⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

National Security High Security Card System

National security high security card system

Product Description

The access control system uses the SM1 cryptographic algorithm approved by the National Secret Bureau and a high-security encryption chip certified by the National Secret Bureau ...

The access control system adopts the SM1 cryptographic algorithm approved by the National Security Bureau and the high-security encryption chip certified by the National Security Bureau, realizing the security and reliability of data storage and transmission of the access control system, meeting the needs of important departments for high-security encryption applications for access control. Provide reliability and security guarantees for access control systems. It has obtained 3 "commercial password product model certificates" issued by the National Password Bureau, which are smart IC cards, secure storage modules and secure access control systems.
It has multiple functions such as portal access control, real-time monitoring, security alarm, etc. It is mainly convenient for internal employees to go in and prevent outsiders from entering and leaving at will, which not only facilitates internal management but also enhances internal security, thereby providing users with an efficient And cost-effective working environment.
It has realized office automation and management automation in terms of functions. Based on integrated wiring system and computer network as a bridge, it comprehensively realizes comprehensive management of office automation systems.

Features

High security: Use a strong encryption chip certified by the National Password Administration Bureau for high-strength encryption ...

  • High security: The security encryption chip certified by the State Password Administration is used for high-strength encryption, and the three-layer encryption protection design ensures the security and reliability of the system;
  • Qualification certification: It has three "commercial password product model certificates" issued by the State Password Administration, respectively for smart IC cards, secure storage modules and secure access control systems;
  • Large redundancy rate: with large-capacity scalability, if you need to expand the equipment, you do not need to add another main control part, you only need to add front-end equipment and control unit;
  • Highly integrated: fully linked with fire protection systems;
  • Smooth upgrade: realize the seamless connection and smooth upgrade of the new system and the original system, and effectively meet the requirements for high availability and flexibility of system construction

...

Product parameter Spec

Product parameters ...

  • Access Controller
  • Access control card reader
  • Access control case power supply
  • Access control electric lock
  • Access control exit button
  • Access control software
The access control management system includes a key management system and an access control management system.

Honor Rertificate

Award certificate...

    Key management

    The management of keys is the basis for the safe operation of the entire system ...


    Key management is the basis for the safe operation of the entire system. The main task of the key management system is to generate, issue and update keys, which is directly related to the security of the entire system. Customers use this software to generate and manage various application keys by themselves, and complete the initialization of the cards themselves, ensuring that customers have the initiative to key management and card issuance. The main functions of key management software are as follows:
    • Key generation and management: use security policies to regulate the use of keys, support multi-level key management, support key decentralization for key generation, and use the SM1 cryptographic algorithm to ensure the security of key storage and transmission processes;
    • Card initialization: Through the card initialization function of the national secret CPU card, the key injection of the national secret CPU card and the initialization of the internal structure of the card are realized;
    • Card issuance: Use PSAM card issuing equipment and national secret CPU card issuing equipment to issue national secret CPU cards and PSAM cards.

    Access control

    Access control management software, with portal access control, real-time monitoring ...


    Access control management software, with multiple functions such as portal access control, real-time monitoring, security alarm, etc. It has realized office automation and management automation in terms of functions. Based on integrated wiring system and computer network as a bridge, it comprehensively realizes the comprehensive management of communication systems and office automation systems. The main functions are as follows:
    • Area management : According to the requirements of building safety technical precautions, the passage of restricted areas can be designed. Such as: single card, dual card, card + password, door lock opening / closing characteristics.
    • Time management : with multiple programmable time zones, each time zone can be defined as "start time", "end time" and valid days of each week; can be scheduled for holidays throughout the year, automatically shield all normal functions during holidays, and automatically During the holiday procedure, cardholders can only enter and exit the protected area through specific channels and within specific time zones.
    • Central monitoring : The management host can monitor the opening / closing of the electric locks at all access points in real time, and can view the details of the time, date, card number, name, affiliated department, job title, etc. of each door opened.
    • Alarm function : When an unregistered card appears in the system, the authority does not match, the door is not closed, the power supply and communication lines are faulty or damaged, the monitoring center will receive an alarm signal. The staff on duty can find out the cause and location of the alarm through the monitoring terminal or management host, and can take corresponding measures immediately.
    • Record query : Every event that occurs in the system has a detailed record, such as the time when each door lock is opened and closed, the number of the door opener, the reason and location of the alarm input, etc. And according to the needs of classification, form annual, monthly and daily statements.
    • Linkage control : It can realize linkage with TV monitoring, intrusion alarm, fire alarm, bandit police automatic alarm system.
    真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张