Access control, also known as access management control system, channel management system, is a digital and intelligent management system for managers to enter and exit. The original concept of the access control system has been in our lives for a long time. The functional characteristics of the community access control system
1. A variety of authentication mode options; one-way authentication: after the user is authorized to identify and confirm his legal identity outside the door, the controller drives the electric lock to release, and records the time of entering the door. Press the door button to open the electric lock and go out directly. It is suitable for environments with general security levels and can effectively prevent illegal entry by outsiders. It is the most commonly used management mode. Two-way verification: After the user is authorized to identify and confirm his legal identity outside the door, the controller drives the electric lock to release and records the time of entry. When the user leaves the controlled room, he must also show the authorized identification to confirm his identity in the door, and then the controller drives to open the electric lock to let him go, and record the time of going out. It is suitable for environments with higher security levels. It can not only effectively prevent illegal entry of outsiders, but also query the last person and time to leave, so as to facilitate the implementation of responsibility and provide evidence during a specific period (such as theft).
2. Multiple options for confirming legal identity; single-category verification: those who need to verify someone’s legal identity can confirm their legal identity by providing only one verification method or fingerprint verification, or password verification, or card verification: applicable to security levels The general environment is the most commonly used management mode. Two-category verification: Those who need to verify someone’s legal identity must provide two verification methods, or fingerprint + password verification, or card + password verification, before they can confirm their legal identity: suitable for environments with higher security levels, two verification methods Mutual restraint improves the security level (password is required for compulsory verification such as finger cut). Three-category verification: those who need to verify someone’s legal identity must provide three verification methods or fingerprint + password + card verification before they can confirm their legal identity: suitable for environments with extremely high security levels, and the three verification methods restrict each other to improve security level.