers in what time may or may not allow the holder to the card at any time; which may or may not by what door.

-- database management

The system records data storage, backup, archive and reading process.

Event log: the normal operation of the system, on a variety of access events, abnormal events and the treatment methods were recorded, stored in the database, for future inquiries.

Report generation: according to the requirements of timing or randomly generate various reports. For example, you can find someone in a certain period of time in and out of a door, in a certain period of time who are the import, report generation, and can be printed out by a printer. Find out the" management"," patrol management"," meeting room management .".

Network communication : a system is not as a single system exists, it will send a message to other systems. For example, in a break-in, television monitoring system to send a message, so that the camera to monitor the situation, and video. So there must be a system for communication between a support.

Management system in addition to complete the required function, also should be beautiful, human-machine interface, so that the personnel easy *.

Access control system

Controlled door; controller; magnetic lock; the card reader and card; manual button; key; lights; and PC communication cable; the upper PC machine; industry-specific software

Access control system function

Card door : if the number is incorrect or belong to black list will be closed and the alarm

The manual button to open the door inside the door: personnel going out

Key: access control systems administrator

PC command switch door : the special case is provided by the host computer instruction door switch

The state of the door and the controlled recording information to the PC: can conveniently query

PC card management: responsible for issuing cards and sign in black list

To access the market

The traditional personal identification methods can not fully meet the modern social economic activities and social security needs. From the elimination of human unsafe factors, only not easily replaced by others, imitation, even I do not transfer the identity certificate to qualify. Therefore, from a usability, security, maturity and cost and other aspects of comprehensive comparison, along with the IT ( Information Technology ) continues to advance, with recognition technology matures, with the rapid development of computer technology, access control technology is developing rapidly, with breathtaking speed from the traditional keyboard, magnetic card to card multi function card, smart card and the direction of development. Now access control systems can even use the satellite network provides global access control service. From the access control system rapid growth speed can be seen in the product market has gradually become mature, a former alarm and monitoring products rule all the land situation, experts predict that by the recently implemented: induction of access control system of the city is a 300% annual growth rate of the amazing.

Access control technology development

Most people think that access is only a door control device, the most typical is the traditional door mounted to the keyboard controller or a magnetic card reader, and in order to obtain access to credit card. However now access control has more advanced technology and new application market, now used in access control system technology include: bar code, bar code graphics ID, magnetic, Wei radical, induction type, code, biological identification. The induction of access control and biological recognition will become the two big trends of the development of access control.

The access control system adopts the technique and can achieve different security level. For example: optical techniques applied to the bar code and graphics in ID system identification stored in the bar code and graphics information in ID; electromagnetic technology is applied to the magnetic card entrance guard system, when the cardholder brush card system will read allowed into the magnetic properties; Wei root technology is extremely clever, still belong to the category of electromagnetics; induction type technology commonly used frequency generally in110 ~ 125KHz, the frequency is strong, induction of access control system card reading distance farther, as technology continues to improve, frequency of 13.56MHz induction type entrance guard system card reading distance can reach nearly 1meters, this control system has many other applications, such as: parking field, various charges system. Of course the most secure access control system should be able to identify the biologic characteristics of human body, instead of identifying people holding object features of the system, such as : the use of human unique the biometric identification system can identify fingerprints and pupil structure, it will be the entrance guard system of the highest level, but the price is extremely expensive, difficult for the majority of users accept.

Access control system based on computer and communication mode is divided into independent access control systems and networking entrance guard system.

Independent of the type of access control system

Unable to communicate with a computer, access control permissions settings in the machine 's keyboard or the parent line of cards set. There are also some independent access control machine with liquid crystal display auxiliary keyboard do card authorization.

Independent of the type of access control system components:

Independent access control machine (including the card and control ) + open button + lock + power + card

Some also can be an external card reader realize the travel card.

Common market, an independent access control machine

Independent of the type of access control system has the advantages: cheap price, no computer knowledge of the decoration can be installed.

Independent of the type of access control system disadvantage: poor safety, because the electric lock control relay on one machine, illegal personnel without too much professional knowledge can short-circuit or destroy independent access control machine to open the door, and even some.

门禁系统原理

国内安防领域主流供应商,考勤系统,门禁系统一卡通系统等.最佳的解决方案和贴心的服务!为办公室综合安全解决方案提供更高的安全保护。

门禁系统是最近几年才在国内广泛应用的又一高科技安全设施之一,现已成为现代建筑的智能化标志之一。在越来越注重商业情报和安全的今天,对进出一些重要机关、科研实验室、档案馆、以及关系到国计民生的公用事业单位的控制中心、民航机场等场所的工作人员,给予进出授权控制。 

经济的增长有时引发犯罪的发生,对安全感的追求导致现代化楼宇对保安系统的要求也越来越高。楼宇保安系统不仅包括闭路电视及防盗报警,此外还包括一些门锁、防盗门、防盗网及保安人员等,以满足不了人们日益增加的安全要求。 
  保安管理功能,可以设置使用人的权限和进出时间,可以将使用人的姓名、年龄、职务、相片等多达18种内容的数据输入电脑中,便于查询统计及验证身份; 

考勤功能;可以根据实际情况将人员编组分类,针对各种节假日,工作日进行考勤记录; 巡更功能,可以记录保安员巡更的路线,时间以及巡更点发生的事件如房门损坏,电梯故障等; 多种门禁方式组合,可以设置门锁为只进不出,长开,定时开关等多种功能及各种组合; 

应急及统计功能,本系统可以在电脑上显示出指定持卡人所处的物理位置,便于及时联系。发生火警等紧急情况时,防火门会自动打开,便于逃生,出入口也可以自动打开;当发生非法进出时,会自动报警;本系统还可以根据客户的需要,打印出各种统计报表。 

门禁系统属公共安全管理系统范畴。在建筑物内的主要管理区、出入口、电梯厅、主要设备控制中心机房、贵重物品的库房等重要部 位的通道口,安装门磁开关、电控锁或读卡机等控制装置,由中心控制室监控,系统采用计算机多重任务的处理,能够对各通道口的位置、通行 对象及通行时间等实时进行控制或设定程序控制,适应一些银行、金融贸易楼和综合办公楼的公共安全管理。 
  门禁系统作用在于管理人群进出管制区域,限制未授权人仕进出特定区域,并使已授权者在进出上更简捷。系统可用感应卡、指纹、密码等,作为授权识别,通过控制机编程,记录进出人仕时间日期,并可配合警报及闭路电视系统以达致最佳管理。适用于各类型办公室、计算机室、数据库、停车场及仓库等。 

 出入口门禁控制系统采取以感应卡来取代用钥匙开门的方式。使用者用一张卡可以打开多把门锁, 对门锁的开启也可以有一定的时间限制。如果卡丢失了,不必更换门锁,只需将其从控制主机中注销。出入口门禁控制系统是通过对出入口的准入情况进行控制、管理和记录的设备,对何人何时在何地进行详细跟踪,以实现中心对出入口的24小时控制、*作、监视及管理。 

 每一个出入口设置一个读卡器,所读取的门禁卡参数经由控制器判断分析:准入则电锁打开,人员可自行通过。禁入则电锁不动作而且立即报警并作出相应的记录;用户可以选择各种类型的读卡器:磁卡读卡器、韦根式读卡器、感应式读卡器、免持式读卡器、遥距式红外线读卡器,也可选用数字密码键盘开锁;管理软件不仅可以对不同出入口读卡器的开启时间、准入时间进行编程,还可以对每一张门禁卡允许进入的区域、时间进行限制防止人员误入歧途,并可随时查询出入情况;可根据用户的具体要求定做考勤软件,统计加班时间、迟到时间、次数,并计算当月应得工资、应扣工资及实得工资等;对于单位领导等特别人员,可以有特殊的权限设定,从而达到对每个出入口和每个出入人员的单独编程、统一管理;对于整个系统的每个动作,如哪扇门开启,时间多长,是谁在开门等情况,管理中心全部记录在案。一旦有事故发生,这些记录将成为有力和无法更改的证据。 

 系统具有防返传功能:防止有人进入某区域后,将卡回传给区域外企图用同一张卡进入的另一人员;具有人员追踪功能:在外门未关闭之前,无法打开内门;若发生强行破门、恶意破坏读卡器或键盘、无效卡或错误密码企图开门等不正常事件,管理中心立即获知并提醒值班警卫。系统同时启动现场探照灯、录像机等相关设备。 

感应卡特点: 

因为感应卡的上市,使用者再也不需要携带钥匙,更免除了钥匙被复制的烦恼,再也不必耽心财物可能蒙受损失。感应式讯号发送器的封装形式有许多种,包括卡片式、钥匙圈式、笔心式、玻璃管式、麦克笔……等等,体积有大小差别,而体积的大小往往与感应距离成正比,一般来说,使用人员于门禁及停车场管制时,为了方便携带,通常做成卡片式,故俗称感应卡。 

动作原理: 

感应卡(Promixity Card)一般以接触卡称之,磁卡在使用时要有「刷卡」的动作以达到 管制目的。通常一张感应卡中有IC芯片、感应线圈及电容原件。感应卡为发射应答端 ,而感应式卡片阅读机为接收端,类似发电机,持续发送频率。当卡片靠近卡片阅读机发射频 率的范围内时,卡片内的线圈会接受此频率并产生能量,此能量储存在电容器内,当 能量到达激磁的状态时,会将卡片中IC芯片上所烧录的密码发送给卡片阅读机卡片阅读机辨识 过后,便可开门,坊间各厂牌的卡片阅读机所发射出的频率不同,故卡片不会有互通并可使用状况发生。 
  设置门禁管理系统主要目的是保证上述区域及区域内设备安全,便于人员的合理流动,对进入这些重要区域的人员实行各种方式的进出许可权管理,以便限制人员随意进出。当员工要进入被管制的区域时,必须先在门旁的读卡器中刷卡,门才能被打开。每道门边的读卡器均通过现场控制介面单元和系统集中控制器受到监控终端的控制。每一张卡根据系统设置,只能在规定时间内打开规定范围的门。同时防止外来人员随便闯入,如有人强行破门或下班没有关门,门禁装置将发出报警信号,监控终端上马上显示报警的门号。 门禁系统设计之目的是为实现人员出入权限控制及出入信息记录。 

门禁系统原理: 

1、对需控制的出入口,安装受电锁装置和感应器(如:电子密码键盘、读卡器、指纹阅读器等)控制的电控门; 
2、授权人员持有效证卡,或密码和自己的指纹,就可以开启电控门; 
3、所有出入资料,都被后台计算机记录在案;通过后台计算机可以随时修改授权人员的进出权限; 
4、该系统还可以加入考勤系统功能; 

系统要求 

高度集成化:实现与其他系统的完全联动,包括:消防报警系统、CCTV系统、电梯系统、资讯通讯系统、停车场系统及楼宇控制系统等。 

高保安性:要求整个系统性能稳定、安全可靠,防伪性强。 

冗余率大:具备大容量的可扩充性,如需扩充设备,不用另外增加主控部分,只需增加前端设备和现场控制单元即可。 

系统功能 

权限管理:对人员出入权限设置、更改、取消、恢复。 
  存储功能:存储人员出入的日期、时间、卡号、是否非法等相关信息。 
  集中管理功能:后台管理工作站可建立用户资料库,定期或实时采集每个出入口的进出资料,同时可按各用户进行汇总、查询、分类、打印等。 
  异常报警:非法闯入、门锁被破坏等情况出现时系统会发出实时报警信息传输到管理中心。 
  联动功能:可实现消防联动,当出现火警等情况时,由中心统一开启出入通道,可启动CCTV实现联运实时监控。 

门禁系统的微机管理功能 

系统管理: 
  这部分软件的功能是对系统所有的设备和数据进行管理,有以下几项内容 

设备注册 
  比如在增加控制器或是卡片时,需要重新登记,以使其有效;在减少控制器或是卡片遗失、人员变动时使其失效。 

级别设定 
  在已注册的卡片,哪些可以通过那些门,哪些不可以通过。某个控制器可以让哪些卡片通过,不允许哪些通过。对于计算机的*作要设定密码,以控制哪些人可以*作。 

时间管理 
  可以设定某些控制器在什么时间可以或不可以允许持卡人通过;哪些卡片在什么时间可以或不可以通过哪些门等。 

数据库的管理: 
对系统所记录的数据进行转存、备份、存档和读取等处理。 

事件记录:系统正常运行时,对各种出入事件、异常事件及其处理方式进行记录,保存在数据库中,以备日后查询。 

报表生成:能够根据要求定时或随机地生成各种报表。比如,可以查找某个人在某段时间内的出入情况,某个门在某段时间内都有谁进出等,生成报表,并可以用打印机打印出来。进而组合出考勤管理巡更管理会议室管理等。 

网间通信:系统不是作为一个单一的系统存在,它要向其它系统传送信息。比如在有非法闯入时,要向电视监视系统发出信息,使摄像机能监视该处情况,并进行录象。所以要有系统之间通信的支持。 

  管理系统除了完成所要求的功能外,还应有漂亮、直观的人机界面,使人员便于管理 

门禁系统的组成 
  被控制的门;控制器;门磁锁;读卡器及卡片;手动按钮; 钥匙;指示灯;与上位机通讯的线缆;上位PC机;专用软件 

门禁系统的功能 
刷卡开门若卡号不对或属黑名单将闭门并报警 
手动按钮开门门内人员出门用 
钥匙开门门禁系统管理员使用 
上位机指令开关门在特殊情况下由上位机指令门的开关 
门的状态及被控信息记录到上位机中可方便的进行查询 
上位机负责卡片的管理发放卡片及登录黑名单 

走入门禁市埸 

 传统的个人身份鉴别手段已不能完全满足现代社会经济活动和社会安全防范的需要。从消除人为不安全因素看,只有不易被他人代替、仿制、甚至其本人也无法转让的身份识别凭证才能胜任。因此,从易用性、安全性、成熟性和造价等方面综合比较,随着IT(信息技术)的不断前进,随着识别技术的不断成熟,随着计算机技术的飞速发展,门禁技术发展迅猛,正以惊人的迅度从传统的键盘、磁卡式向感应卡、智能卡及多功能卡的方向发展。现在门禁系统甚至可以利用卫星网络提供全球门禁服务。从门禁系统迅猛的成长迅度可以看出该产品的市埸已逐渐成熟,一改往日报警和监控产品一统天下的局面,由专家最近执行的预测表明:感应式门禁系统的市埸正以每年300%的惊人速度增长。 

门禁技术的发展 

大部分人认为门禁仅是一种进行出入门控制的设备,最典型的就是传统的门边安装的键盘控制器或磁卡读卡器,出入者为了获得进入权必需先刷卡。然而现在门禁已有更先进的技术和新的应用市埸,现在应用于门禁系统的技术有:条形码、图形ID、磁条形码、韦根式、感应式、智能码、生物辨识等。其中感应式门禁和生物辨识门禁将成为门禁发展的两大趋势。 

这些门禁系统所采用的技术及所能达到的安防级别互不相同。例如:光学技术应用于条形码及图形ID系统中以辨别贮存在条形码及图形ID中的信息;电磁技术则应用于磁卡门禁系统中,当持卡人刷磁卡时系统将读取允许进入的磁特性;韦根技术极为巧妙,仍属电磁学的范畴;感应式技术通常使用的频率一般在110~125KHz,频率越强,感应式门禁系统的读卡距离越远,随着技术的不断完善,频率为13.56MHz感应式门禁系统的读卡距离已可达到将近1,这种门禁系统已有了许多其它的应用领域,例如:停车场、各种收费系统等。当然最安全的门禁系统应是能辨识人体生物特征,而不是辨识人所持物体特征的系统,例如:利用人体独有的生物特征的生物辨识系统可辨识指纹和瞳孔结构,这将是门禁系统的最高境界,但价格极为昂贵,难以为广大用户所接受。

门禁系统根据和计算机通讯的方式分为 独立型门禁系统 联网型门禁系统。
独立型门禁系统
不能和计算机通讯,门禁权限的设置在本机的键盘或者母卡就行设置。也有一些独立 门禁机是带液晶显示的辅助键盘等做卡片的授权。
独立型门禁系统的组成部分:
独立型门禁机(含读卡和控制)+ 开门按钮 + 电锁 + 电源 + 感应卡
有的还可以外接一个读卡器实现进出门都刷卡。
市面上常见的一款独立型门禁机
独立型门禁系统的优点:价格比较便宜,无需计算机知识的装修人员都可以安装。
独立型门禁系统的缺点: 安全性较差,因为控制电锁的继电器就在一体机内,不法人员 无需太多专业知识就可以通过短路或者破坏独立型门禁机来进行开门,甚至有些通过强磁铁都可以吸开独立型门禁机内的继电器从而打开电锁。虽然有些厂家进行了改良,将按钮和继电器放在电源里面,但是没有从根本上提高安全系数。设置卡的权限相当不便捷,如果一个公司有多个门需要门禁时,需要挨个设置和取消,设置工作相当麻烦,而且不知道哪些门设置了什么权限。所以,独立型门禁系统适用于 安全级别不高(防君子不防小人的场合),成本预算很低,门数不多的场合,无需快速授权和分析门禁出入记录的场合。

联网型门禁系统
能够和计算机进行通讯,通过安装在计算机上的门禁管理软件进行卡的权限的设置和分析查询门禁出入记录。电脑不开,系统也可以脱机正常运行。软件运行可以进行权限和参数的设置,可以实时监控各个门的进出情况。可以统计考勤报表等。

本文来源:https://www.2haoxitong.net/k/doc/b54c601cff00bed5b9f31d98.html

《2[1].英文翻译格式和要求.doc》
将本文的Word文档下载到电脑,方便收藏和打印
推荐度:
点击下载文档

文档为doc格式