The access control system is a very common technology used in security systems. Its technical content includes: detection, television, sound, feature recognition and linkages of various types of locks, security doors, locking devices, etc. It can be said that the access control system covers all the elements of the security system. It is an indispensable part of a large, integrated security system, and it can also be used to form a variety of practical security systems. It is precisely because of the diversity of application of access control technology, the perfect function and wide adaptability that it has become the focus of research and development of security technology, and various high-tech technologies are continuously applied to access control systems. However, when we analyze the access control system, we still start with "mechanical locks." The reason for this is that an independent mechanical lock seems to be very different from a complex access control system, but in essence has the same basic elements. The mechanical lock is the simplest and most complete access control system. From the analysis of it, many basic concepts and evaluation methods of the access control system can be obtained. The access control system is an application method of access control technology in the real world. The feature carrier, feature reading (recognition) device and locking mechanism are the three basic elements that make up the access control system. 1. The feature carrier is a system in which the access control system manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legitimacy of their entry and exit. This is to give them a sign of identity and authority through a method, which we call: the feature carrier, which contains the identity and authority information is the feature. The key to a mechanical lock is a feature carrier whose "tooth shape" is a feature. There are many feature carriers that can be utilized in the access control system, such as magnetic cards, optical cards, and IC cards (integrated circuits), which are the most commonly used applications. These feature carriers are to be used with the holder (person or thing), but it is identical to the holder, which means that the feature carrier can be held by someone else. In order to prevent this problem, multiple methods can be employed, that is, two or more feature carriers are used (depending on the security requirements of the system). If you can choose a unique and stable feature from the holder itself, as a means of expressing identity, this problem does not exist. Of course, the features from the "holders" are called "biometrics," and the feature carrier is naturally the holder. 2. The reading device is a device that exchanges information with the feature carrier. It reads information about identity and permissions from the feature carrier in an appropriate manner to identify the identity of the holder and the legitimacy of its behavior (incoming and outgoing requests). Obviously, the feature reading device is a device that matches the feature carrier, the technical properties of the carrier are different, and the properties of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "cylinder". When the key is inserted into the lock cylinder, the identity and authority of the holder are confirmed by the movable marble in the lock cylinder and the tooth shape of the key. The identification process of the electronic reading device is: converting the read feature information into electronic data, and then comparing with the data stored in the device memory to realize identity confirmation and authority authentication, which is also called “feature recognitionâ€. ". The feature reading device has only the function of reading information, and some has the function of writing information to the feature carrier. Such a device is called a "read-write device", and writing information to the feature carrier is authorized by the system to the holder. Or modify the process of authorization. This feature carrier is modifiable and reusable. The key of the mechanical lock cannot be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the permissions they have can be changed through system settings. 3. Locking mechanism, access control system is only practical with the addition of a suitable locking mechanism. When the reading device confirms the identity and authority of the holder, it is necessary for the legal person to smoothly enter and exit, and effectively block the request of the illegal person. Different types of locking mechanisms constitute different access control systems, or different applications that implement access control technology. For example, the lever of the subway toll collection system, the car stop for the parking lot, and the cash withdrawal device for the self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a locking mechanism of the access control system. When the lock core and the key shape of the key are matched, the handle can be rotated to retract the lock tongue to open the door. The safety of the access control system includes the impact strength, which resists the damage of mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the locking mechanism of the access control system is also commonly used as an electronically controlled lock. Its characteristic carrier is mainly various information cards, and the opening and closing of the door is controlled by electromagnetic force. Above, we analyzed the basic elements of the access control system or the access control system through the analysis of the mechanical lock. Below we will start from the mechanical lock and explain the main technical indicators of the evaluation of the access control system: The amount of key, a key, its number of teeth, and the order of the height of each tooth determine the number of tooth forms that can be formed. This is the amount of keys. For example, the key consists of 5 teeth, each tooth has 5 steps (step difference) mechanical lock, its key amount is 55, the key amount of the information card is determined by the length of the data indicating its characteristics. If the feature is represented by an 8-bit binary number, its key amount is 28. The larger the key amount of the system, the larger the capacity of the system, and the higher the security, because the possibility of being deciphered or the possibility of being copied is smaller. If each tooth is regarded as a feature (T) and the high and low order of the tooth is regarded as the difference (S) that each feature can express, the key amount of the system is TS. Information cards can have a large amount of keys (by setting), and human biometrics have a very large amount of keys. It is therefore the best choice for high security requirements for access control (access control) systems. The rate of misunderstanding and the rate of false rejection often encounter situations where the lock is opened by another key and the key is not easy to use. The same is true for an old lock. This is the misrecognition rate and the false rejection rate. concept. The error in the information communication (reading) of the system is the cause of the above-mentioned mistakes, and the problem is more likely to occur when the key amount is low. Security, system security includes two aspects, one is the ability to prevent being deciphered and copied, and the other is the ability to resist mechanical damage. The lock of the system has a great relationship. The state-specific mechanical locks are standard and are called anti-theft locks. The friendliness of the system, the access control system has two interactive interfaces with people, one is the interface of feature information interaction, the other is the process of door opening/locking, the door system should be friendly to people, including the read feature is not compulsive, The access process is smooth and safe. Some biometric and electronically controlled access systems have this friendliness and are widely used. Concerned about surprises Label: Evaluation of access control system from mechanical locks Previous: How to correctly interpret various test reports of aluminum alloy cables Next: Analysis of characteristics of thick film circuits SMD LED 3528 Smd Led Lights,Smd Lamp Beads 5050,Uv Lamp Beads 0802,High Power Led Lights Dongguan XINYUDA Technology Co., Ltd. , https://www.gdxige.com
3528 SMD Lamp Beads, power 0.06w, lumen value 6-7LM, 7-8LM, 8-9LM, luminous efficiency can reach up to 150LM/w.
SMD LED 2835
2835 SMD lamp beads, power 0.2w, lumen value 20-22LM, 22-24LM, 24-26LM, luminous efficiency can reach up to 130LM/w.
SMD LED 5050
5050 SMD lamp beads, power 0.2w, lumen value 20-22LM, 22-24LM, 24-26LM, luminous efficiency can reach up to 130LM/w.
SMD LED 5630
5630 SMD lamp beads, power 0.5w, lumen value 50-55LM, 55-60LM, luminous efficiency can reach up to 130LM/w.
SMD LED 3014
3014 SMD lamp beads, power 0.1w, lumen value 11-12LM, 12-13LM, luminous efficiency can reach up to 130LM/w.
First, let's understand the concept of LED and SMD.
LED (Light Emitting Diode) is a light-emitting diode, there are many kinds, one of which is SMD LED. Others such as in-line LED, piranha, high-power LED and so on. The LEDs packaged in SMD form are divided into several types such as CHIP, TOP, and SIDEVIEW.