We starting video youtube channel. Now our customers have most easy way to watch how devices work, how works RGB led indicator ring and different relay modes. We sure this information will be useful for any customers which search for simple, reliable and good looks access control systems.
Sorry for temporary inconvenience. In the middle of May you must to see new site version.
ACS solution with this module will work with BLE key-fobs, phones and standard cards in same time. It’s must be very universal and usable solution for SOHO and...
Regardless the difficulty and different varieties of access control systems (ACS) their main task remains the same for dozens of years. This task is the providing of automatic access to the object for those individuals, which were entitled with access rights. The seeming easiness of ACS door installation still remains the reason for many questions to young specialists. Therefore, today we will look through the basic algorithms of simple points of access control based on doors.
For the identification of men within the access security systems must be used unique personal attribute:
Every unique attribute within the database coincides with the information on its access level. The most widely used is the identification with material carriers. Any ACS have three main compulsory elements:
In basic ACS, where not need high security level, the reader and controller can be united in one device.
The basic algorithm of ACS functioning in a regular state:
More complicated algorithm of ACS use are based on this basic algorithm. Let us take a look the ones that are most commonly used.
Enter with the use of card, exit with the use of button
This is the most simple and commonly used method of using the access control system. In this case one reader, one controller and one exit button are required for every door. Most commonly used reader combined with a controller, for more easy installation. The access control right is carried out when entering the premises. After presenting the card, the controller analyses the user’s rights. In case the access is grated the controller switches on the relay, which control the lock and it opens. In case the presented card is not entitled with users rights or is absent with the controller database the access will be denied. In order to exit the premises the user pushes a button, which installed near door and connected to the controller. The door opens without verification of access rights. The most appropriate equipment for this type of access point is a kit, which consists of a reader LRx-1R and a controller LR – 1CB. The advantages of using this kit are the following:
Enter and exit with the use of a card
This algorithm requires two readers – one of them is supposed to be installed on the outside, the other on the inside of the premises. After presenting the card the controller analyses the user’s rights. If access is grated the controller switches on the relay, which control the lock and it opens. Afterwards with the activation of the door sensor in case it is connected the controller returns to its original state. In case the door sensor isn’t connected the controller will return to its original state after the time set to walk through the door passes. In case the rights of the card do not permit to carry out the passage, then the access will be denied.
Access on several cards
In some cases when organizing access points with a special access state “the rule of several individuals is used”, in this case in premises cannot be enter only one person – the access is permitted only for two, three or more persons in same time (depend algorithm of work). An example could be banking premises or specialized warehouses. The controller consequently verifies the presented cards rights and permits access in case of a successful identification each card. The exit from the premises is carried out in a similar way. This algorithm of work can be used in Lumiring controllers by advance bookings.
Access with the use PIN-code and RFID card in same time
This state of functioning is used upon objects with increased requirements to the security access level, most frequently in internal premises. In order to implement this algorithm readers with keyboard are used. In order to enter the user needs to dial his PIN – code, and present the access card afterwards. For the organization this kind of access based on Lumiring controllers, customer must use any combined reader with a standard Wiegand 26 interface.
Access on coercion
One of the variants of access with the use of the PIN- code reader – a special state of functioning of the access control system, the purpose of which is to allow the user, who opens the door under threat of violence to dial a modification code. This variant is used only in network access control systems. In this case the system together with the opening of the door sends an emergency message to the security system.
Access on biometrical feature
It could be the case that the Customer has the necessity to use biometrical data for identification. The most commonly used case is the using of the fingerprint reader. The biometrical reader analyses the fingerprint in accordance with its own database and in case of a successful identification transmits the code of a presented card to the controller, which makes the decision on providing access. In order to organize this type of access based on Lumiring controllers, customer must use any biometrical reader with the standard interface Wiegend 26.
Recommendations on installation of access control systems
The power supply of controllers and locks
It’s necessary to know the system current consumption. For electromagnetically locks in the state of closure, as for the electromechanical – the state of opening. The source of power supply should have a reserve in order to continue its functions in case of electricity break down, and the door should remain shut.
The position of locks
The electromagnetically locks should be installed from the inner side of the door - for protection of strangers access to the lock itself and its chains. In case when the door opens inwards, this could require the production of non-standard lock fixations.
The protection diod within the lock chain.
A most common installers mistake – the absence of a protection diod. A sudden increase of current up to several hundreds of volts on the tapping of the lock when commutating causes sparks upon the relay contacts. Consequence – a quick breakdown of the relay.
The door closer.
The presence of a door closer installed with an ACS is a necessity. It’s exactly the case when a guaranteed door closure will take place after the user has passed through. In case of using the door sensor and if the door remains open for a continuous period of time, the controllers of the Lumiring system will come up with a voice signal and visual indication.
The emergency exit button
The absence of the emergency exit button can lead to a situation when peoples get blocked within the premises for example in case of a controller distortion. In this case only the compulsory disconnection of chains of the electromagnetically lock can solve the situation. If electromagnetically locks are used within the premises, they should be equipped with means of compulsory enablement (or a key, which should be within the premises in a sealed box)
The installation of readers
In case the outer wall of the premises has a width less than 10 cm and the readers are installed one opposite the other then the presentation of a card can cause simultaneous functioning. This will lead to incorrect functioning of the entire system. This problem can be solved with the disposition of the readers on the wall of 10-20 cm.
We hope that this article will provide clarity and understanding of the states of functioning of access control systems for an ordinary user and will also help to avoid certain fundamental mistakes for those who decide to install the device by themselves. Our service of technical support is always ready to answer all your questions and provide assistance in the process of installment.