National Security High Security Card System
National security high security card system
The access control system uses the SM1 cryptographic algorithm approved by the National Secret Bureau and a high-security encryption chip certified by the National Secret Bureau ...
It has multiple functions such as portal access control, real-time monitoring, security alarm, etc. It is mainly convenient for internal employees to go in and prevent outsiders from entering and leaving at will, which not only facilitates internal management but also enhances internal security, thereby providing users with an efficient And cost-effective working environment.
It has realized office automation and management automation in terms of functions. Based on integrated wiring system and computer network as a bridge, it comprehensively realizes comprehensive management of office automation systems.
High security: Use a strong encryption chip certified by the National Password Administration Bureau for high-strength encryption ...
- High security: The security encryption chip certified by the State Password Administration is used for high-strength encryption, and the three-layer encryption protection design ensures the security and reliability of the system;
- Qualification certification: It has three "commercial password product model certificates" issued by the State Password Administration, respectively for smart IC cards, secure storage modules and secure access control systems;
- Large redundancy rate: with large-capacity scalability, if you need to expand the equipment, you do not need to add another main control part, you only need to add front-end equipment and control unit;
- Highly integrated: fully linked with fire protection systems;
- Smooth upgrade: realize the seamless connection and smooth upgrade of the new system and the original system, and effectively meet the requirements for high availability and flexibility of system construction
Product parameter Spec
Product parameters ...
- Access Controller
- Access control card reader
- Access control case power supply
- Access control electric lock
- Access control exit button
- Access control software
The management of keys is the basis for the safe operation of the entire system ...
- Key generation and management: use security policies to regulate the use of keys, support multi-level key management, support key decentralization for key generation, and use the SM1 cryptographic algorithm to ensure the security of key storage and transmission processes;
- Card initialization: Through the card initialization function of the national secret CPU card, the key injection of the national secret CPU card and the initialization of the internal structure of the card are realized;
- Card issuance: Use PSAM card issuing equipment and national secret CPU card issuing equipment to issue national secret CPU cards and PSAM cards.
Access control management software, with portal access control, real-time monitoring ...
- Area management : According to the requirements of building safety technical precautions, the passage of restricted areas can be designed. Such as: single card, dual card, card + password, door lock opening / closing characteristics.
- Time management : with multiple programmable time zones, each time zone can be defined as "start time", "end time" and valid days of each week; can be scheduled for holidays throughout the year, automatically shield all normal functions during holidays, and automatically During the holiday procedure, cardholders can only enter and exit the protected area through specific channels and within specific time zones.
- Central monitoring : The management host can monitor the opening / closing of the electric locks at all access points in real time, and can view the details of the time, date, card number, name, affiliated department, job title, etc. of each door opened.
- Alarm function : When an unregistered card appears in the system, the authority does not match, the door is not closed, the power supply and communication lines are faulty or damaged, the monitoring center will receive an alarm signal. The staff on duty can find out the cause and location of the alarm through the monitoring terminal or management host, and can take corresponding measures immediately.
- Record query : Every event that occurs in the system has a detailed record, such as the time when each door lock is opened and closed, the number of the door opener, the reason and location of the alarm input, etc. And according to the needs of classification, form annual, monthly and daily statements.
- Linkage control : It can realize linkage with TV monitoring, intrusion alarm, fire alarm, bandit police automatic alarm system.