Communication line length rs 232. COM port pinout (RS232)

From this article you will learn: what an access control system is, what elements an access control system consists of, what a reader is, what a controller is and what types of controllers there are, what types of identifiers exist, what biometric identifiers are, how to choose equipment for an access control system, and much more about access control systems.

Such systems were initially developed and created for the needs of military facilities. They, as in many organizations today, were supplemented by security guards armed to one degree or another - strong guys with a strong sense of duty in their eyes. Yes, intelligence services at various levels have something to hide, but today any organization or individual has the opportunity to equip their facility with an access control system, otherwise known as an access control system.

Why access control is needed

Resolving issues with finding equipment suppliers and installation contractors, brainstorming previously unfamiliar concepts and terms - reader, biometric reader, access points and controllers, and finally, the costs of purchasing and paying for installers - will there be any result from all this trouble? What's wrong with the old method of control - through watchmen, security officers at the checkpoint and girls at the reception desk? The answer is identical to the answer to the popular riddle of the Sphinx - man, or rather, the human factor. A person can make mistakes, this is typical for him, but security guards simply cannot make mistakes - they act exclusively within the framework of a given program.

What is ACS

This is a system that includes software and hardware tools and organizational measures aimed at monitoring and controlled access to individual premises, monitoring the movement of employees and the time of their presence on the territory of the protected facility.

The abbreviation ACS can hide an intelligent door lock (electromagnetic or electromechanical), electromechanical latch, barrier, turnstile, etc. - i.e. a certain actuating device that restricts access to a room, building or territory. The use of access control systems will allow constant monitoring of the situation in the protected area, ensuring the safety of employees and visitors, material and intellectual values. By and large, all modern access control systems operate on the same principle; the difference between them is reliability, quality and ease of everyday use.

The access control system includes:

  1. User identifier - it is a magnetic card, a contactless (proximity) card, a key fob (Touch memory), a radio key fob, an iris, a fingerprint or the entire hand at once, as well as many other physical characteristics. The system assigns a unique binary code to each identifier, which is associated with information about the access rights of its owner.
  2. Reader - reads from the user identifier, sending the received information to the ACS controller.
  3. The entry point is a certain obstacle (door, gate, barrier), equipped with an actuator and a reader. If full access control is carried out at a specific access point, then it will be equipped with two readers, one of which is at the entrance, the other at the exit. If only entrance access control is needed, then a reader is not installed at the exit - the exit is either free or through the RTE button.
  4. The RTE (Request to exit) button, otherwise the exit button, is designed to briefly switch the actuator to the “open” position, while the access control system controller only remembers the very fact of exiting through the passage point, personal data is not known.
  5. The access control system controller is the main intelligent device of the access control system; its task is to analyze information from readers and make appropriate decisions and transfer them to executive devices.

What types of identifiers exist

Proximity cards (contactless, radio frequency) - contain in their design an antenna and a chip containing a unique identification number. The principle of their operation is as follows: as soon as the card is in the zone of the electromagnetic field generated by the reader, its chip receives the necessary energy and sends its identification number to the reader through a special electromagnetic pulse. Such cards do not require the reader to be touched in any specific place; it is enough just to place it in the reader’s zone of influence.

Magnetic cards - they have a visually visible dark magnetic stripe on them. To interact with the reader, such cards must be passed through a special slot in the reader.

Wiegand cards are named after the research scientist John Wiegand, who in 1975 discovered a special magnetic alloy, the wire from which is used in the construction of these cards. Information from them is obtained by moving the reading head along the card.

Barcode cards are a plastic rectangle with a barcode printed on it. For greater secrecy, the barcode area is covered with a special material, through which only infrared rays can penetrate, i.e. In the rays of the normal spectrum, the barcode is invisible.

Keychain (Touch memory) - looks like a metal tablet and is usually designed in the form of a keychain. It contains a ROM chip in its design - when it touches the reader, an identification code is sent to the controller.

It should be noted that an identification card can serve as an access key to many access points at once, depending on the powers assigned to it. Short-term or one-time access pass cards can be issued for visitors and temporary employees.

Biometric identifiers - what are they?

If with access control identifiers, which are plastic cards or a metal key fob, everything is, by and large, clear, then biometric identifiers are very interesting. For this reason, this method of identification is present in any spy or science fiction film in the world film industry. Identification is made by the shape and size of the user’s hands, his fingerprints, voice matrix and retina. Similar access control management systems have been used for more than 30 years - the first systems had a significant cost, so they were used exclusively at facilities with the highest level of security. Today, the cost of access systems based on biometric data, compared to their earlier counterparts, has decreased significantly - this is due to the improvement of microprocessor-based image recognition tools.

Access control based on biometric indicators completely eliminates the possibility of forgery or loss of identifiers, because the user of the system becomes it. In addition, such a system makes it possible to reduce a number of administrative operations, eliminating the need for the production, registration, issuance and re-withdrawal of an identifier.

The disadvantage of biometric identification is the need for some time to analyze the identification object and compare its parameters with the standard in the controller database; for this reason, such systems are best installed at access points where there is no need for mass access.

Types of ACS controllers

Autonomous controller - designed, as a rule, for one passage point. Often built into a reader, electromechanical lock, etc. The maximum number of users (i.e., identities) that a standalone controller can support is limited to five hundred.

Network controller - controlled by a personal computer through specialized software over the network. The network controller provides the facility administration with wide possibilities for its use, including (in addition to denying/allowing access):

  • report on the presence/absence of employees at the workplace at any time;
  • the ability to obtain constant information about the movements of employees;
  • automatic recording of working hours, in other words, automatic timesheet maintenance;
  • the ability to set access at a given time for certain employees, i.e. where they can and cannot go in certain periods of time;
  • maintaining an electronic employee file, including the required information and photographs of employees;
  • many additional functions. Installers are able to configure the operation of the network controller to control access according to the most exotic whims of ACS customers.

Combined controller - capable of performing the functions of both a networked and standalone controller, the latter is especially convenient when there is no connection with the control PC. Switching modes from network to standalone occurs automatically in the absence of communication with the control PC.

Access points are not only located inside the administrative building

In addition to the entrance, interfloor and office doors, warehouses, archives and other premises with limited access, there are also access roads and parking areas for cars, which can also be equipped with automatic access control devices.

Fencing administrative territory with high fences, three meters high, will, of course, not soon go out of fashion. However, from an aesthetic point of view, fencing of this kind loses - you must admit, a solid fencing does not evoke the most rosy feelings, as well as bars on the windows.

Meanwhile, not only burly security guards with full equipment and a decent salary can control the open entrance to the territory. Specialized technical means of blocking, introduced into the general access control and management system, are ideal. Automatic passage blocking devices are divided into: anti-ram barriers, retractable spikes, automatic chains, etc.

Only heavy, military-style tracked vehicles can penetrate these types of fences; any other vehicle will be reliably stopped. Such driveway and parking blockers are used when it is necessary to block the passage of vehicles without blocking the passage of pedestrians. In the “open” position, such passage blockers are completely hidden underground; they do not create obstacles to cleaning the area; they are controlled via a radio key fob.

The right approach to choosing a scheme for constructing an access control system

Any control system has its limitations - the number of user identifiers and the number of controlled access points. In the future, when the organization expands, for example, when merging with another company, or increasing the number of premises to which access needs to be limited, the access control system acquired several years ago may become unnecessary. At the same time, choosing a control system that is many times larger than the current number of employees will also result in unjustified expenses.

The ideal way out of the situation is to choose an access control system with small free capabilities, but allowing an “upgrade” (adding new modules that expand the identifier base). Modern access control systems are quite flexible and expandable; this primarily applies to modular systems.

It is necessary to find out from the supplier: the need for additional equipment (for example, uninterruptible power supplies), which elements of the access control system must be replaced when expanding the database, how long the “upgrade” will take and what assistance the supplier will provide in the future.

Please note: does the control system offered by the supplier have the ability to integrate systems and. Such an opportunity is available today for access control systems built on an open platform; integration of other security systems into it is carried out at the software level.

An access control system will help solve many problems, but only if it is correctly selected and installed, and its configuration is built according to the tasks of a particular facility.

Rustam Abdyuzhanov, specially for rmnt.ru

We will send the material to you by e-mail

In the modern world, special attention is paid to security at various facilities, regardless of whether it is a large enterprise or a small office, a school or a shopping center. Along with the traditional staff of security personnel engaged in performing these functions, various technical systems are used that expand the capabilities and functionality of security services. The ACS access control and management system is just such a system, and it will be discussed in this review by the site’s editors.

Basic elements and configuration of an access control system for a small business or administrative building

An access control and management system, or ACS, is an element of a security system created on the basis of technical devices and electronic control systems, combined into a single network running on specially developed software. In addition, the access control system allows you to automate the recording of working hours at the enterprise and in the office, thereby facilitating the work of the organization’s HR department.

Types of access control systems

Depending on the type of operation and method of transmitting information, access control installations are divided into: stand-alone, network and wireless.

Autonomous are systems that provide control over a separate (office, store, etc.) or several premises united by a common purpose, when the operation is controlled using a separate (autonomous) controller. In such installations, the control controller is not connected to other electronic control devices, but operates autonomously. As a rule, the access point to the controlled territory is. An electronic lock or latch is used as an actuator in autonomous control systems, and an access control card with various types of readers (bar, magnetic, proximity) is used as an identifier. An autonomous controller, as a rule, only works “at the entrance” of the controlled area, and control buttons or sensors are used “at the exit”.

Networked systems are equipped with a more powerful and functional controller (or group), which ensures the operation of access control systems in large premises where a large number of people can be present at the same time. In such systems, entrance points of enterprises or other structures serve as access points, and turnstiles or gateways are used as an actuator. Identifiers can be of various types, and the actuators themselves are equipped with remote readers.


In wireless control systems, communication between the ACS server and other control elements is carried out via the Internet, and between the controller and actuators - via communication channels (Bluetooth, Wi-Fi and others).

Functions of the automated control system ACS

The main functions that determine the purpose of the access control system are: delimitation and control of access to a certain area of ​​space (premises), recording the working hours of employees and automating the work of the security service.

Access control and restriction

This function involves the following activities:

  • restricting the access of people and the entry of vehicles into the controlled territory;
  • necessary restriction of access for employees and visitors to certain premises and work areas not intended for public use.

Time tracking

This function is intended for personnel departments and simplifies their control over the working hours of enterprise employees and their labor discipline. In addition, thanks to this function, the security service can regulate personnel access to the controlled area on weekends and holidays, as well as outside working hours.

This function is expressed as:

  • control and registration with archiving of the time of entry and exit of people to the controlled territory;
  • creation and prompt regulation of a database of employees, their access levels and operating modes.


Security system mode

What is ACS in security? It is:

  • control and management of temporary restrictions on the passage of people and vehicles through access points for both permanently registered and one-time visits;
  • registration of the date and time of entry and exit of vehicles with recording in the memory of the access control system;
  • operational and mobile management of access points - blocking and unblocking;
  • remote control of actuators.

Other functions

Depending on the class of equipment used, the functionality of the entire system may vary. As additional functions, the ACS can be combined with video surveillance and fire alarm systems. Also, additional methods can be used to transmit a wireless signal, for which communication channels are used: Bluetooth or Wi-Fi, ZigBee or GSM.

Technical means for controlling the movement of personnel and visitors

The room access control system includes a number of different technical devices that need to be considered separately:

  • User IDs.

This group of devices includes:

  • “Proximity” cards are contactless, radio frequency devices containing in their design an antenna and a chip on which a specific number (code) is recorded, assigned to a specific user;
  • magnetic cards - a visually visible magnetic stripe is applied to their surface;
  • Wiegand maps;
  • cards with a barcode;
  • keychain (“Touchmemory”) - a metal tablet equipped with a ROM chip.

Biometric identifiers can be installed in the access control system, with the help of which access control is carried out based on a person’s biometric data.

  • Readers.

Devices in this group can be of an auxiliary or autonomous type, which determines the method of their installation in relation to the ACS controller. The type of reader depends on the type of identifier - magnetic card, smart card, contactless or proximity. When using magnetic cards, the code recorded on the magnetic tape is checked. For smart cards and contactless devices, information is received from the built-in chip, and when using proximity, the code is read from the built-in chip.

  • Controllers.

This element of the system is its “brain” and coordinates the operation of all other equipment. For different ACS systems, different types of controllers are used: standalone, networked or combined. Standalone ACS controllers, as already written above, are used in systems with one access point; for network ones, the number of actuators is regulated by the need and technical capabilities of the controller. Combined devices can perform functions of both types, which is convenient when communication with the control system server is disconnected, because operating modes switch from one to another automatically.

  • Executive devices.

This group of mechanisms can be safely classified as intelligent technology: electronic and electromechanical locks, magnetic and electromechanical latches, turnstiles and barriers, automatic gates and other mechanical devices.

  • Video surveillance equipment.

Combining an access control system with a video surveillance system expands the capabilities of the access control system, because it becomes possible to video record the moment of people entering and leaving, equipment entering and leaving, and the work of the security service is simplified - all necessary operations can be performed from one workplace.

  • ACS software.

Software is an integral part of a network and combined access control system, ensuring the interaction of the electronic “brain” with devices and mechanisms. For each type and brand of controllers, its own software is developed, which is due to the copyright of device manufacturers. The controllers are sold with pre-installed software, which allows you to install and configure yourself if necessary - this is especially true for stand-alone access control systems. If necessary, the software can be purchased separately, from the companies that developed the specific device, or downloaded a free version on the Internet.

There are a number of companies on the domestic market offering free software for ACS access control systems:

  • company "RusGuard" (Moscow) - ACS-102-CE-B (POE) controller with a built-in POE splitter and ACS-102-CE-B (WF) with a Wi-Fi module and other equipment;
  • company "Era of new technologies" − produces a whole line of devices under the Era brand;
  • company "Stork" (St. Petersburg) – produces controllers that support the RS-485 communication interface.

The software installed on a PC allows you to use all the functionality of the system: monitor online events occurring at the controlled facility and configure user rights, create personnel cards and issue passes, keep track of working hours and provide notifications via sms and e-mail.

Related article:

The need for additional protection arises for many homeowners who want to limit access to their site. One of these means is. Let's talk in more detail about these devices, their types and technical nuances of installation.

Features of ACS for different types of controlled objects

For a large enterprise or small office, administrative building or school, access control systems, if similar in essence, are somewhat different in detail, depending on the type and mode of use of the controlled object, category of users, as well as the need to transfer information to the parent organization or office .

Features of ACS for large corporations

Creating an access control system for large companies and organizations is the most difficult task of all possible options for constructing such a system. This is due to the fact that, as a rule, a large company has representative offices located in different regions of the country, and the head office is located in a large metropolis. In this case, in regional offices the structure, mode and nature of work can be strikingly different, which requires a powerful controller and wide-profile software.

In such systems, in addition to a high-power controller, remote interface modules are used to create a centralized or distributed network configuration required for a specific company.

Features of ACS for small offices, hotels and shops

Controlling access to an office, store or hotel room is somewhat easier, because in this case, the number of actuators and readers is limited. For a small office, it may be enough to have an autonomous access control system that allows you to control only the entrance to the premises. For hotels, an important aspect of the control system is the presence of a video recording function in public areas and a programmable individual one for rooms.

In addition, ACS installed in hotels perform a number of specific functions: increasing the level of customer service and ensuring safety during their stay.

Features of ACS for schools

The characteristic features of ACS installed in schools are:

  • Efficiency:
  • the presence of simple actuating devices that only ensure that unauthorized persons are not allowed to enter the territory or school building;
  • the ability for a student to pass without an identifier, followed by a security guard’s mark in the school control system software;
  • photo identification allows you to verify the identity of a person passing by;
  • control of repeated passes through the actuator.

  • Compliance with safety standards in emergency situations, regulated by the Fire Safety Rules for such facilities.
  • Availability of child-friendly identifiers.
  • Biometrics, identification without presenting an identifier (handsfree), as well as informing parents.

Features of ACS for organizing traffic in parking lots

For normal operation of the access control system installed in vehicle parking lots, it must perform the following functions:

  • control the operation of traffic lights depending on the presence and location of cars in reverse traffic areas;
  • control traffic taking into account the priorities of entry/exit from different parking levels, if any;
  • provide control over the operation of the system in both automatic and manual modes, allowing the operator to change movement priorities.

Otherwise, the operation of access control systems in car parks is similar to the mode of using network systems.

Installation and maintenance of an access control system - nuances

Basic installation operations of control system elements (actuators, readers, etc.) are performed without much difficulty, even by unqualified personnel. For this, traditional fastening elements are used (screws, anchor bolts, etc.), and, if necessary, the base slab is poured (barriers, barriers, etc.).

It is more difficult to connect the controller and install distribution networks, which is due to the requirements for such communications:

  • distribution networks must be laid covertly;
  • The power supply for ACS devices, as well as communication networks, must have redundant power lines that ensure operability in the event of a failure of the main lines, or have an autonomous source (battery).

When the instruments and devices are installed and communications are installed, the most crucial moment begins - setting up the system. At this stage of the work, coordination is carried out between actuators, identifiers and the system control panel. During operation of the access control system, maintenance consists of checking electrical connections, correct settings and monitoring the condition of consumables: charging batteries and updating memory cards.

Prices for ACS access control systems

The cost of equipment and installation of access control systems depends on the configuration of the system, the number of access points, as well as the types and brands of equipment used.

The table below shows prices for various access control systems when sold through Internet companies, as of the second quarter of 2018:

ACS system typeAverage cost (as of April 2018), rub.
With access via electronic TM (TouchMemory) key with electromechanical rim lock for indoor installation4350
With telephone access via the Internet with an electromagnetic lock for installation on a street entrance door7900
With video intercom and calling panel with access via electronic TM (TouchMemory) key with electromagnetic lock14000
With fingerprint and card access with a moisture-resistant electromagnetic lock for installation on a wicket door/gate25300
With online time tracking and fingerprint and card access with electromagnetic lock for indoor installation31800

As can be seen from this table, which shows only a small part of the access control kits used for small protection objects, on the market for such equipment you can choose the model required in terms of functionality, reliability and in accordance with the financial capabilities of the buyer.

Save time: selected articles delivered to your inbox every week

Currently, the Russian market has a fairly large selection of access control and management systems, both foreign and Russian-made. At the annual “Security Technologies” forum, there are usually several dozen Western brands alone. The number of Russian manufacturers has currently exceeded one hundred. In such conditions, the optimal choice of a specific ACS model is very problematic.

What basic parameters should be used to evaluate access control systems from different manufacturers? For this purpose, it is most appropriate to use such a characteristic as the cost of a specific manufacturer’s system to implement standard or identical functions.

Why do we need ACS systems?

The abbreviation ACS (Access Control and Management System) actually hides a device (or a set of devices) that operates on the principle of a smart lock on your door, at the entrance to an office building or to a warehouse, in general, “on site.” An access control system is needed if you are faced with the need to solve the following problems or a combination of them:

  • Recording of entries and exits of personnel and/or visitors
  • Monitoring the time spent on site (for example, recording working hours)
  • Access control within an object depending on the powers of the subject

Access control and management system functions

Access control:

  • For each facility, it is determined for each employee which premises he has the right to enter, as well as whether he has the right to arm and disarm the premises;
  • By status. Access cards are issued to employees depending on the rights assigned to them;
  • By time, each employee is given an individual access schedule to the facility; the access control and management system supports multi-shift work modes, sliding schedules and a holiday calendar.

Working time tracking:

  • Time of arrival and departure of each employee;
  • Time of presence at the workplace;
  • Being late;
  • Premature departures.

Security system mode:

  • In the event of emergency situations, the ability to arm the premises. The access control and management system will issue an alarm; all events related to the alarm are recorded by the system.

Enhanced access control (multi-level identification system):

  • Video identification mode (the image of the person presenting the card is compared with the reference image of the cardholder stored in the access control and management system);
  • “Entry under duress” mode - hidden issuance of an alarm signal, invisible to others;
  • Organization of access provided “card + set of Pin code”;
  • Access with two cards - only two people can enter by meeting together;
  • Access with additional selective security control (timed or random).

Re-entry prohibition:

  • The access control and management system supports the Antipassback function - or the prohibition of repeated passage - this is a functionality of the system that excludes the passage of two employees using one card, or passage without using a card.

Issuing a visitor pass:

  • To enter the protected facility, the visitor receives a temporary access card. When leaving the facility, the visitor returns the card, and it can be used for re-issuance;
  • To ensure that the guest card is not accidentally taken away by the visitor, it is recommended to use a card reader in the ACS system. Until the guest card is inserted into the card reader, the exit will be blocked;
  • All information is stored in an offline database, from where you can get a report on visitors.

ACS is a set of software and hardware tools and organizational and methodological measures with the help of which the problem of monitoring and managing visits to individual premises and territories is solved, as well as operational control of the movement of personnel and the time they spend on the territory of the facility.

In fact, ACS, being a hardware and software complex of technical security means, becomes an important structural component of the personnel movement control system. The block diagram of a simple access control system is shown in Fig. 1.

Fig.1 Block diagram of ACS

In general, an access control system may include the following elements:

  • actuators (locks, turnstiles, gateways);
  • electronic identifiers (plastic cards, “electronic tablets” and other devices);
  • readers (plastic cards and other electronic identifiers);
  • personal code (PIN) input devices;
  • biometric personal identification devices;
  • control devices for actuators (controllers, concentrators);
  • equipment for interfacing the local ACS network with a computer;
  • system administrator software.

The basis of any system is concentrator blocks with connected identification key readers, security sensors and electromechanical locking devices (locks, barriers, turnstiles).

Controller– This is the main part of the access control system. It is the controller who decides whether or not to let a person through a given door. ACS actuator controllers are complex electronic devices that can be implemented as separate units or built into the body of the corresponding actuator. The controller stores identifier codes in its memory with a list of access rights for each.

In addition to exchanging information with ACS concentrators via communication lines, the following is carried out: analysis of information received from electronic identifier reading devices, PIN code input devices and biometric identifiers, issuing, on the basis of this analysis, control signals for unlocking (locking) actuators; monitoring the status of actuators (open or closed); storage of a movement log in non-volatile RAM; registration of unauthorized access attempts. It is important that the controller can operate even in the event of a power failure and has a backup power source.

According to the control method, ACS controllers are divided into three classes: autonomous, centralized (networked) and combined:

  • Autonomous controllers. A completely complete device, designed to serve, as a rule, one access point without transmitting information to the central console and without operator control. There are a wide variety of variations: controllers combined with a reader, controllers built into an electromagnetic lock, and so on. Standalone controllers are designed to accommodate a wide variety of reader types. Typically, standalone controllers are designed to serve a small number of users, typically up to five hundred.
    Autonomous systems are cheaper, easier to operate (often installing and configuring such a system is accessible even to a not very trained person), and in terms of efficiency they are sometimes no worse than network ones. But they cannot create reports and transmit information on events, and they cannot be controlled remotely. At the same time, autonomous systems do not require laying hundreds of meters of cable, interface devices with a computer, or the computer itself.
  • Network controllers. A term denoting the ability of controllers to operate on a network under computer control. In this case, the decision-making functions fall on a personal computer with specialized software installed. Network controllers are used to create access control systems of any complexity. At the same time, the administration receives a huge number of additional opportunities. In addition to simply allowing or denying passage, you usually have the following options:
    • receiving a report on the presence or absence of employees at work;
    • you have the opportunity to almost instantly find out exactly where the employee is;
    • you have the opportunity to keep an automatic time sheet;
    • you have the opportunity to get a report on who went where for almost any period of time;
    • you can create a time schedule for the passage of employees, i.e. who can go where and at what time;
    • you get the opportunity to maintain an employee database (electronic file cabinet), in which you enter all the necessary information about employees, including their photographs;
    • the operator can quickly control system devices - remotely lock the locks or open them (for example, in case of fire)
    • and many many others. That is, there is always the opportunity to fulfill the most exotic wishes of the owner of the access control system.
    In such a system, all controllers are connected to each other via a computer. Network systems are used to manage multiple access points (checkpoints, office premises, high-security premises, outdoor facilities). The unit cost of one access point in a network system is always higher than in an autonomous one. However, networked systems are indispensable for large facilities, since managing dozens of doors on which autonomous systems are installed becomes a very big problem.
  • Combined controllers. Combines the functions of networked and standalone controllers. If there is a connection with the control computer (on line), the controllers operate as a network device; if there is no connection, they operate as autonomous devices.

Computer control in these systems for the operator has priority over his own. The modular construction principle allows you to design and expand the access control system depending on current needs. It is possible to select exactly those system functions that are needed today and add certain options as needed. The versatility of the ACS involves ensuring the operation of a network of ACS actuators using universal interfaces. Important for ensuring the universality of the access control system is the ability to ensure its interaction with fire alarm systems, security television, perimeter security, life support of the facility, differentiation of access to information resources at the logical and hardware-software levels, the use of a single electronic identifier throughout the entire protection facility and a single database data from the facility security administrator, as well as output of alarm information in a unified form to the administrator’s computer in real time (integrated systems).

ACS architecture

Network controllers, as their name suggests, are networked. And this, oddly enough, can be done in different ways! Moreover, the method of integration is influenced both by the design principle of the controllers themselves and by the system software. Let's look at this in a little more detail...

Network Rank

Networks can be peer-to-peer (single-level) and multi-peer (multi-level), where the number of levels rarely exceeds two. A peer-to-peer network has a single bus (if it is extended by repeaters or splitters, this does not count). In a peer-to-peer network, all its nodes (in our case, access controllers) have equal rights. Among the popular representatives of this family are Northern Computers, Kantech, Parsec and most other systems, including those made in Russia.

Disadvantages of peer-to-peer networking: g>

  • The need to have a complete database in each controller (list of users, their rights, and so on). Given the modern cost of semiconductor memory, this, admittedly, is practically irrelevant.
  • The impossibility of implementing some global functions that require the interconnected operation of several controllers (for example, global “anti-passback” - prohibition of repeated passage). This drawback occurs only in networks where the computer is the master, that is, information exchange occurs only on its initiative. Strictly speaking, taking into account the computer, such a network is already multi-rank. Most modern access control systems have exactly this architecture. If the controller network operates on the principle of random access, there is no disadvantage.

Advantages:

  • Maximum “survivability” of the network, since each controller has everything necessary for autonomous operation when the computer is turned off (“frozen”) or the network is damaged. For security systems this is a significant factor.

Multi-rank controller networks.

In a two-rank network there is a leading, or “master” controller, which coordinates the work of “slave” controllers that actually control one or more access points. The most famous representative in Russia is the Apollo system.

Disadvantages of a multi-peer network:

  • Disruption of system operation when the connection between the master controller and slave controllers is damaged, since a significant part of the information and algorithms are the prerogative of the master controller.
  • Increase in cost of small systems due to the high cost of the master controller (due to its obvious redundancy).

Advantages:

  • Centralized memory for databases, which is of little importance today (see above).
  • Implementation of all functions even when the computer is turned off.
  • Gain in the cost of one access point for medium and large system sizes.

Controllers with Ethernet bus

An increasing number of ACS manufacturers are advertising controllers that can directly connect to a computer network (usually an Ethernet network). Is it good?

Firstly, such controllers are usually more expensive than controllers with the RS-485 interface standard for systems. Secondly, you will need a significant increase in the number of network (computer) equipment - hub, switch, and so on, which will further increase the cost of the system.

But in rare cases, controllers with such an interface have an obvious advantage: if it is impossible to lay an RS-485 network between remote areas of your facility, but there is a computer network (for example, between remote checkpoints and the main building), then such a checkpoint can be included in the ACS without additional computer.

An Ethernet-based controller network is redundant in both cost and performance. Judge for yourself: why do you need a transmission speed of 10, and even more so 100 megabits where, at best, once a second an event occurs, the description of which takes a couple of tens of bytes? But... if the controller's database is several tens of thousands of people and it needs to be completely rebooted, then, of course, Ethernet is better...

ACS identifiers

Any access control system has some identifier (key), which serves to determine the rights of the person who owns it. The following can be used as electronic identifiers in ACS: barcode, magnetic or smart (smart cards) plastic cards; “electronic tablets” (Touch Memory); Wiegand cards, where the information carrier is the material from which they are made; remote reading cards (proximity) emitting a radio signal. In addition, a code typed on a keyboard, as well as a number of biometric characteristics of a person, can be used as an identifier.

An access card or ID key fob can be given to another person, stolen or copied, and the code can be spied on. More reliable from this point of view b imetric authentication devices. They provide identification of employees and visitors by comparing certain individual biological parameters of the person with the parameters stored in their memory and providing information about the identification result to the actuator controller. However, it is possible to easily fake some biometric features (fingerprints are the most easily reproducible), so in organizations that require a high level of security, several identifiers are used simultaneously - for example, a card and a code, a fingerprint and a card or code. Today, cards with a high level of security are issued (powerful cryptography schemes are used), where the encryption keys can be assigned by the user himself.


(from the English touch memory is sometimes found in English contact memory or English iButton) - a class of electronic devices that have a single-wire protocol for exchanging information with them (1-Wire), and are placed in a standard metal case (usually shaped like a “tablet”). The code information is written into the memory of this circuit. The device is activated at the moment of contact with the reader. Read and write operations are performed almost instantly during contact. Reading time – 0.1 sec. Some models allow you to enter user information. The advantages are compactness, high resistance to mechanical damage, corrosion, temperature changes and low cost (comparable to the cost of cards with a magnetic stripe). The small size allows you to attach the contact memory to almost any medium - product, card, key fob.

.

A barcode card is a plate with black stripes (stroke) printed on it. The code information is contained in the varying width of the strokes and the distance between them. The code from such a card is read by an optical reader. On a magnetic card, code information is recorded on a magnetic stripe. The bar code can simply be stained with dirt. A magnetic card can be easily scratched in your pocket.

Perforated card is a plate (plastic or metal). Code information is applied to a perforated card in the form of holes arranged in a certain order. The code from the cards is read by mechanical or optical readers.

Code information on Wiegand card contained on thin metal wires arranged in a certain way, glued with special glue. Information from the card is read by an electromagnetic reader.

Proximity technologies have a lot of advantages - much greater reliability and durability compared to other identification methods, lack of a power source (in passive cards). The proximity reader constantly sends a radio signal. When a card enters the reader’s coverage area, it receives its radiation and in response sends a signal containing a code written on the chip. The distance between the reader and the card depends on the power of the reader and varies from 5 cm to several meters. The absence of mechanical contact during operation allows you to make identifiers of any shape (even in the form of a nail), the identifier can be implanted into an identification object. The advantages are the difficulty of counterfeiting and the possibility of using cryptographic algorithms (encryption).

In the literature, another name for this technology is sometimes used - radio frequency identification and registration of objects (RFID systems). They also identify an object using a unique digital code emitted by an electronic transponder tag attached to the object. Both active (powered by a built-in battery) and passive transponders are used. Transponders are available with different types of memory organization. These are RO (Read Only) transponders, containing a unique code recorded at the factory, and R/W (Read Write) transponders, into which the code is entered by the user, multi-page transponders with a user memory of up to 1 kB, as well as transponders whose memory is protected “ floating" code. Systems differ in the carrier frequency of the signals used, the type of modulation, radio communication protocol, and the amount of information returned by the transponder.

Currently, there are three main frequency ranges in which RFID systems operate:

  1. Low frequency range (up to 150 kHz). The disadvantages of low-frequency RFID systems are the low radio transmission speed and the complexity of manufacturing highly inductive transponder antennas. The low exchange rate does not allow the reader (reader) to distinguish between several transponders simultaneously located in the field of its antenna.
  2. Mid-frequency range (13.56 MHz). The system's exchange range is about 50 cm and allows you to identify up to 30 transponders simultaneously located in the reader's antenna field per second.
  3. High frequency range (850–950 MHz and 2.4–5 GHz). Used to identify objects moving at speeds of up to 200 km/h at fairly large distances (10–15 m). Long ranges of high-frequency RFID systems are achieved through the use of highly directional reader antennas and high powers of the request signal. The cost of such systems is significantly higher.

A smart card (“smart card”) is a plastic card that has a built-in microcontroller with all its attributes (processor, RAM, non-volatile memory with a file system, input/output facilities, additional coprocessors). The main advantages of smart cards are a large amount of memory and high security of information from attempts to modify and duplicate. The disadvantage is the high cost. It is standard equipment for corresponding automated systems and can be quite simply implemented into almost any arbitrary system.

PIN code. The carrier of code information is human memory. The user autonomously types a code on the keyboard and thereby gives a signal to the actuator.

Biometric identification systems are the most effective, since they recognize not physical media, but the signs or characteristics of the person himself (unique personal information). Access and information security systems based on such technologies are not only the most reliable, but also the most user-friendly today. All biometric devices have specific software and hardware requirements. In any authentication system, users must first be registered. Many biometric systems allow users to do this themselves.

Human fingerprints (papillary patterns) are of particular interest as a source of information for personal identification due to unique individual characteristics. The percentage of denied access to authorized users is less than 0.000001.

Currently, there are several practically used systems that have a reaction time of 1–3 s and are based on approximately the same approaches to recognition, but differ in a number of parameters. There are two fundamental algorithms for fingerprint recognition: by individual details (characteristic points) and by the relief of the entire surface of the finger, as well as a combination of these algorithms. Fingerprint access control systems use algorithmic solutions to distinguish a “living” finger from a “dead” one, such as determining the temperature of the applied finger, tracking over time the dynamics of sweating on the surface of the skin of the finger and the nature of the deformation of the pattern of papillary lines on the scanner window. Fingerprint readers cause some discomfort in people, although modern fingerprint readers do not store fingerprints themselves, but only a certain mathematical model of them, from which the fingerprint is not reconstructed.

Facial thermography– identification of a person based on the arrangement of the blood vessels of the face (similarly, recognition occurs based on the pattern of veins on the arm). In terms of reliability and time required for the entire identification procedure, this method is comparable to fingerprinting. Facial thermography is based on research showing that the veins and arteries of each person's face create a unique temperature map. A specially designed infrared camera allows you to scan information for fixed areas of the face. The result of the scan - a thermogram - is a unique characteristic of a person. The system allows identification even when a person is at the other end of an unlit room. The accuracy of the thermogram is not affected by high body temperature, cooling of the facial skin in frosty weather, or natural aging of the human body. The system provides recognition accuracy close to 100%, regardless of the use of special masks or even plastic surgery, since a thermogram is a diagram of the location of internal blood vessels.

There are four other facial recognition methods:

  • analyzing grayscale images for distinctive facial characteristics;
  • analysis of distinctive features (the method is adapted to changes in facial expressions);
  • analysis based on neural networks, based on comparison of “special points”, capable of identifying faces in difficult conditions;
  • automatic processing of facial images is based on identifying distances and distance ratios between easily identified features of a person’s face.

A system of automatic identification and tracking of persons through television cameras is built on these four principles. The system's capabilities allow you to record images of faces based on the best angle found during the capture process. Based on the received video signal, special algorithms are used to process the image to identify faces. A photo library of faces is compiled and stored in the archive. You can search the database of faces by time and date.

Technology identification of a person by hand shape is based on the analysis of a three-dimensional image of the hand. This method is not highly reliable, which is due, first of all, to the great variability of the shape of the hand both during a person’s life and in a relatively short time. A less significant drawback is the relatively large size of the receiving device (the minimum size in the plane cannot be less than the size of the hand, and in height it is more than 20 cm). Some advantage of this method is the small volume of the mathematical “portrait” of the hand (only 9 kB).

More often identification by voice characteristics used in security systems to control access to information. Usually done by saying a passphrase. Voice identification is a convenient method, but not as reliable as other biometric methods.

The main difficulty in identifying a person by voice is the wide variety of manifestations of one person’s voice - it can change depending on mood, health, age and much more. Another serious problem in the practical application of personal identification by voice is taking into account the noise component.

The person's signature. Identification of a person by his signature is a reliable method of biometric personal identification, but recognition procedures still look cumbersome and clearly inconvenient to use. Mostly signature identification devices use special pens, pressure-sensitive tables, or a combination of both. So far it has not come to their serious use, and they are very rarely used.

Iris and retina. In terms of the reliability of the identification procedure, this method is comparable to fingerprinting. The scanning device is essentially a high-quality television camera. A pattern of iris spots is found on the surface of the eye. A video image of the eye can be scanned from a distance of about a meter. Such devices are still very expensive. A retinal scan uses a low-intensity infrared beam directed through the pupil to the blood vessels at the back of the eye. In this case, the image of the iris must be clear at the back of the eye, so cataracts may adversely affect the quality of the iris image. With age, the location of spots on the iris can change, and quite dramatically. Negative identification error can occur with even the slightest injury to the eye, due to insomnia or increased eye strain.

Fragments of genetic code. None of the personal characteristics of a person listed above can compare in reliability of recognition with papillary finger patterns. Their only “competitor” is the human genetic code. However, practical identification methods based on the use of unique individual characteristics of fragments of genetic code are currently rarely used due to their complexity, high cost and the inability to ensure the system operates in real time.

Biometric readers are still very expensive, although the cost of various scanners has come down significantly in recent years. In addition, they have a relatively long identification time (for a large flow of people this may be unacceptable). All biometric readers are not designed for outdoor use.

The indicator of correct identification of various systems determines the reliability coefficient. The reliability coefficient shows the probability of errors and can be of the first and second types.

Error of the first type ( FRR-False Rejection Rate) is the rate of erroneous refusals to a client with access rights. Error of the second type ( FAR-False Acceptance Rate) is the probability of mistakenly identifying someone else as one’s own. In some systems it is possible to adjust the sensitivity threshold. This allows you to configure them in accordance with security requirements. But an increase in the sensitivity of the system is accompanied by an increase in identification time and an increase in the likelihood of a false refusal.

A reader is a device designed to read special code information stored in an identifier and transmit it in the form of a predetermined signal to the controller. Readers can be manual, stationary and stationary automatic, connected to the system.

Depending on the operating principles of the identifier, the technology for reading the code also changes.

The reader must be separated from the controller so that the circuits through which the lock can be opened are inaccessible from the outside. It is preferable to use the reader in a vandal-proof version. The most vandal-resistant are contactless card readers.

Passage point. Some obstacle (barrier) equipped with a reader and an actuator. The access point can be fully controlled and monitored at the entrance. In the first case, the passage is equipped with two readers - at the entrance and at the exit. In the second case - only with a reader at the entrance, exit is carried out freely or using the RTE button.

RTE button. The "RTE" (Request To Exit) button is used to force the crossing of the passage point, i.e., in other words, to open the actuator. In this case, the fact of opening is recorded in the controller’s memory, but who exactly passed through is unknown. Such buttons are installed to ensure unhindered exit from the premises.

ACS actuators

Locks. If the task of the access control system is to restrict passage through ordinary doors, then the actuator will be an electrically controlled lock or latch. Here you can use remote-type readers with a long reading distance.

Electric strikes inexpensive, easy to install on almost all doors. They are recommended to be used where the likelihood of break-in is minimal (doors inside the office). Doors equipped with an electric latch are usually locked with a mechanical key at night. Electric strikes can be voltage-opened (that is, the door will open when power is applied to the lock) or voltage-closed. The latter open as soon as the supply voltage is removed from them. All doors used for escape in the event of fire must be equipped with voltage locking devices.

Electric locks are divided into electromechanical and electromagnetic.


There are many different types. This is a fairly burglar-resistant lock. In electromechanical locks, in addition to the electrical circuit, there are mechanics similar to the mechanics of a conventional lock. This type of lock can be opened in three ways: with keys, with a mechanical button located on the lock body, or with an electrical signal. These locks can be overhead or mortise. Some disadvantage is the presence of rubbing parts. Most locks have a mechanical reset, which means that if an opening pulse is applied to the lock, the door will remain open until it is opened and closed again.


They are a powerful electromagnet. They are relatively inexpensive and easy to install. To close the lock, voltage is constantly supplied to it; opening is done by turning off the power (the locks are suitable for installation on escape routes in case of fire). The disadvantage is that the lock requires constant power to keep it closed. It is recommended to use a door closer in combination with such locks.

Turnstiles There are two main types of execution: waist and full-length. The operating principle of all turnstiles is approximately the same. The user presents the identifier to the reader, and if the identifier is valid, the turnstile is unlocked. The turnstile allows only one person to pass through with one card. Bar rotation sensors allow you to record passages through the turnstile and ensure correct recording of working hours in the access control system. Belt turnstiles should be installed only in an area of ​​constant surveillance by the security service, since such devices are easy to jump over, you can crawl under them or throw any objects over the turnstile. Turnstiles can be equipped with alarms that are triggered when attempts are made to bypass or jump over. For this, IR barriers, weight-sensitive sensors, etc. are used.

– the most popular and widespread type of turnstile, the most affordable compact device. The design is based on three rotating barrier bars; only one person can be between the bars at a time. There are two main types of tripods: mounted and stationary. The majority of models are electromechanical. Once passage is permitted, the drive is unlocked and the user must manually rotate the booms to the locked position. There are models of turnstiles in which the bar is rotated by a built-in motor. Today, turnstiles with “breakable” bars are produced for possible quick evacuation in case of an emergency.


They can be half-length or full-length. They provide a greater degree of security than a tripod and a gate, but also require more space for installation. The principle of operation is simple - three or four rotating blades are attached to the column, you need to push the barrier bars in the permitted direction, then the electric drive is turned on, and after a person passes, the turnstile automatically rotates to the closed position. To ensure free movement in any direction, a free passage regime is established.

When installing rotary turnstiles, a problem arises related to the passage of oversized cargo through these turnstiles. Therefore, when installing rotor turnstiles, additional passages should be provided. Such passages are also required by fire safety regulations. The turnstiles can be retrofitted with a metal detector, a weighing panel, an internal additional means of identification, and a reinforced blocker.


Subway turnstiles have the largest throughput, but they are very bulky. Models are produced with different types of sashes, different body designs, and different technologies for opening the sashes. Such structures can be either normally open or normally closed. The photocell system allows you to track the direction of the user’s passage and open (close) the doors depending on the situation.

Usually this is a partitioning bar (for example, in the form of a door), which must be pushed when passing. There are different types of gates - from mechanical, locked with a key or simply operating only as an exit, to gates with an electric motor, capable of opening at a given angle and closing independently after a delay time or after the photocell is triggered. When using them, it is easy to create the “normally open” mode. A motorized gate opens automatically either from the security guard's console or from a visitor identification device. But it also has a low level of protection for the protected object.

When equipping passageways with turnstiles of various types, it often turns out that the passage area is not completely blocked and there is a need to install additional barriers. Nowadays modular fencing is offered, made in the same design with turnstiles of various models and easily integrated with them. The fence posts have a shock-resistant and wear-resistant coating. It is possible to attach readers of all types to fences.

One of the main characteristics of access control and management systems is the throughput of turnstiles. It depends on three time parameters: the time the person presents the identification device; the time of reading the code and processing the request by the program of the access control and management system, the time of operation of the actuator. The estimated throughput capacity for three-bar turnstiles is 15–20 people per minute, for rotary turnstiles – 11–16.

They are classified as blocking type blocking devices. Used in enterprises with enhanced security requirements. In gateway mode, the turnstile can be stopped in an intermediate position, blocking the user's movement in order to request additional identification confirmation. Some companies produce models with an integrated weighing platform, which allows for control of one pass at a time. In this case, the ACS can compare the current weight of the user who presented the card and entered the controlled segment with information from the database.

The entire range of models of airlock cabins can be divided into automatic and semi-automatic airlocks. In automatic gateways, doors are opened and closed using various electromechanical actuators controlled by gateway logic. Semi-automatic gateways use conventional hinged doors that are opened manually and closed with closers.

They produce cabins with revolving doors that combine the features of full-height turnstiles and automatic gateways.

Gates and barriers are most often used at entrances to enterprises and in car parks. For this purpose, ACS includes special vehicle identifiers, readers for installation under the road surface, and remote readers. The main requirement is resistance to climatic conditions and the ability to control from the ACS controller.

Classification of ACS by consumers

Small system consumers. Traditional consumers of small systems are small offices, retail businesses, etc. Today, a new consumer has emerged among them - educational institutions, which are characterized by the use of access control systems in two main modes. Firstly, this is personal identification. This mode requires the installation of two readers for registration - at the entrance and at the exit. When a visitor presents a card, a photograph and brief information about the card holder appear on the monitor of the security post. Identification of the individual and delimitation of the passage is carried out by the duty officer of the security post. This mode is usually used in educational institutions with small flows of people.

Secondly, control and restriction of passage. In this mode, one or two tripod-type turnstiles are installed at the entrance. Typically, inexpensive turnstiles from domestic companies or “budget” models from foreign manufacturers are used. Passage through the turnstiles in both directions is possible upon presentation of a legitimate card. This mode is usually used in educational institutions with high traffic volumes. As a rule, in this case, CCTV cameras are installed above the turnstiles. In both modes, Prox cards are used for access, which are supplied to all employees and students of the educational institution. At such facilities, ACS is most often used without integration with other security systems and the main control is carried out at one (main) entrance. If integration is carried out, then, as a rule, with television surveillance systems.

Other features common to small systems are:

  • installation of access control equipment on the doors of all premises in the service area;
  • installation of dual technology readers on the doors separating the client area from the service area to increase the level of security.

Consumers of mid-level systems. One of the trends characteristic of traditional consumers of medium-sized access control systems (office buildings of large companies, business centers, wholesale trade enterprises, supermarkets, etc.) is the close integration of access control systems with a security alarm system (OS). The functioning of ACS and OS is closely interconnected, and at some facilities equipment for this purpose is installed from one manufacturer with full hardware compatibility. OS detectors in rooms equipped with access control means are connected in this case as follows:

  • to the ACS controllers themselves, equipped with resistive inputs;
  • to additional OS inputs on ACS interface modules;
  • to the inputs of security alarm panels connected to a single central ACS and OS controller.

At the same time, it is quite common to use access control systems and operating systems from different manufacturers with integration at the software level, which makes it possible to connect equipment already installed at the site to a single control center. This solution is more flexible, but less reliable in terms of stability of subsystem communication. For the user, the integration of ACS and OS means the ability to arm and disarm premises by presenting the user's Prox cards on dedicated arming and disarming readers installed on the floors, or using dedicated Prox cards on access control readers to the premises.

This scheme is especially convenient for business centers: the tenant independently arms/disarms their premises, while the duty officer at the central post controls this process in real time, and the access control database records who armed the premises and when armed or disarmed. Another trend in the consumer market for mid-level systems is the mandatory connection with fire alarm and building control systems at least at the level of dry contacts to unblock evacuation routes in emergency situations. To prevent the deliberate use of fire alarm system signals for the purpose of uncontrolled entry into the building, the unlocking of doors on evacuation routes of fire zones is controlled by the security service.

The next trend is the use of the capabilities of the access control subsystem to organize control of the reverse movement of employees' vehicles in parking lots.

And finally, the widespread use of ACS capabilities to control the movement of vehicles in underground parking lots. A request to enter or exit from the underground parking floor is generated by placing the car on the induction loop and presenting the driver's Prox card on the reader. Depending on the priority set for a given user, a route for the vehicle to pass is organized using traffic lights and demarcation devices. As a rule, to control traffic in underground parking lots, long-range readers from HID or INDALA and equipment for regulating vehicle access - barriers, gate drives, etc. are used. To prevent a break into the building, a lift-type hydraulic blocker can be installed at the entrance. The use of Radio-Frequency Identification (RFID) technology for identifying vehicles when managing traffic in parking lots has not yet found wide application. This is explained by the customer’s reluctance to have two cards on hand (for himself and for the car) or to install additional equipment on the bottom of the car. However, interest in such systems is growing, as is the volume of their purchases, despite the high price.

Some manufacturers of RFID transport systems offer interesting solutions based on integration with classic Prox technologies from well-known global manufacturers. These are dual technology cards, as well as specialized devices that allow you to transmit the code of standard passive Prox cards over long distances (up to 15 m).

Consumers of top-level systems. In the market of traditional consumers of large access control systems (large corporations with branches in one or several cities, powerful manufacturing companies, airline and transport companies with a distributed network of ticket sales and passenger service offices, etc.), a number of trends can also be identified. One of them is the construction of integrated security systems based on access control systems, combining into a single complex subsystems that allow solving various problems in the field of technical security equipment. The central part of such integrated systems is the software core, which provides logical integration and control of all subsystems:

  • maintaining a unified log of events for all subsystems;
  • processing any events of all subsystems;
  • programming reactions to events through a scripting language;
  • setting complex algorithms for interaction of subsystems.

Another trend is the use of a distributed, customizable network architecture when building an integrated security system. The operation of the system does not depend on the location of objects; all objects interact at the kernel level. Changes to the configuration are made without stopping or restarting the system, that is, automatically at all objects via communication channels. In case of temporary communication failure, changes are made immediately after the communication channel is restored. Large consumers are also characterized by the use of dual technology readers and cards in access control systems (Prox or Smart card plus fingerprint), increased requirements for the operational and technical parameters of actuator equipment for restricting access and their appearance.

Characteristics of network controllers

Basic characteristics

Let us immediately make a reservation that for multi-rank networks all the arguments look somewhat different than those given below. But, given the small number of such access control systems, this will not be a significant omission.

We will include the basic quantitative characteristics, such as:

  • Number of supported access points
  • Event Buffer Volume

Number of access points

Many years of practice have suggested the optimal solution, expressed in the ratio: one network controller per two access points. Why is this so? Because then such common resources as a housing, a power supply with a battery are required in smaller quantities. Controllers with a large number of serviced doors exist in nature, but in small quantities. Why?

Yes, because a 4...5 amp power supply with redundancy is already quite expensive.

The cost of communications between the controller and the doors begins to become significant. In addition, if the doors are located far from each other, then laying the lock's power wire becomes a problem - with current consumption of about an ampere on ordinary wires, up to half of the power may “disappear”, and the lock will stop working.

From a technical point of view, a single-door controller is ideal, since this ensures maximum system survivability and minimizes wiring. But, if we take into account the economic aspect, then two doors are optimal.

User database size

This characteristic is determined solely by the number of people who will walk through the most intense point of passage (the classic case is a factory entrance). When choosing a system, compare this characteristic of the system in question with your prospects for the next 5 years, and you will receive your requirements for this parameter.

With a controller serving more than one access point, it is naturally necessary to take into account the total traffic through all access points, taking into account the intersection of these sets.

Event Buffer Volume

This characteristic determines how long your network system can operate when the computer is turned off (frozen, burned out) without losing information about events. For example, for an office with about 20 employees, an event buffer volume of 1000 may be enough for up to a week. And for a factory entrance, through which 3,000 people pass, a buffer for 10,000 events is hardly enough for a day.

But is it really possible to talk about a serious corporate system in which the security system cannot “revive” the computer within 24 hours?

The most “advanced” controllers make it possible, when configuring the system, to redistribute the total amount of memory between the user and event databases.

// Send the request

You can send a request for additional information or a commercial offer.

An access control and management system (ACS) is a set of software and hardware equipment to ensure safe access to a protected area. ACS devices allow you to track working hours, control the movement of personnel around the territory, and also perform personal identification using digital identifiers or biometric data.

The access control system can be integrated with the general security complex, and. Access control equipment includes many devices, each aimed at providing security.

Main elements of an access control system:

  • is the main device of the ACS. It performs visitor identification, access control, data monitoring and control of barrier equipment. It can be autonomous and work with one access point, or networked with several;
  • designed to recognize encoded information from the media and transmit it to the controller. The media used are cards of Touch Memory, Em-marine, HID, Indala, Proximity and other formats;
  • represents a device for storing information and making it available for recognition by a reader. Identifiers are electronic keys, contactless cards, key fobs, bracelets or biometric data;
  • entry point or restriction device. This is a lock, barrier, turnstile, gate, electronic checkpoint or other fencing;
  • designed to open a passage without an access card;
  • allows you to centrally manage controllers, view the database, differentiate rights and configure ACS parameters.

There are special technical requirements and methods for classifying ACS; they are described in more detail in GOST R 51241-2008.

Selecting an access control and management system

When designing a complex, it is necessary to take into account several main factors, including: the location of the access control system, the number of users and intensity of use, the possibility of integration with other security systems.

In our trading company you can buy ACS from manufacturing companies PERCo, CAME, Nice, FAAC, DoorHan, Parsec, IronLogic. All devices comply with standards and have quality certificates. The price of an access control system is determined depending on the configuration, functionality, complexity of installation and programming. Our company also provides services for installation, configuration and installation of software.

ACS is an abbreviation, a word formed by shortening words and read (deciphered) by the alphabetical name of the initial letters of the phrase “Access Control and Management Systems”. In English - Physical Access Control System, abbreviated PACS
In general, an access control and management system is an electronic system that physically limits access to somewhere, for example, entry and exit from a protected area.

Why do you need an access control and management system?

An important section that is usually skipped because... Often you already have an idea of ​​what you want to get from the access system. But even professionals in this market often do not have a complete understanding of the capabilities of modern systems.
Spend 5 minutes on this section and you will be surprised how much a modern access control and management system can do.

ACS controllers

The central control device of any access system is the controller. The controller solves the following tasks - storing a user database, storing an event log, managing blocking devices. Without exaggeration, we can say that the controller is the brain of any access system. Controllers can be stand-alone or networked

Autonomous ACS controllers
Standalone controllers, as their name suggests, operate exclusively in standalone mode, that is, other controllers cannot be connected to them. If you have several autonomous controllers installed at your facility, then to program them you will have to physically approach each one, put it in programming mode and add or remove cards. The main attractive feature of standalone controllers is their low price. .

  • Standalone controllers -price from 590 rubles
Network ACS controllers
Network controllers, no matter how many there are, are easily combined into one network, and as a rule, they are connected to a computer with installed software from which you can easily and simply control the entire access system. .

Using network controllers, you can create complex POS systems integrated with other security systems, building life support systems and enterprise management systems.
  • Network controllers -price from 3,162 rubles
Personal computers and software
System software for access control systems can be of different sizes - from a simple isolated solution installed on one PC in an unprotected area to a powerful network package installed on a server located in a secure room with controlled access.

All software can be classified according to several criteria.

Software price
Paid - the classic and most popular approach, as is known from the example of Microsoft, the sale of software brings fabulous profits.

Free - It is important to note that free software does not always mean reduced functionality. For example Rusgaard, Era of new technologies offer all functionality completely free of charge.

operating system
99% of manufacturers release software specifically for Windows, but there are alsolucky exceptions for Linux

Web server software
I would especially like to dwell on this version of the software, because it promises great advantages. Software of this type is extremely easy and convenient to use, because to use it you do not need to install anything, you simply give the user an IP address, set a login and password for access. And the entire workplace is ready for use.


Any browser is used to work with the software. An additional bonus is the cross-platform nature of client computers, because the browser works perfectly under operating systems based on the Linux kernel, which, as is known, is usually free.

Integration of ACS with other security systems
One of the most important sections to pay attention to, especially if you are planning an access system for an entire building or most of it. The type and level of integration always depends on the end user's needs. The first big advantage is the concept of one window in one software, in fact in one window you can see

Integration of access control systems with enterprise management systems
A modern enterprise uses a whole range of systems - document management systems, personnel records systems, accounting systems, CRM systems, etc. Manufacturers of access control systems follow three paths. First. For the most common systems they produce ready-made integration modules.

  • Software modules for integration with 1C - price from 18,000 rubles.
Second. Providing access to the ACS database.
Third. Using special software components, for example web services, which create a software layer (SDK) for working with ACS objects. The most preferable option since a third-party developer is not tied to the existing database structure and has virtually no restrictions.

Integration with video surveillance systems
By integrating video surveillance with access control and other systems, we can get a much more effective and functional solution than using each system separately.

There are many ways to integrate
1) Integration of live video broadcast from cameras located on access points with access control software and, accordingly, integration of data from an access control system and any other system with video surveillance.
2) ACS and other security systems using detectors can initiate the inclusion of pre- and post-alarm video recording on camera channels that provide an overview of the event site. This allows you to search for video recordings in the archives of the video surveillance system by time or nature of the event, for example, using search criteria such as “forced opening of the door to the warehouse” or “violation of the perimeter in zone No. 3 at night.”


3) Tracking the movements of individual users and creating a history of their access to various areas of the facility for subsequent verification in order to identify suspicious activity or users of stolen tokens.
4) Transfer of PTZ cameras with zoom to predetermined positions upon the occurrence of certain system events - for example, when a user enters a bank office, the camera automatically zooms to a position that allows obtaining a clear image of the person entering.
5) The use of video surveillance in conjunction with automated timekeeping systems makes it possible to identify or completely eliminate the practice of one employee registering the ID cards of others when coming to work and leaving it.

Integration with security and fire systems
Security and fire systems are essential for ensuring the safety of any facility. The integrated software interface of the access control system will allow security employees not only to monitor the state of the elements of security and fire systems, but also, if necessary, to manage them and configure the logic of interaction between the access control system and the fire alarm system 1) Monitoring the state of security (fire) zones of fire alarm systems, management of security (fire) zones ) zones or group of fire alarm zones 2) ACS response to alarm events of the security and fire alarm system


Integration with computer access
Data access control is an area related to physical access control, but often all this control comes down to password protection of individual PCs. By combining the two systems, you will have the opportunity to significantly increase security in your company.

For example, physical access to certain computers may be limited to users who have smart cards with the appropriate credentials, and the same password may be required when attempting to access a corporate data network. In such a combination of systems, it is possible to organize a ban on access to the network for users located outside the corporate office.


Another example of the joint use of systems - this time data access systems, access control systems and video surveillance: having detected a DDOS attack on a corporate server, the integrated system automatically locks the doors, displays images of the entrance doors and perimeter on operator screens, and sends alerts to the physical security service.
The fact is that network attacks and physical attacks on objects are often carried out simultaneously by attackers.

Integration with elevator systems
Allows you to organize access both to the elevator cabin itself and authorized access only to a certain floor. In addition to a high level of security, these systems are actively used by management companies as a means of combating apartment owners who do not pay rent.

The most popular ACS manufacturers
As you know, a theater begins with a hanger, and the choice of access control systems begins with the company that produces them. The market for access control systems is characterized by fairly high competition between manufacturers; the Russian ACS market alone represents several hundred different Russian and foreign manufacturers.

A review of several hundred ACS providers is meaningless and merciless for any reader; we will try to highlight the most popular of them, from our point of view, of course, and for objectivity we will add the point of view of Yandex. We will separately consider Russian manufacturers separately from foreign ones. We will evaluate the popularity of Russian manufacturers using the largest search engine in the RuNet, Yandex, or rather, using one of its services, Yandex Wordstat since there are no public companies among Russian manufacturers, and none of them voluntarily disclose revenue.

The revenue of the majority of foreign manufacturers, to which we would like to draw your attention, has been disclosed, and not just disclosed, but there is a rating of the largest manufacturers of security systems. This rating includes manufacturers specializing in access control systems.

We will include all manufacturers who at least produce controllers and software for them as ACS manufacturers.

Russian manufacturers
PERco Company - popularity according to Yandex17,997 impressions per month
An undisputed leader, primarily because it is the only manufacturer in Russia that produces all elements of access control and management systems. One of the oldest companies, founded in 1988 in St. Petersburg, where it is still based, one of the few Russian manufacturers that sells its products not only in Russia, but in 83 other countries around the world. The PERco company has finished product warehouses in Moscow, St. Petersburg, Pskov and the EU (Tallinn, Estonia)

  • PERco controllers -price from 8,146 rubles
  • PERco software -price from free to 70,163 rubles
  • Turnstiles PERco - price from 47,305 rubles
  • PERco fencing -price from 18,496 rubles
  • Electromechanical locks PERco -price from 6,685 rubles
Company Parsec - popularity on Yandex4,215 impressions per month
Another one of the oldest companies on the Russian market of access control systems, it has been producing products under the Parsec brand for more than 20 years.
  • Parsec Controllers -price from 4,410 rubles
  • Parsec Software -price from free to 245,000 rubles
  • Parsec Readers -price from 7,448 rubles
IronLogic Company - popularity on Yandex3,621 impressions per month
RF Enabled ID is a manufacturer of equipment under the Iron Logic brand. The Iron Logic trademark has existed in the security market for more than 10 years. The company sells its equipment in more than 30 countries, having its representative offices in England, Belarus, Bulgaria, Kazakhstan, Latvia, Lithuania, Russia, Finland, Ukraine, Estonia.
  • IronLogic Controllers -price from 590 rubles
  • IronLogic Software -price from free to 27,880 rubles
Sigur Company (ex Sphinx) - popularity on Yandex2,708 impressions per month
  • Sigur controllers -price from 12,510 rubles
  • Software -price from free to 31,800 rubles
RusGuard Company - popularity on Yandex1,247 impressions per month
  • RusGuard controllers -price from 9,500 rubles
  • Software - for free
Prosoft Biometrix company - popularity on Yandex423 impressions per month
  • Biosmart controllers -price from 5,900 rubles
  • Biosmart Software -
    This is, of course, the turnover of the entire ASSA ABLOY Group, but it is obvious that the turnover of HID Global is also a significant amount.ASSA ABLOY is a public company, its shares are traded on the stock exchange

    NedAp Company- $138.2 million
    The Dutch company is one of the leading manufacturers of radio frequency identification systems. The company was founded in 1929 and is focused in its work on the production of electronic automatic identification systems.
    NedAp is a public company, its shares are traded on the stock exchange

    Suprema Company- 52.1 million dollars
    Korean company specializing in biometric access systems.Suprema is a public company, its shares are traded on the Korean stock exchange.
    • Suprema controllers and readers -price from 7,454 rubles
    ZKTeco company - 1,203 impressions per month
    The Chinese company ZKTeco was founded in 1985 and specialized in biometric access systems; the company currently produces a full range of equipment for security systems. But biometric systems still remain the flagship of sales, thanks to their low price and acceptable level of quality. The production area is more than 50,000 square meters. meters.
    • ZKTeco controllers -price from 7,681 rubles
    • ZKTeco software -price from free to 36,900 rubles
    How to save money on an access control system
    The principle of reasonable savings has always been used by Intems engineers when implementing projects. We will share some fundamental principles.

    Use standalone controllers
    In addition to the fact that stand-alone controllers themselves are much cheaper than networked ones, they allow the use of cheaper blocking devices. For example, electromagnetic locks for an autonomous access control system do not require a reed switch or a Hall sensor; accordingly, a lock not equipped with these sensors is much cheaper.

    Use biometric access control systems
    Modern identifiers for classical systems are correctly made in the form of a plastic card and are quite reliable. However, they are quite fragile and not at all difficult to break. Well, naturally, like all material things, they are lost, or a fired employee may simply forget to hand over the ID and leave with it. In a word, identifiers are a consumable, which will not be a consumable if you use biometrics.

    Biometric systems use a person’s biometric feature as an identifier, which is an integral part of it; there is no need to issue it to the person and spend money on purchasing identifiers. The savings effect will be especially noticeable on large systems with more than 5,000 users.

    Use controllers with RS-485 communication interface
    Modern controllers use the Ethernet protocol for communication, the maximum line length for which is limited to 100 meters. If the distance between the controllers is more than 100 meters, you need to use some kind of signal amplifiers. And if the route runs along the street, then there is also specialized equipment to protect these signal amplifiers from adverse climatic conditions.

    Controllers using the RS-485 interface can be separated from each other at a distance of up to 1200 meters. Possible savings on face value.

    Save on software
    When designing large and medium-sized access control systems, it is necessary to use a fairly decent number of computers with ACS software installed. For security guards at the checkpoint, for the HR department, and accounting, security services, and so on and so forth.

    On each such client computer, in addition to the ACS software itself, an operating system must naturally be installed, and as a rule, this is Windows. The cost of a license starts from 7,900 rubles, at the time of writing. Fortunately for you and me, we have the opportunity to do without Windows.

    Firstly, this is Linux-like software, for example for Sphinx there are distributions of software systems for Debian. As you know, Debian is free software, that is, it is completely free.

    Secondly, it is Web server software
    And this is even more interesting than software on Linux, because... you don't even need to install anything at all. But the savings are actually the same on the cost of Windows.

    How not to save money?
    Choosing an access system is a serious matter; for more than 11 years working in this market, we have seen a bunch of all kinds of rakes that clients most often step on, and let’s be honest, we ourselves have stepped on them. Therefore, we simply cannot help but share the list of the most common ones.

    Choose the cheapest equipment
    Remember how you bought some cheap, low-quality item and remember your feelings when this item broke down after a couple of days of use.

    The same thing will happen with cheap equipment for access control systems; money will simply be wasted on equipment and its installation.

    If your budget does not allow for the installation of a normal system, it is better not to install any. No matter how strange this advice may sound, from a company that sells equipment and installs it, we honestly think so.

    Install an access control system yourself
    By approved by Olympus To master something perfectly, you need to spend 10,000 hours. This is about 10 years.

    Just choosing the option of self-installation, consider the difference between a person who has been installing access control systems for 10 years, setting up software to manage these systems and training users.

    To master the operation of an access control system at this level, you will have to spend a lot of time.

    Choose the cheapest contractor for installation
    The situation is exactly the same as with manufacturers of cheap equipment, only in this case, instead of cheap components, cheap low-quality labor is used.

    The most important
    Of course, you will have to pay for a professional access control system, but fortunately in rubles, and not in nerves and time, health or property.

    At this point it would not be amiss to mention that the office of our company “Intems” is located in Zelenograd, accordingly, our expenses for maintaining the operation of the office and maintaining employees on our staff are an order of magnitude lower than in Moscow.

    Therefore, we can afford to work at prices lower than in Moscow - while maintaining all other possibilities. The most important opportunity that the “new Leningradka” allows us to preserve is the time it takes the installation crews to get to Moscow - 10 minutes.

    Well, the most important thing is your opinion

    Nothing motivates me to write new articles more than your rating; if the rating is good, I write more articles; if it’s negative, I think about how to improve this article. But, without your assessment, I do not have the most valuable thing for me - feedback from you. Don’t think it’s difficult, choose from 1 to 5 stars, I tried.
    Hobby - security systems. Interests besides work - security systems. Religious views are security systems.

    Let's be friends on social networks, These are mine -