OGL Fingerprint Lock Series Magnetic Lock Series Magnetic Lock Bracket Series Electric Bolt Lock Series Electric Bolt Lock Bracket Series Exit Switch Cathodic Lock Series Access Control Machine Building Intercom Module Reader Series Multi-door Networked Access Control Controller Access Control Power Supply
Electric plug lock installation steps diagram cathode lock installation steps diagram magnetic lock installation steps diagram electric plug locks use common sense cathode locks use common sense magnetic locks use common sense door clips to install accessories schematic diagram of electric plug locks installation animation
[Access Control Function] [Basic Function]
[232-485 or TCP / IP network communication method]
1. 20,000 registration card permissions: Each controller has the right to 20,000 registration cards.
2. 100,000 offline storage records: 100,000 punch-in records can be stored offline, and each record information includes complete information such as whether the card number passed the time and place. If the storage is full, the oldest information will be squeezed out in a stack, and the latest information will be saved. If the button information recording and alarm recording functions are enabled, these will also be counted as recording information. If not enabled, only the card swiping information will be recorded.
3. Flexible authority management: You can set which doors a certain person can pass, or a certain person can pass all the doors. You can also set which doors some people can pass through. The setting results can be arranged by door or by person, and the user can clearly see who can pass through a door, or which door a person can pass through. At a glance, and can be printed or exported to Excel reports.
4. Time period authority management function: You can set a certain person to a certain door, the day of the week can enter the door, three to several times a day can enter the door.
5. Offline operation: After uploading through software settings, the controller will remember all permissions and record all information. Even if the computer software and computer are shut down, the system can still work normally offline and never lose information even if the power is off.
6. Real-time monitoring photo display Door status display: You can monitor the card swipe status and the entrance and exit status in real time, and you can display the photos stored in the computer by the card swiper in real time for security personnel to check with me. If the door magnetic signal line is connected, users can see at a glance which doors are open and which doors are closed.
7, real-time extraction: users can monitor the real-time, while automatically extracting the records in the controller, swipe one and upload one to the computer database.
8. Forced closing of doors: If some doors need to be opened for a long time, you can set them to be normally open by software. If some doors need to be closed for a long time and you don't want anyone to enter, you can set it to normally closed.
9. Remote door opening function: After receiving the instruction, the administrator can click a "remote door opening" button on the software interface to remotely open a door. The remote door opening record can also be formed by setting.
10. Interface lock function: The operator needs to leave the work place temporarily to lock the interface. The background software continues to run and monitor. Others cannot take the opportunity to operate the software. After the operator returns, enter the password and return to the software operation interface.
11. Time period link function: If the customer requires more than three times per day for the access control (a few minutes to a few minutes can be entered), the time period link can be used to expand to six or nine or even more.
12, a small number of permissions to modify the separate upload function: if the user just adds a few or modify the permissions of several people, there is no need to upload all permissions again, the added and modified permissions can be uploaded separately, without much time. The report is the same.
13. Quick query of the number of people in the door: You can query how many people are in a door or in an area (with several doors), and display the list of people in this area. For example: for company management, the boss or the personnel department can quickly know how many people have come to work in the company. If it is abnormal, you can immediately do an attendance statistics and check the personnel who violate the discipline. For example: some companies have meals, you can quickly know how many people are working in the company, you can notify the number of people to the cafeteria, how many people cook, and avoid waste.
14. Personnel quick location query: You can quickly find out where a person is now and how long he stayed there. It is used in some large companies, because of confidentiality, it is not allowed to turn on the mobile phone, or the mobile phone cannot be contacted, so that you can know where he is in the building and find him.
[Access Control Function] [Extended Function]
1. Card + password function: If you use a card reader with a password keyboard, the system will have a card + password function. That is, the door can be set to require the user to enter the correct password after swiping the card, and the door is opened only after the card and password are correct. One card and one password, that is, everyone has their own password. This function can prevent the card from being picked up by someone to open the door, or steal the door of a colleague to open the door and do things that are not done. For the same door, some people can set the card + password required by some people, and some people only need to swipe the card to enter. The password can be 1 to 6 digits.
2. Manually enter the card number + password to open the door: If the user enables this function, there is no need to bring a card, just enter * card number * password #, the door can be opened, and the access record is stored.
3. Super password function: Each door can be set with a maximum of 4 passwords, that is, as long as any of these passwords are entered, the door can be opened. The system does not record the event and the person who pressed the password.
4, linkage output function: If the controller is connected to the alarm output and fire linkage expansion board, it has the ability to drive another relay to act simultaneously when the door is legally opened, to control more equipment. The action time of the linkage relay can be set from 0 to 600 seconds.
5. Illegal intrusion alarm: also called forcible door opening alarm. That is, the door was not forcibly opened or entered through legal means (swipe button, etc.). The system software monitoring interface will prompt the time and location of the alarm information in red, and drive the computer speakers to remind the staff on duty. If the controller is connected to the alarm output and fire-fighting expansion board, it can also drive the alarm on the spot to scream, deter criminals and remind security guards to come. This function needs to install door sensor or select electric lock with door sensor feedback signal output and connect it to the controller.
6. The door has not been closed for a long time: the door has been opened for a long time (how many seconds is it to open the alarm, this time can be customized) Forgot to close the door, the system software monitoring interface will prompt the time and location of the alarm message with red, and drive the computer The speaker reminds the attendant to pay attention. If an external alarm output and a fire-fighting expansion board are connected externally, the alarm can be driven on site to remind the relevant personnel to close the door. This function needs to install door sensor or select electric lock with door sensor feedback signal output and connect it to the controller. It can be set for how many seconds the alarm is issued or until the alarm is reset.
7. Coercion alarm: When a staff member is threatened to open the door, the staff member can enter a coercion password on the password keyboard, and the door is opened, and the personnel of the staff member will not be harmed by the gangsters who are ashamed and angry. The software monitoring interface has shown that there is an alarm message that the place is being forced to open the door, and measures are taken. At the same time, the computer speaker in the control center will issue an alarm sound to remind the staff on duty to pay attention in time. This function is much used in the halls of savings houses, bank vaults and other occasions.
8. Illegal card swipe alarm: Also called invalid card swipe alarm. That is, if someone tries to swipe the card with an unauthorized card, the system will give a red alert on the monitoring software interface, and drive the computer speaker to remind the staff on duty. If an external alarm output and a fire-fighting expansion board are connected externally, the alarm can be driven on site to deter people with bad attempts at the scene and remind security guards to come.
9. Anti-passback anti-tracking function: In some specific occasions, cardholders must swipe out from a door when they swipe in from a certain door, and the swipe records must correspond to one in and one out strictly. Enter the door without swiping the card, and follow others in, and the system will not allow him to go out when swiping the card. If the card is not swiped, follow the others out, and he will not be allowed to enter next time. Or after someone swipes the card in, throws the card to another person through the window and tries to come in, the system will also refuse that person to swipe the card in. This function can be realized if the user set to enable this function. This function is generally used in the army, national defense research and other occasions. Our system can only achieve anti-passback inside the door, that is, swipe in from this door, and must swipe out from this door, and cannot swipe in from this door, and swipe out from another door. It is also possible to do anti-passback in the controller, such as a two-door controller, from any one of the two doors, and exit from any one. It can also be used for a four-door controller, which specifies which door and which doors are anti-passback to each other. It is used in some exhibition venues, which requires entering from a designated door and exiting from a designated door.
10. Interlocking: In some special occasions, one door is not allowed to enter before another door is closed. Two-door controller can realize two-door interlock, four-door controller can realize two-door interlock, three-door interlock, and four-door interlock. This function is mainly used in strict occasions such as bank depository vaults.
11. Multi-card door opening: There are certain occasions where this function needs to be enabled, that is, several people are required to be present at the same time, and the card door is opened in sequence. Someone could not swipe the card when he came alone. This function is generally used in museums such as bank vault antique collection sites. The system can be set to enter the door with multiple cards and go out with a single card to open the door, or it can be set to enter the door with multiple cards and go out with multiple cards.
12, timing often open the door function: This function is also called the timing task function. Some foreign administrative offices such as the embassy of the Office of the Civil Affairs Bureau. It is required that the door be opened during working hours during the day, and people who come to work outside can go in and out freely. After work at night, they are required to swipe their cards to allow entry and exit. Late at night, the door remained closed, and employees inside the unit were not allowed to go out. You can enable this function to achieve. For example: set the door to always open at 8:30 in the morning, and always close at 12:00 in the morning at 18:30 in the evening. This function can be set for a certain door or all doors. Each controller can set up to 64 timing tasks. This function can be run offline.
13. Record button opening event: Enable this function to record when the button has been pressed to open the door.
14. Timing extraction record function: You can set the computer program to automatically extract the records in the controller. You can set multiple times to retrieve records in a day. This function requires the computer and software to be running at the time.
15. Timed upload permission function: As the upload permission, the controller cannot judge the current and legality of the card permission, and it needs to be uploaded before it is judged. Therefore, if there is a large number of upload permissions, the controller will not allow the permission to upload for a short time. The card passes, so using the regular upload permission function can make the system automatically upload when the night is quiet and no one uses the access control. Functionality requires the computer and software to be running at the time.
16. You can directly switch to the community management interface: You can switch from the office management interface to the community management interface through the settings in the options, and the name of the original "department team" in the corresponding interface is automatically modified to "building number", etc. Fully meet the personalized interface requirements and name matching of the community management.
17. Emergency door closing function: In some occasions, it is called "emergency double-close function". This function does not require software setting. You only need to connect the emergency switch to a specific connection point of the controller. When an emergency occurs, press the emergency switch, the controller All the doors under its jurisdiction are closed, and the buttons cannot be locked by pressing the button and swiping the card. Used for "close the door and catch thieves" and other occasions. Unplug the emergency switch system to resume normal operation.
18. Operator sub-department management functions: Some companies require sub-departments to manage access control and attendance, and operators in their own departments manage the door and authority of their own departments. Senior administrators can manage doors and people across the company.
19. Video access control function (take photos and videos after swiping the card and button): If the access control system is equipped with micro-farming video access control accessories, you can automatically take photos and 3 seconds of video after swiping the card or button to open the door, which is easy to check whether it is The card holder himself came to hold the card to open the door. Record photos and videos for later inquiry, and also monitor the video scenes of several doors in real time. This function requires the computer's video surveillance interface to be running and running the software.
20. Electronic map function: The icon of the door can be placed at a certain position on the corresponding map, and the display is more intuitive and user-friendly during real-time monitoring.
21. Swipe to open and close the door: Swipe a valid card, the relay is on, and the relay is off.
For example, the audio-visual classrooms and projectors of some schools are not allowed to be used casually. A legitimate teacher swipes the card and supplies power to the projector through a relay. After class, swipe the card again to turn off the power. Others cannot use it.
22. First card opening: For example, a company requires that several of the companies designated by the company have the first card opening permission. Only those who have the first card opening permission in the morning swipe the card, and other people can legally enter, or keep the door open, and the door is on time at night. Close. After setting this function, if the person who has the first card door opening authority does not come, other legal cards cannot enter, you must wait for someone who has the first card door opening authority to come.
[Attendance function] [Normal attendance management function]
1. Flexible work time setting: You can set a few minutes late to work, not to be late, to adapt to the inconsistency of each employee's schedule, or the company's humanization rules can be a little late, and if strict requirements can be set to 0, that is not allowed One second late.
2. You can set statutory or custom holidays, and the processing function of National Day holiday: you can set holidays such as May Day New Year's Day, or you can define your own. For example, "Factory Day", etc., completely intelligently solve the problem of attendance setting for long holidays such as National Day. National Day long holiday is a policy implemented in China in recent years. The government will transfer a Saturday and Sunday before National Day to rest together with National Day holiday Holidays, and find a similar Saturday and Sunday to make up for work. Many software can not manage the attendance of this special situation and form a loophole in attendance.
3. Define punishment measures: for example, how many minutes late to leave and early leave counts as absenteeism.
4. Some gates can be designated for attendance: some points can be designated for attendance, and some points are only disabled for gates, to avoid overly complicated or impure attendance data.
5. You can set the number of punches per day: you can set the requirements to punch 2 or 4 times per day according to the regulations.
6. You can flexibly set the attendance settings on Saturdays: you can set Saturdays and Sundays off, Saturdays and Sundays on work, Saturdays and Sundays and so on.
7. You can enter the leave list to flexibly increase and customize the holiday name: You can enter leave, sick leave, business leave, annual vacation and other holidays.
8. Manual sign-in can be legally performed: If an employee fails to check in or is late for special legal reasons, the personnel department can sign in according to the sign-in notice issued by the department head.
9, detailed attendance report: you can check the list and print or export to EXCEL, daily attendance details of employees, whether they are late for work, etc. You can choose from several months to several months to check the detailed attendance of the sub-teams and individuals, or you can query only the abnormal attendance, such as only the late attendance details.
10. Detailed summary attendance report: can be queried and printed, or exported to EXCEL, monthly attendance summary report of employees, or a certain time attendance summary (easy to handle the attendance summary of employees who left midway to the financial department), can be divided into The department team or individual attendance summary can count how many minutes are late, how late, how early, how many minutes are early, how many hours are overtime, how many hours are absent, how many days are not swiped, how many times are signed in, how many days are on business, how many days are on vacation, how many days are on sick days, and how many days are sick. Because there are many items to print, you can choose to print in landscape or portrait.
11. The report format can be customized: you can select the width order of the items to be printed, and can save it so that you can use the format next time.
Some people can be set up for attendance, and some people do not need to be on time: for example, some special positions such as general manager or positions that need to go out frequently, this part of the staff must not check in, the software can set them to not attend attendance, and the report can be blocked. Show the attendance records of these people.
[Attendance function] [Multi-shift shift attendance management function]
1. You can set up 99 shifts: in addition to normal shifts, you can set up 99 shifts.
2. Support for night shifts: The commute time is set at 0:00 and night shifts are not scary.
3. Support batch scheduling according to the scheduling rule of the scheduling cycle: The scheduling cycle can be customized, and the system will automatically schedule the designated time range according to the scheduling rule. Scheduling can be divided into departments and groups and individuals, and you can manually modify the shift of a certain day manually.
4. You can set the number of punches for each shift: each shift can be set to punch 2 punches 4 punches 6 punches 8 punches, you can define whether this shift is used for overtime.
5. You can calculate overtime in two overtime modes: postponing overtime and starting overtime at regular intervals.
Postponing overtime means that employees need to work overtime after work without using an overtime card. They only need to swipe the card when they leave after overtime. The software will only be able to calculate his overtime.
For example: 17:30 off work, if you set 30 minutes after work as the start of overtime calculation, then 17: 30-18: 00 is the free time to punch off work, after 18:00 off work belongs to the overtime calculation range, overtime time from 17:30 off work time Count it to half an hour.
For example: 18:15 counts overtime for half an hour, 18:35 counts overtime for 1 hour, and 19:08 counts overtime for 1.5 hours.
Start overtime mode at regular intervals: After the employees get off work, get off the work card. After dinner, the company will work overtime according to the time specified by the company, and the software will intelligently calculate his overtime.
For example, if a company gets off work at 17:30 and asks employees to work overtime after 19:00, you can set 19: 00-20: 00 as the overtime period. If the employee leaves work at 19:35, half-hour overtime is calculated. If you get off work at 21:06, it counts as two hours of overtime.
[Online patrol function] Basic functions:
1. You can flexibly set the inspection error time: for example, you can set the number of minutes late or early, which is considered normal inspection, and how much time is missed.
2. Inspectors can be designated: All employees of the company have a card, and the inspectors of the department responsible for inspection can be assigned to have inspection functions.
3. Inspection points can be designated: There may be many access points of the company, only some of which are also used as inspection points. The designation makes the setting more clear, accurate and convenient.
4. You can define the planned inspection route: some points can be used as inspection points when you return, and you can also be used as inspection points when you return.
5. It is possible to define inspection tasks: set which inspection route a certain inspector starts on which month and day.
6. Clear inspection report: you can see the inspection status of all inspection tasks, whether late or missed.
7, monthly or a certain period of inspection statistical reports: convenient for monthly summary and temporary spot checks to summarize the quality of inspection work.
Humanized design concept of management software
1. Combination of advancedness and compatibility: Windows access control and attendance all-in-one smart management software based on the advanced .net environment and C / S structure of ACCESS2000 SQL database. While guaranteeing advancedness, we attach great importance to customer compatibility applications , To ensure that customers can easily and smoothly install Windows2000 NT / XP / 2003 / Vista and other operating systems.
2. Multi-language format is suitable for more customer groups: Simplified Chinese version, Traditional Chinese version, and English version. Three versions are released simultaneously. There are installers in different languages to easily install the operating systems in each language. You can also install software on the simplified operating system and switch to traditional or English interface, bringing more convenience to users.
3, a variety of popular and stable communication and networking methods: fully support serial 232 485 TCP / IP three communication methods, truly fully support LAN and Internet wide area Internet communication and management.
4. "Approachable, easy-to-understand, fast and convenient operation interface": powerful and easy to use, practical and convenient, fully in line with Microsoft's software style and operating habits, quick menus and user-friendly design make the training work complete in a few minutes The user can easily grasp the manual by looking at the manual, the user can leave, and the new employee can easily get started. It eliminates the worries of the end customer in using. More user-friendly operation guide, so that customers can easily get started and manage the access control system even without reading the manual. We try to avoid abstract or professional descriptions on the interface as much as possible, and try to show it in a way that is easy to understand and clear at a glance. For example, after setting, customers do not need to know the special terms and settings such as the controller card reader. What I see is a group of intuitive door icons that directly perform the desired operation on the access control.
5. Convenient, convenient and safe "fool-like" upgrade mode: The database is automatically and seamlessly upgraded when the software is upgraded. The database does not require professional knowledge and professional maintenance. The software upgrade is "fool-like", as long as you simply perform uninstallation and installation can. The database will automatically determine the software version, add and delete fields, and everything is done inadvertently, allowing customers to easily get the latest software features. The software will automatically retain the original settings and parameters of the customer. The database will also be automatically compressed to improve the speed and efficiency of the next use, and it can automatically retain the backup of the most recent 4 databases to prevent the database from being restored due to the illegal operation of the operating system.
6. "Batch setting" makes customers more efficient in the process of use: Batch setting is one of our design concepts from the perspective of customers. We use it in many places where software is commonly used or may be used. , Have arranged a batch setting function. Let operators use this software more efficiently and easily. For example: batch setting of access control authority, you can set the passable people for a certain door in batches, or set the passable doors for a group of people in batches, of course, you can also delete their permissions in batches. In addition, for the setting of attendance and leave, we It can also be processed in batches. The card number and name department of employees can be imported and exported in batches through Excel.
7. "A clear view" interface mode and report format: We condensed the operations of almost all commonly used functions to the overall console interface, and easily realized powerful functional operations through a clear button and right-click shortcut menu. In ensuring the system interface At the same time, the client can see all the practical functions and report items of the current interface at a glance.
8. "Perfect unity with powerful functions but simple operation": Although our system is powerful and suitable for the access control needs of units and functional departments in various fields, we hide many uncommon functions in the extended functions. If customers really need Use this function, you can release the use, if you do not shield it, customers do not need to learn and master the use of these functions. Make the software look more easy to understand. The system contains many specific industries for the special use of access control, such as using For the anti-passback of troops and scientific research institutions, it is used for interlocking multi-card opening of banks' vault systems and other functions to meet the needs of multi-directional customers for access control. Users who do not need these functions, the system will automatically block these functions, making the operation interface more simple and practical.
9, "what you see" custom report query output printing mode: the design concept of what you see, all the results of the query can be printed directly, the query results are printed as you like. Several commonly used reports You can define the items to be queried or printed, arrange the printing order of these items, and save the custom report format for next time you continue to use. Many settings and reports can be quickly exported to the Exce format for reporting secondary development or submitting to the financial department for reference and reference.
10. Humanized interactive software interface of "Make sure to report mistakes": the software will automatically detect whether the settings and input data of many customers are correct or meet the specifications. If it is not correct, it will prompt the operator in time. Inspection function, allowing customers to find and resolve faults or setting errors in a timely manner.
11. "Detailed operation log" is easy to find the fault and implement the responsibility: customers are using software, all operations have operation logs to record who did what and when, and what the system feedback was at that time, so that the engineer can provide when troubleshooting Clues can also be used as the responsibility and evidence to implement certain operators' violation of company regulations.
12. "Multi-user administrator" function: You can set the operation authority and password of the lower-level administrator through the high-level administrator, forbid certain functions of a certain level of operator, and it is more convenient to manage and use.
Real-time color and sound prompt function: During real-time monitoring, not only can the photos of the card reader's previous storage in the computer can be displayed in real time, but also the legal card swipe can be displayed in green, the illegal card or the record of denied entry can be displayed in orange. Alarm information is displayed through red records, and alarm sound is emitted through computer speakers. There is a new monitoring record, and the computer also sends out a peaceful tone to remind the operator to come and pay attention, to avoid the operator looking at the computer screen for a long time, which will cause fatigue.
Interface lock function: The operator must temporarily leave the job (for example, go to the bathroom). The interface can be locked. The background software continues to run and monitor. Others cannot take advantage of the opportunity to operate the software. After the operator returns, enter the password and return to the software operation. interface.
Designated card reader for card issuance: no card reader is required, just enter the card number and authorize the card to issue the card. You can also specify the reader of any door as the card issuer, and issue the card by swiping in batches. On the one hand, it saves costs for customers, on the other hand, it avoids input errors and improves card issuing efficiency and speed. You can also purchase a USB card issuer, which does not require a dedicated power supply and is compatible with both ID and IC cards. Input is easier and more convenient.
Inheritability of data after reporting loss: General software will report all new card numbers to modify the previous record settings after losing the card. Our software will scientifically mark the previous records. The previous records can be retained and can be used with the new function of replacing card numbers. .
Fuzzy search function: Many interfaces can (ctr + F) quickly fuzzy search, making the operation easier and faster.
Handling of National Day Holidays: Generally, National Day Holidays require a certain Saturday and Sunday to come to work. In the past two days, many softwares cannot handle normal work and take breaks to handle it. In the event of inaccurate attendance data or manual corrections, our software can Handle this special case automatically and reasonably.
Unused functions and interfaces can be shielded: For example, some companies can block the functions and modules of attendance through option settings as long as they do not need attendance at the door, making the operation interface more concise.
8:00 am-22:00 pm except holidays