Skud car connection diagram. Access control and management systems based on Bolid equipment. The main decisions made in the project

Skud car connection diagram.  Access control and management systems based on Bolid equipment.  The main decisions made in the project
Skud car connection diagram. Access control and management systems based on Bolid equipment. The main decisions made in the project

Organization of the system and logic of its operation

ISO "Orion" allows you to create optimal in terms of functionality, characteristics and cost of the solution for any tasks related to the comprehensive security of any objects. One of the options for using the system is to organize a system for monitoring and managing access, recording visitors and recording working hours of a large enterprise.

System organization

Installed at the entrance“S2000-2” controllers, each of which controls one turnstile. In this case, you can use the turnstiles already available at the entrance. To interact with the card capture reader, the “S2000-4” block is used. System devices are universal from the point of view of connecting readers. You can use not only readers produced by NVP "Bolid" (for example, "Proxy-5MSB" with the "anticlone" function), but also any others that have Touch Memory, Wiegand (all varieties) and Aba Track II output interfaces. S2000-2 controllers will be able to control turnstiles already installed at the entrance.

In the walk-through room, devices are combined information RS-485 interface. The devices can be connected to a PC installed at the security post using the S2000-USB converter or to any other PC via local network using the S2000-Ethernet converter. UsageRS-485 interface can reduce costs on infrastructure and system ownership costs. In the event of a communication line or PC failure, the devices continue to operate fully in autonomous mode, accumulating all the events that occur.

Operation logic

When using the system employees Those with permanent passes pass through the turnstiles, unless a violation of time windows or anti-passback rules has been recorded. Additionally, photo or video identification can be organized using IP cameras.

Visitor receives a one-time or temporary pass at the pass office. The procedure for issuing a pass is simplified and automated as much as possible (including document recognition functionality - Scanner software and visitor card templates). All events about visitor passes are stored in the system event log with reference to a specific person. When leaving the facility through the card reader, the visitor’s account will be automatically transferred to the archive, and the card will again turn into a free template. When you visit the site again, the system itself will offer to restore the previously created account from the archive.

The software allows you to build many reports on the routes of visitors and employees, as well as working time recording. Most reports can be modified and modified for specific specific tasks directly by the user. Mechanism implemented convenient integration with any ERP systems used by the customer.

At the same time, an important advantage of the solution is the possibility of hardware integration, use of a common information space and software with security subsystems fire alarm, automation and dispatching also performed on ISO Orion equipment.

Features of the ISO Orion hardware and software complex


The principle of universality became the main one in the development of the flagship ISO Orion access controller “S2000-2”. Unlike controllers from many manufacturers, the S2000-2 operating algorithm is determined by the user at the setup stage. To "S2000-2" you can connect two independent readers. Thus, each device can control two doors (entry by electronic identifier, exit by button), one door with control of the direction of passage, a turnstile, a barrier, or a gateway. It is also worth highlighting the following key features:

  • Controller memory: 32768 users, 100 time windows, 100 access levels.
  • Complex access modes: double identification, access according to the rule of two or three persons, access with confirmation.
  • Hardware support for various network and zone anti-passback modes: strict, soft and temporary.
  • Various options hardware integration with security alarm.


Universal block for creating small systems security and fire alarm and access control. IN in this case are used to optimize the connection of the card reader.

  • Block memory: 4096 keys, 16 time windows.
  • Support complex windows time: transition through the day, shifts, pre-holiday and holidays and so on.


Joins ISO Orion large line of readers: universal (supporting proximity cards in EM Marine, HID, Mifare formats), with card copy protection, combined (proximity cards + PIN codes). Also, if necessary, the system can be supplemented with biometric controllers that support dual identification (proximity cards + fingerprints).

The example suggests using modern readers " Proxy-5MS» with anti-clone function, working with Mifare cards. The card reading distance is 6 cm.


The system uses single "Database Administrator" configuration module, which is responsible, among other things, for creating lists of time windows, access levels (authority sets), employees, visitors and their passes. It also has a built-in Flexibly customizable badge printing module(double-sided passes are supported, as well as custom-sized templates).

Depending on a predefined set of permissions, the pass office operator will be able to see only employees or visitors, and will not have the right to edit or delete their records.

Implemented in the "Database Administrator" integration with two document recognition modules from leading developers ( Abby And CognitiveTechnologies), which significantly increase the speed of visitor registration.

The standard functionality of the software allows you to connect a newly arrived visitor with a free, pre-created template. And also automatically release the template when the visitor leaves the site. If necessary, implementation specific algorithms for recording visitors(for example, using terminals for ordering passes) it is possible to use integration with software VisitorControl companies Insights.

Integration of ISO "Orion" controllers with a breathalyzer

Controller "S2000-2" Easily integrates with third-party equipment, which should confirm the possibility of passage using a discrete signal. In this way it is realized simplest option connecting a breathalyzer, which will allow identifying groups of employees working in particularly critical areas of production, etc., who will be forced to undergo additional examination when passing through the turnstile.

If you need deeper integration with the transfer of ppm values ​​to the Orion Pro automated workplace, you can use the company’s solutions LLC "OST", who developed such a mechanism.

Integration with security and fire alarm systems

In case of expanding the functionality of the system, access controllers “S2000-2” and units “S2000-4” can work in a common information space(and on the same interface line) with other ISO Orion devices, problem solvers providing security and fire safety object, dispatching, automation control.

Implemented in controllers and blocks hardware integration with security alarm system. One card can be used from the same reader both to control the access point and to arm/disarm the alarm. The reader can be automatically blocked by the device itself when certain alarm loops or addressable sensors are armed.

At the script level, software can be implemented automatic control burglar alarm upon the entry or exit of the first employee of any unit into the territory of the facility or some part of it.

Signals unlocking doors in case of fire transmitted from the alarm system directly via the information interface, and not at the relay level.

Our own line of IP cameras with hardware video analytics and video recorders allows you to create full-fledged workplaces video verification, passing employees of the facility.

The access control system equipment has a certificate of conformity technical means ensuring transport security.

Orion ACS or it is also called Bolid ACS - a development from NVP Bolid CJSC. They occupy a very prominent place on Russian market electronic equipment manufacturers and technical systems security. Own domestic developments, modern production and a properly organized enterprise policy allows for many years to literally resist imported analogues, not always of high quality and low price. Over a short period of time, Bolid specialists created a number of unique products for common name"Integrated Security System "Orion". ACS "Orion" is only a small part of this integrated system that flexibly organizes security and fire alarm, CCTV, automatic fire extinguishing and dispatching of objects.

ACS Bolid provides access control through control of blocking devices: gateways, turnstiles, gates, doors.

Basic technical data of the local ISO "Orion"
Number of devices connected to the RS-485 interface line up to 127
Number of zones combined into sections (Orion Pro workstation) up to 16,000
Number of zones combined into sections (PKU “S2000M”) until 2048
Number of sections (Orion Pro workstation) up to 10,000
Number of sections (PKU “S2000M”) up to 512
Number of access points up to 254
Number of control outputs external devices(Workstation "Orion Pro") up to 16,000
Number of outputs for controlling external devices (PKU “S2000M”) up to 255
Number of users (Orion Pro workstation) not limited
Number of users (PKU “S2000M”) until 2047
RS-485 interface line length (without using additional repeaters) up to 3,000

Company "EngineeringGroup" This is the company that will help you install exactly your access control system. We have been successfully working in the security systems market for many years; we ourselves design, install and maintain various access control systems.

We cooperate with the best manufacturers imported access control and management systems (ACS): Apollo, Linel, Honeywell Security, as well as Russian made, Perco, ACS Orion, Parsec, Kodos, Sphinx and many others. We know very well the strong and weak sides various systems, we focus on prices, we can carry out professional installation, training and follow-up services. We work for safety in the interests of the customer and are aimed at long-term cooperation!

The main task of the access control system is restriction of access to the protected area by personnel and by time during the day, seven days a week. This purpose already emphasizes the main property of the system: to work - always, at any time of the year, in cold or hot weather, in case of computer breakdowns and electrical failures, in case of a broken LAN cable, etc. emergency situations. How can you save money here? But for an unscrupulous performer there is always room for action, so technical documentation, especially to acts hidden work and to executive documentation The customer representative must pay very close attention.

ACS cost

During the design process, the issue of cost is resolved future system ACS. The design engineer lays down the configuration of the system, its elemental base, consisting of various components. The more expensive the components, the more expensive the system, everything is explained by reliability, they say, there can never be too much! But reliability is a very flexible concept and has no clear boundaries. For example, in elevators, in airplanes, in nuclear power plants, the safety margin is sometimes increased by 10 times and many systems are duplicated, but disasters also happen. How reliable should an access control system be and what might its cost be?

Functionality, for the future development of the access control system, you can be sold many additional functions that neither the customer nor the system will ever need, but will be expensive, so the customer or his contractor needs to carefully study the technical specifications, study the project and compare many options. Therefore, the more transparent the specification for equipment and materials is, the more willing the installer’s representatives are to answer various questions, the less likely it is to make incorrect choice. Optimal choice ACS manufacturer most often based on the optimal price/quality ratio for the installed access point of the access control system, but there are many other criteria that influence not only final cost ACS systems, but also on the cost of using the installed system.

Saving on electricity or the use of “green energy” also have a reasonable place in the design of access control and management systems, if the number of locking devices is more than a hundred pieces. Power supply for electric locks and controllers for access control systems consumes electricity and for the distribution and redundancy of this system with a large number of access points, serious design work is required. But it is possible to simply solve this problem at the customer’s expense, for example by installing separate power supplies for locks and controllers, especially since ACS manufacturers unanimously advise connecting the controller from a separate power supply.

So it turns out that for a hundred doors you are offered to buy two hundred power supplies with an incredible number of batteries!? In fact, there are many nuances that the customer does not have to know, but the people recommending and responsible for this should take everything into account and try to minimize costs.

Training, maintenance, repairs, warranty case in an access control system, these are daily tasks that different companies solve in different ways. Emergency operating modes (failure of controllers, failure external power supply and more) confirm the correctness of the customer’s choice after installation of the access control system. Not intrusive service, but full warranty and post-warranty service, providing free support to its customers throughout the entire life of the equipment - this is what distinguishes the right ACS installer.

Benefits of working with us

  • an integrated approach to solving assigned problems in close contact with the customer, developing several options and choosing the optimal solution;
  • knowledge of the customer's tasks, goals and problems in the field of security and the ability to solve them in as soon as possible;
  • many years of experience (more than 10 years) in installation and maintenance of various access control systems of domestic and foreign manufacturers;
  • availability of its own service center and qualified personnel for prompt response and maintenance uninterrupted operation ACS throughout its entire service life.

Why do they trust us

Low prices . We really offer low prices and even more so with a complex order or with repeated requests, because you are working not with intermediaries! cost of the project when ordering installation work! Cost of equipment and Supplies much less than competitors due to experience and sales volumes. We consider the first year of maintenance (TO-1 and TO-2) to be a guarantee and it is free for our Customers!
Project department . Our GUI department is at the core of all creative endeavors needed to create a modern quality product. Designers are the first to take an individual approach to each developed object, perform quick and high-quality calculations, detailed elaboration of technical documentation, carry out “designer supervision” and support the adopted engineering solutions.
Freedom of choice . We are not associated with the supply of any specific equipment; we have our own warehouse and many different suppliers. We install equipment at sites only from those manufacturers whose equipment meets all client requirements for reliability, efficiency, safety and price. The engineering systems we install allow you to reduce your costs at the construction stage, during operation and when expanding the system in the future.
Full-time specialists. Our engineers and installers working on site work on a permanent basis; we carry out all work from installation to commissioning ourselves without the help of random installation teams. Our engineers are not sellers of related services and additional work, but trained professionals focused on results.
Legality. Our activities are legally established; we are always ready to provide you with the necessary permits, permits, licenses and certificates. The absence of intermediaries allows you to reduce the acceptance time technical solutions and ultimately - save your money.
Service center. Since 2009, we have been providing you with services for maintenance and repair of complex modern engineering systems, has diagnostic equipment, a stationary workshop, and its own warehouse for spare parts and replacement stock. The qualifications of our employees allow us to repair and put into operation almost any security system in the shortest possible time, and the mobility of our teams and the presence of several strongholds allow us to arrive at the site of an urgent repair within 2 hours in Moscow.
Individual approach for us this is sensitivity to customer expectations, complete mutual understanding, reliability of cooperation, efficiency and achievement common goal. We strive for long-term and mutually beneficial cooperation.

Purpose and tasks of ACS

An access control and management system (ACS) is a set of software and hardware, as well as organizational and methodological measures, with the help of which the task of monitoring and managing visits to a protected facility is solved.

ACS can solve such problems as operational control of the location of personnel and the time spent by personnel at the site. By using software The function of calculating time worked by employees is implemented. Often at enterprises, ACS is integrated with a security and fire alarm system for a comprehensive solution to security problems. Thus, it is possible to ensure a security response to attempts of unauthorized access, breaking doors, etc.; the ability to automatically arm/disarm premises upon entry into an employee’s access zone; providing a free exit in case of fire.

Terms and Definitions

An access controller is a device designed to control access through controlled access points by analyzing user identifiers read using readers (checking rights). Access controllers can make their own decisions to grant or deny access if user IDs are stored in the controller's memory (in which case local access is said to be used). Also, user IDs may be recorded in the network controller (or in the software database). In this case, the access controller performs the functions of a relay - it sends code to the network controller and receives from it a decision on granting or not granting access (in this case we talk about centralized access). Access controllers control barring devices using relay contacts.

Identifiers are unique characteristics of ACS users. The identifier can be a Touch Memory electronic key, a contactless Proxy card, a radio key fob, biometric data (fingerprint, palm print, iris or retina pattern, geometric characteristics of the face, etc.). In the access control system, each identifier is assigned certain powers, in accordance with which access controllers allow or deny access.

Readers are devices designed to read the user ID code and transmit it to the access controller.

Blocking devices – doors with electromechanical or electromagnetic locks and latches, turnstiles, barriers, gates, gateways.

An access point is a logical object of an access control system, which is actually a physical barrier equipped with an access controller and a reader. The access point can be a door, turnstile, gateway, barrier, gate, etc. The access point can be bidirectional or unidirectional. A unidirectional access point is equipped on one side with a reader, and on the other side with an exit button. A bidirectional access point is equipped with readers on both sides. A bidirectional access point can be either with control of the direction of passage (for this, the access controller configuration for each reader indicates the number of the access zone into which this reader controls passage) and without control (the so-called “pass-through access point”).

Access zone is a logical object of the access control system. Access zones are areas into which the territory of a protected enterprise is divided. Access points with the direction of passage are always located at the boundaries of access zones. Access zones are configured for access points if the system uses functions such as working time calculation and antipassback rule.

Access level – individual access rights that define the rules for passing through access points and zones assigned to a user ID. Based on these rights, access controllers (or network controllers) decide whether to grant or deny access.

Time windows are a set of time intervals into which passage is allowed. Time intervals can be set for each access point individually.

Software is a component of the access control and management system. Using the software, ACS controllers are configured, including setting user IDs, access levels and time windows in them. The software is also used to implement additional functions such as real-time monitoring of employees and visitors of a protected facility, logging (and accumulation in the system database) of ACS events, recording time worked by facility employees, and generating various reports on ACS events.

Typical operating modes of ACS

Standard pass mode. In order for employees to be able to pass through access points, each of them is given a unique user identifier (or biometric information can act as an identifier). This identifier is stored in advance in the memory of access controllers or network controllers, where access levels are assigned to it. If the enterprise has software (AWS), then usually personal information about the employee is also entered into the AWS database. Each access point in the enterprise that is subject to control is installed with an access controller and reading devices. When presenting the identifier, the system makes a decision to grant or not grant access to the employee. All facts of passages through access points, as well as actions associated with them, are stored in the memory of the access controllers, and are also transmitted to a PC and entered into the workstation database. Subsequently, based on these events, it is possible to obtain various reports, calculate the time worked by employees, etc.

Anti-passback rule (ruleantipassback). It is used to ensure that one identifier cannot be used again to enter any access zone without first leaving it. The access controller's response to an antipassback rule violation depends on the antipassback mode set for the access level of the identifier in question. One of the following modes can be used:

  • Strict – the system prohibits repeated entry into the access area until exit;
  • Temporary – during the specified time, the system prohibits repeated entry into the access area until exit;
  • Soft – the system will not deny access, but the event log will record a violation of the antipassback rule.

You can configure network antipassback in the system. If there is a network controller (the “S2000” / “S2000M” console or APM), messages about passages through access points will be relayed to all access controllers, thus, the antipassback rule will work for all access points that allow the identifier into the access zone in question (network antipassback) .

The antipassback rule can be made more strict by setting the “Zonal antipassback” (“Route Control”) parameter in the access level. In this case, passes to any access zone are taken into account, and if an attempt is made to pass through one of the access controller readers, then to fulfill the antipassback rule it is required that the last registered pass was to the zone where this reader is located. That is, it is possible to move from zone to zone only in order - 1, 2, 3 and in reverse order.

The anti-passback rule can only be used for doors with directional control.

Access according to the rule of two (or more) persons. To control access to access areas with increased security requirements, the passage mode can be used according to the “rule of two (three) persons” with agreed access levels. When the first identifier is presented, the access controller goes into standby mode for the second identifier. If the key presented after this has an inconsistent access level, the controller will deny access. If the access level is agreed upon, access will be granted (if access is used according to the three-person rule, this procedure will be repeated for the third key). This passage mode is an access parameter for the identifier and is configured independently for each passage direction (for each reader). This function is supported only by the S2000-2 controller.

Access with confirmation. If not all persons participating in the access procedure according to the two (three) person rule are expected to enter the protected access zone (for example, a security officer confirms the access of another employee), then the “Confirming” access mode is set for the access level of such persons. Independent access using a key with this access mode is impossible, and when passing according to the rule of two (three) persons using such a key, the messages “Access granted” and “Passage” will not be generated. This function is supported only by the S2000-2 controller.

Dual identification. Each of the controller readers can operate in a mode where identification requires the presentation of two identifiers (for example, a Proxy card and a fingerprint). This mode can be enabled independently for each reader. With double identification, the procedure for granting access begins with providing the main code (first identifier). If the key is recognized and there are no violations of the access mode, the controller goes into standby mode for an additional code. If an additional code is presented, the identification procedure is considered successfully completed. This function is supported only by the S2000-2 controller.

Closed passage mode. In this case, all types of access through the access controller are prohibited.

Open passage mode. There is free passage through the access controller without presenting identifiers.

In addition, the following parameters are configured in access controllers:

View of the interface of connected readers– TouchMemory, Wiegand, AbaTrack. This parameter is responsible for the method of transmitting the code of the read identifier to the controller.

Passage sensor– the parameter indicates that the controller uses a passage sensor. In this case, after granting access, the controller waits for the fact of passage through the access point and until the door opens (or until the specified “Passage Waiting Time” parameter expires), the presentation of new identifiers is not accepted by the controller. The passage sensor must be activated if the system uses the antipassback rule, and also takes into account the working time of employees, since these functions only work on the “Passage” event.

Door lock control– when the door is opened during passage for a time exceeding the “Lock timeout”, an alarm message “Door locked” is generated.

Burglary control– when this parameter is enabled, when a door is opened without granting access, an alarm message “Door is hacked” is generated

Access zone number- from 0 to 65535. Number of the access zone, the entrance to which is controlled by this reader (65535 - access zone number is not defined - for walk-through doors).

Turn off when door opens– early interruption of the “opening” relay program when the door is opened (the relay turns off after the passage sensor is triggered). It is advisable to enable this function when using electromechanical locks (which do not make sense to supply power when the door has already been opened).

Turn off when door closes- early interruption of the “opening” relay program after closing the door (the relay turns off after the passage sensor is restored). It is advisable to turn it on when using the turnstile, when after turning the turnstile you can begin a new procedure for granting access. When using a gateway, this option is always considered enabled, since when leaving the gateway, you cannot enter it again without presenting an identifier, and you can exit from inside only after pressing the exit button.

Access controller relays can operate as either closing or opening switches. The relay operating tactics are selected depending on the locking mechanism used.

Typical structural solutions for access control systems

Autonomous solutions

To organize one or several autonomous access points at a facility in ISO "Orion", you can use the specialized access controller "S2000-2", as well as the control panel "S2000-4" with access control functionality. The S2000-2 access controller can be used to organize bidirectional and unidirectional access points with and without control of the direction of passage. For access points organized using S2000-2, you can apply the antipassback rule, use access with confirmation or according to the rule of two (or more) persons, double identification. A receiving and control device with access control functionality “S2000-4” allows you to organize a unidirectional access point with or without direction control.

Access controller "S2000-2"

The access controller “S2000-2” has the ability to operate in several modes: “one door per entry/exit”, “two doors per entrance”, “turnstile”, “barrier”, “gateway”. The controller memory can store 4096 user IDs (8192 for “S2000-2” version 01); 2047 events in the buffer (4095 for “S2000-2” version 01), 16 time windows and 32 access levels. The logic of the controller depends on the selected operating mode. Also, “S2000-2” has two alarm loops, to which you can connect contact security detectors(loops can be used in all operating modes, except for the “Barrier” mode). The controller can be configured to lock the door if any (or all) of the security loops are under protection. You can control the acquisition and removal of loops from the same reader from which the ACS is controlled.

Operating modes of S2000-2

One entry/exit door

This mode is designed to control access through one door, which has only one locking device and is controlled by one passage sensor (Fig. 1). Providing access in both directions requires the presentation of user IDs. Exit buttons can also be used to provide access (for example, to open a door from a security post). In this mode, the antipassback rule, access according to the rule of two (or more) persons, and double identification can be used. In the “One door per entry/exit” operating mode, the controller readers work synchronously (when free access is opened or when the controller is switched to closed access mode) - when a command is sent to one reader of the device, the second reader will automatically be switched to the same mode.

Two entrance doors


This mode is designed to control access through two independent access points, and granting access in one direction requires providing a user ID, and in the opposite direction the “Exit” button is pressed (Fig. 2). In this mode of operation, the antipassback rule cannot be used for doors (since the doors are not access points in this case with control of the direction of passage in both directions). However, for each reader you can also configure dual identification, access according to the rule of two (or more) persons. Both readers in this operating mode of the device operate independently of each other. This means that when free access is opened (or, conversely, access is closed) on one reader, the second will function in standby mode until the corresponding command is sent to it too.

Turnstile


In this operating mode, the “S2000-2” controller controls passage through the electromechanical turnstile (Fig. 3). The turnstiles have two control circuits for each direction of passage (usually these control circuits are located in the remote control unit that comes with the turnstile). Moreover, providing access in both directions requires the presentation of user IDs on readers installed on both sides of the turnstile. To remotely provide access, the operator can use the “Exit” buttons. In this mode, the antipassback rule, double identification, and access according to the rule of two (or more) persons can be used. Both readers in this operating mode of the device operate independently of each other. This means that when free access is opened (or, conversely, access is closed) on one reader, the second will function in standby mode until the corresponding command is sent to it too.

Barrier


In this mode, the controller controls bidirectional access through one access point with one blocking device - a barrier (Fig. 4). The first relay of the controller controls the opening (raising) of the barrier, and the second relay controls the closing (lowering). Typically, the controller relays are connected to the barrier control unit (with which the barrier is supplied directly). Providing access in both directions requires the presentation of user IDs on readers installed on both sides of the barrier. For remote (manual) control of the barrier, the “Enter” and “Exit” buttons can be used. Car detectors in the reader area can also be connected to the controller alarm loops (in this case, user identifiers are perceived only if there is a car near the reader). It is possible to control traffic lights using switching devices “UK-VK/06”. To turn traffic lights on/off, the reader LED control outputs are used. UK-VK/06 devices can switch voltages up to 220 V ( alternating current) and currents up to 10A, which allows you to control almost any traffic lights. In the “Barrier” operating mode, the antipassback rule, double identification, and access according to the rule of two (or more) persons can be used. Both readers in this operating mode of the device operate independently of each other. This means that when free access is opened (or, conversely, access is closed) on one reader, the second will function in standby mode until the corresponding command is sent to it too.

Gateway


In this mode, the controller controls access through one access point, which is two doors with a closed space between them (gateway). At the entrance to the gateway, two readers are installed on each side (outside the gateway) (Fig. 5). Inside the gateway, in front of each door, or at the security post, two “Exit” buttons are installed. Passing through the first door (entrance to the gateway) requires the presentation of an identifier, and to exit the gateway the “Exit” button is pressed. Access is granted only if the other door is closed. The time spent in the gateway can be configured. If, after the time spent in the gateway has expired, the exit button is not pressed, then you can exit the gateway only through the door through which access was granted. When the gateway is operating, the doors must be equipped with passage sensors (the “Passage sensor” parameter is considered to be always on). In this mode of operation, the antipassback rule, double identification, and access according to the rule of two (or more) persons can be used. Both readers in this operating mode of the device operate independently of each other. This means that when free access is opened (or, conversely, access is closed) on one reader, the second will function in standby mode until the corresponding command is sent to it too.

Reception and control device "S2000-4" with access control functionality


The S2000-4 device can control access through one access point, and granting access in one direction requires the presentation of user IDs, and to grant access in the opposite direction, press the “Exit” button. When using the access control functionality in the device, the first loop is used to connect the exit button and the passage sensor, and the first relay is allocated to control the locking device (Fig. 6). “S2000-4” has access blocking functionality if any (or all) of the device’s alarm loops are armed. Since the device can only be used to organize a unidirectional access point, you cannot configure an antipassback rule for it.

The instrument supports up to 4,096 user IDs, and the instrument's event buffer holds up to 4,088 events.

Network solutions

Often, even in small facilities with several access points, there is a need to add new identifiers or edit the powers of existing ones in all access controllers at once. It is most convenient to perform these manipulations centrally, when you only need to carry out the adding/editing procedure once, and then write new data to all devices. In addition, the functionality of generating reports on ACS events and calculating time worked is also quite in demand.

Additional ACS capabilities when using software

ISO "Orion" uses the following software to work with ACS: Uprog, workstation "Orion Pro". Uprog software allows you to configure the configuration parameters of the S2000-2 access controller (as well as for the S2000-4 device), namely:

  • operating mode, dual identification, access according to the two (three) person rule, number of the controlled access zone, interface type of connected readers, enable/disable the use of the passage sensor, blocking control, blocking timeout, etc.;
  • recording and editing access level controllers, time windows and user IDs in memory.
  • The Orion Pro automated workplace software allows you to implement the following:
  • accumulation of ACS events in the database (passes through access points; blocking and unblocking of access points; unauthorized attempts to pass, etc.);
  • creating a database for a protected object - adding ACS logical objects (access points and zones) to it. And also their arrangement on graphic plans of premises to implement the possibility of centralized provision of access and monitoring the condition of these objects;
  • formation of a user database - entering the details of employees and visitors, indicating for each person all the necessary attributes (full name, information and affiliation with the company, division, work and home address and phone number, etc.), as well as setting access rights (pass authority via access points/access zones);
  • creating a database for recording working hours - creating work schedules, as well as rules for calculating schedules for various employees;
  • polling and control of controllers connected to a PC;
  • configuration of access controllers - centralized recording of time windows, access levels, user IDs into the device memory;
  • operation of network antipassback;
  • setup and operation of zonal antipassback;
  • displaying the state of ACS objects on graphic floor plans;
  • displaying information about the employee’s location accurate to the access zone;
  • displaying CCTV cameras, as well as managing the status of these cameras;
  • video recording at the command of the officer on duty, when a motion detector alarms, or according to a control scenario (for example, according to the event of granting access or an attempt at unauthorized passage).

Assigning the tasks of the access control and management system to software modules is shown in Figure 7. It is worth noting that the devices are physically connected to the system computer on which the “Operational task” is installed. The number of jobs that can be used in the system (AWS software modules) can reach two hundred. Software modules can be installed on computers in any way - each module on a separate computer, a combination of any modules on a computer, or installing all modules on one computer.


Drawing. 7. Functionality of software modules

In our troubled times, everything higher value acquires the reliability of security and surveillance systems. Scientific and technical progress stepped far enough in this direction, and whole complex systems. One of them is. This equipment was developed by Bolid.

The development of such integrated systems is, of course, a completely new word in the development of security technologies. Access control and management can easily cope with ensuring the guaranteed security of various objects: from small office or firms, ending with strategically important enterprises and even entire settlements. With the help of this security system, control over visits to any protected facility becomes real.

What problems can be solved when installing the system?

Using the system allows you to control the location of employees and track the amount of time during which personnel are on the territory of the enterprise. The introduction of such a security device successfully solves the problem of promptly responding to a door being broken or an attempt to enter a protected area. It is possible to establish full video monitoring of the facility, the state of the fire alarm and engineering systems.

The access control system ensures that the facility where it is installed security equipment, only visitors or employees who have passed identification will be able to enter. In this way, complete and absolutely reliable information about the people on the territory is collected.

You can see how the production of Bolide control systems takes place in this video:

What types of system management are there?

All security devices ACS of this type are divided into autonomous and networked.

The stand-alone access control device is intended for small businesses and offices where there is no need to keep track of working hours through the system. But an autonomous control device will perform its main functions: allowing people through after identification, prohibiting access for employees to certain premises, and so on. In addition, such systems are not as difficult to install and install as network ones.

Price policy autonomous systems, providing complete access control, are much more flexible and loyal than their network counterparts.

The management of fairly large enterprises with big amount employees. Such a device will successfully cope not only with its tasks, but also fulfill whole line additional functions, such as tabulation, recording time worked, tracking the location of employees in the enterprise. Also, network access control systems can be integrated into fire and alarm systems.

More details about network system access you can watch in this video:

Management often uses this security measure in enterprises.

Possible operating modes of the equipment

ACS can operate in several modes:

  • The control system has a standard access mode using one of the types of identifiers;
  • Re-entry prohibited mode. In this case, it will not be possible to use the ACS identifier to enter another zone of the enterprise if the exit from the location recorded earlier is not registered;
  • Complicated access: identification of access control systems requires additional coordination with the employees assigned for this;
  • Dual identification mode: for admission, in addition to the standard identifier, another one is installed, for example, by fingerprint;
  • Closed access for all categories of employees;
  • Free passage mode with open access;
  • To navigate through the controller, you do not need to present an ID.

Connecting the system for private use

Components of the protective system

Any Bolide device includes the following parts:

  • Access control. This is a device located at the entrance to a protected facility, which reads the data of passing people from identifiers and makes a decision on allowing or denying access;
  • Access IDs. These are devices that contain unique properties for each user: an electronic key, a special contactless card, a special radio key fob. Sometimes one of the user’s biometric indicators (fingerprint or palm print, iris, etc.) acts as an identifier. The data of all identifiers with which the Car will work is preliminarily entered into memory. They are usually included in access level diagrams;
  • The presence of panels that perform the function of receiving and immediately processing the signal;
  • Power supplies in the Bolide system;
  • Software for systems and units;
  • In addition to implementing access control, modern software allows you to perform various additional tasks;
  • The access control system monitors the movement of employees and visitors in real time, accumulates a database and tracks data throughout the system.

As a rule, the security guard controls the devices blocking the path. They can be barriers, electromechanical doors, turnstiles, gateways, and so on. In enterprises, the controller is often responsible for this.


Connecting the system for enterprise use

These measures are a qualitatively new approach to protecting facilities and monitoring access. When choosing specific access control equipment, it is important to first familiarize yourself with technical characteristics purchased product.

The manufacturer's instructions are required to be read.

It is necessary to accurately determine the parameters of the installed equipment, because you will have to work with it for more than one year. Therefore, it is worth considering whether it will change structural scheme enterprises in the near future.

Of course, all equipment can be modernized, updated and improved. IN software It is also possible for the ACS to expand the database.

It will not be difficult to supplement the standard base of the Bolid system with modernized modules.

ACS— a data control and accounting system that allows you to control access to certain devices responsible for opening/closing the magnetic lock of a room door using a magnetic card/tablet.

The system allows:

  • Providing online information on opening/closing doors for enterprise security officers
  • keep records of the attendance of company employees in electronic format by storing data in a database
  • maintaining a list of employees and visitors
  • Work from backup source power supply in case of power outage at the site
  • Possibility of flexible configuration of access to premises

ACS from the BOLID company

Product have a large number of capabilities and allows you to work with CCTV system, With system burglar alarm (SOS), s fire alarm system(THX).

Sometimes all its functionality makes you think very hard about the correctness of a particular procedure. In my memory, me and the colleagues who worked with him managed to block all the doors in the facility for several minutes more than once; the door blocking continued until the button for forced unlocking of all the locks was pressed. It took 5 hours to restore the functionality of all controllers.

This article is dedicated to exactly how to create a new employee, a new card, and register new data on existing controllers without harm to everyone.

For a more in-depth study of this product, it is better to use the documentation from the BOLID company, which is installed along with the software on your computer.

If you integrate this system at your facilities, STRONGLY I recommend contacting directly BOLID by phone to provide contacts of certified organizations for the implementation of this product. Your quality will depend on the quality of your settings. further work in him.

BOLID a complex system and requires qualified specialists for installation.

Instructions for creating a new user

Instructions for creating a new card and linking an employee to it

After we have created an employee, we can move on to creating a card for him


Instructions for updating the list of access cards on controllers

After we have created an employee profile and attached a card to the employee’s profile, let’s move on to adding new cards to the controllers.

It's very important point, the main thing is not to make a mistake, choose the right item.

Solving possible errors

After completing the synchronization procedure, the new card does not open the door:

  1. Try rebooting the server where " Sun" or to put it correctly " Central server Orion«
  2. If it doesn’t help, find out where the card works/doesn’t work by placing it on the readers
  3. Where the card does not work, rewrite the controller using the procedure below ""

After working with controllers or other devices, situations arise when some cards cannot provide access to some doors

  1. In this case, it will not help you " Sync all TouchMemory (Proximity) key codes"
  2. It is necessary to perform the procedure " Read configuration from devices» according to the problematic controller responsible for this door.

Using previously used cards that were blocked:

  1. It is advisable not to use old cards.
  2. Most often, not all doors work if the card was previously used by someone or was blocked
  3. When using such cards, it is advisable to carry out the procedure “ Read configuration from devices» for all controllers. This is a very long lasting effect.

Procedure " Read configuration from devices«

Above are possible cases when some cards do not open the door. This procedure allows you to erase all data from the controllers and write everything into them from scratch.

An approximate algorithm for this process on one controller:


Let's consider the case when you need to update ALL controllers (BE CAREFUL):

  1. First the configuration is deleted FROM ALL controllers along with saved cards
    1. First, everything will be removed and left without access to the doors.
    2. The time of the procedure and closed rooms will depend on your number of controllers and cards
  2. After deleting configurations of controllers and cards, all configurations and cards will be written to these controllers.

I have 39 controllers, this procedure will take about 4-5 hours in practice