Security System

2.1 The Security Systems

The security system is designed to provide a robust and comprehensive solution for managing and monitoring access to restricted areas. It integrates various technologies and devices to ensure that only authorized individuals can gain entry, while also recording and reporting access events for audit and review.
 


2.2 Recognition Devices (Hardware)

Recognition devices, often referred to as input devices, are responsible for capturing data that will be processed by the system's controller. These devices include cameras, sensors, and readers that detect and collect information, such as images, radio frequency signals, or infrared signals. This information is then transmitted to the controller for further processing.
 


2.2.1 Facial Recognition (FR) Terminal

One of the most advanced recognition devices is the Facial Recognition (FR) terminal. This device captures images of individuals' faces and uses sophisticated algorithms to identify and verify their identity. FR terminals are commonly used in access control systems where only authorized personnel are allowed entry. The device compares the captured image with a database of stored images to determine whether access should be granted or denied.
 


2.2.2 RFID Reader

Another essential input device is the RFID (Radio Frequency Identification) reader. RFID readers capture radio frequency signals emitted by RFID tags or cards. These tags are often carried by authorized personnel and contain unique identification codes. When an RFID tag comes within the range of the reader, the reader captures the signal and sends it to the controller for verification. RFID readers are widely used in access control systems due to their reliability and ease of use.


2.2.3 Automatic Number Plate Recognition (ANPR) Camera

For vehicular access control, Automatic Number Plate Recognition (ANPR) cameras are commonly used. These cameras are capable of capturing images of vehicle license plates and processing the characters to identify the vehicle. ANPR systems are particularly useful in managing entry and exit in parking facilities, gated communities, and secure premises. The system cross-references the captured number plate with a database to determine whether the vehicle should be allowed entry.


2.2.4 Passive Infra-red (PIR) Sensor

Passive Infra-red (PIR) sensors are used to detect the movement of objects based on the infrared radiation emitted by them. These sensors are highly effective in detecting intrusions and are often used in combination with other security measures. When a PIR sensor detects movement within its range, it triggers an alert or sends a signal to the controller, prompting further action.

2.3 Controller (Software)

The controller is the brain of the security system. It receives data from the recognition devices, processes it, and makes decisions based on pre-set rules and databases. The controller is typically equipped with a microprocessor and memory, allowing it to store data, run software, and communicate with other devices in the system.

 


2.3.1 Access Control Panel

An Access Control Panel is a key component of the controller. It receives input signals from devices like RFID readers and determines whether to allow or deny access based on the information stored in its database. The decision is then communicated to the automation devices, which either open or close the access point (such as a door, gate, or turnstile). Access Control Panels are highly customizable and can be configured to meet the specific needs of different environments.


2.3.2 Built-In Controllers for Optical Devices

Certain recognition devices, such as Facial Recognition terminals and ANPR cameras, come with built-in controllers. These devices are equipped with their own microprocessors and software, allowing them to process data independently and generate output signals without needing an external Access Control Panel. This integration simplifies the system's architecture and reduces the need for additional components.
 





























 

2.4 Automation Devices (Hardware)

Automation devices, also known as fardware, are responsible for executing the actions determined by the controller. These devices include barriers, turnstiles, door systems, and electronic locks that physically control access to different areas. Automation devices are crucial for implementing the decisions made by the controller, ensuring that only authorized individuals or vehicles can pass through.


2.4.1 Automatic Barrier Gate

Automatic Barrier Gates are commonly used in vehicle access control systems. These gates are equipped with a motorized arm that raises and lowers to allow or block vehicle entry. The gate receives commands from the controller, which determines whether to open or close the barrier based on the input data received from recognition devices like ANPR cameras or RFID readers. Automatic Barrier Gates are an effective way to manage traffic flow and secure entry points.
 


2.4.2 Pedestrian Turnstile

Pedestrian Turnstiles are designed to control foot traffic in areas such as building entrances, stadiums, and subway stations. These turnstiles allow one person to pass through at a time, ensuring that only authorized individuals can enter. Like barrier gates, turnstiles are connected to the controller, which sends signals to allow or deny access based on the input received from recognition devices.

 


2.4.3 Automatic Door Opening System

Automatic Door Opening Systems are used in various applications, from office buildings to hospitals, where hands-free access is required. These systems use sensors to detect the presence of a person and automatically open the door. The controller ensures that the door only opens when authorized personnel approach, providing both convenience and security.



 


2.4.4 Magnetic Lock

Magnetic locks, also known as maglocks, use an electromagnet to secure doors. When the door is closed, the electromagnet creates a strong bond that holds the door in place. The lock is released by the controller when access is granted, allowing the door to open. Maglocks are widely used in secure facilities where strong access control is required. 
 

2.5 Conclusion

In conclusion, the security system integrates multiple devices and software to ensure that only authorized individuals have access to restricted areas. The recognition devices capture and relay information to the controller, which processes the data and directs the automation devices to execute the necessary actions. The integration of these components results in a seamless and effective access control system.

Make Appointment

We would be more than happy to solve your problem and question, please arrange your appointment with us.