General requirements of the access control system and automatic timekeeping:
- Compatibility with information technology infrastructure is being applied in the building.
- The device is located in positions that ensure people working in different areas conveniently and without having to gather at one location to ensure no congestion at rush hours.
- Ability to manage the number of users on demand and ensure the scalability of upgrades.
- Ensuring professionalism, in accordance with the overall design of the installation areas of the building.
- Be sure to connect to the building's safety systems such as fire alarm and alarm systems and must have a safety function when something goes wrong. In order to ensure the highest safety for everyone in the building when an incident occurs (The system must be completely opened when there is an alarm, fire alarm or when activated from the position of the building manager) .
- Affirm the size, brand and leading of a large technology corporation for anyone entering and leaving the building. The basic equipment of the system:
- Electronic access control system installed at the head office and branches including the following main equipment:
+ Electromagnetic lock.
+ Fingerprint reader integrated central controller (external reader).
+ Fingerprint reader. (internal reader or Exit button).
+ Main source system and backup source.
+ Safety equipment comes with the system.
+ Transmission system and communication equipment to connect all the controllers to the center. (morden, switch, iLAN422 signal converter).
+ Necessary software (server software to manage and exploit data from controllers, client software to exploit applications such as timekeeping, access software ...)
- Use a fully automated electronic time attendance system with application software running on SQL SERVER database.
- The terminals allow to give a number of relays or DI / DO signals to control other ancillary equipment when necessary such as Barie, automatic doors, cameras, alarms, fire alarms, alerts unauthorized intrusion...
- The terminal operates stably and is easy to use, nice design, ensuring industry standards suitable for the building environment.
Activity description:
Each employee is issued an ID and will have to register his or her fingerprint in the system software, then the manager will use the software to transfer his fingerprint data to the linked fingerprint readers. Interconnected, each person's ID contains all information related to that employee, such as full name, title, office. Depending on the position, position, authority, it is possible to determine that the employee is allowed to enter and leave the assigned areas, thereby granting that employee access at the respective control points.
Employees who want to access and control points must put the registered fingerprint into the position of receiving fingerprints of the fingerprint reader, in addition to the control points that require high security, need to enter more information about the code. personal number. If valid, the card reader will emit a signal to open the door and information about that person is transmitted to the software at the central computer. Otherwise, if invalid, the door will not open, an unauthorized access warning signal will be sent from the fingerprint reader to the control center and the warning will also be transmitted to the software.
At the control software center, it is possible through the software system to perform the functions of fingerprint registration, granting access, opening, closing ... and observing all the access events. hardware system.
Information about all access events, is stored in the management software on the central computer, for later reporting.