January 09, 2025

Campus Access Control System Design Based on Contactless IC Card Technology

introduction

Non-contact IC card access control system has been widely used in building automation, access to important areas, modern management of campus student communities, and the application of campus contactless Ic access control system has become the current development trend, student apartments rely on access control The management system can realize the entry and exit management of specific areas, prevent non-resident staff from entering the student apartment building at will, especially at night to facilitate centralized management of multi-door apartment buildings.

Since the development of the access control system, it has mainly been applied to companies and intelligent communities. The system itself is relatively complete, but for the access control system currently used in schools, there is a low degree of external database sharing, low level of automatic data processing, and due to student apartments. Building design and management and student management methods are different, resulting in the existing access control management system can not be directly applied to student apartments. This paper puts forward a distributed and multi-layered access control management system applied to campus student apartment buildings, which has important application value.

1 System requirements for campus access control

The card management, maintenance, dormitory allocation, and student status management of the campus access control system are scattered, and the number of card bases is large (10,000). At the same time, for the students, faculty and staff involved in the campus, the access control data changes frequently and there is a peak period. From July to September, students graduated from school and entered the university, and they were accompanied by temporary accommodation adjustments. This is different from the card management and maintenance that is usually applied to the company's access control system, which also caused business processing. A series of problems such as processes, data permissions, and data modifications. Based on the above special characteristics, the campus access control system requires a high degree of informationization, from the student data acquisition, dormitory data distribution, access control data adjustment, check verification, download and other processes can be automatically processed; can adapt to frequent changes in access control data Adjustment; the system is easy to expand and stable.

2 system principle and structure

2.1 System Principle

The campus access control management system proposed in this paper is based on database technology, automatically collects data standard database of each department, and uses the standard database interface to design a common standard database. The database of each department and department automatically processes and calls the shared database to ensure all data of the campus. The consistency also avoids human error, leakage and low update efficiency caused by manual operation of access control data. The access control management system based on database technology is shown in Figure 1.

Campus Access Control System Design Based on Contactless IC Card Technology

Figure 1 Access control management system based on database technology

2.2 system structure

This paper proposes that the basic structure of the campus access control system is shown in Figure 2. The core structure adopts the C+B/S group mode, which is the mode of browser management, server control, and client background program automatic processing. The controller is based on the current mainstream industry. Bus networking mode?, centralized management, decentralized maintenance, high degree of system standardization, high modularity, simple expansion and easy maintenance.

Campus Access Control System Design Based on Contactless IC Card Technology

Figure 2 Overall structure and layer structure of the school entrance control system

The system designed in this paper consists of a 4-layer structure. The first layer is the device access layer (reader device, controller device), the interface uses standard high-speed interface, and the protocol is disclosed: the second layer transport layer is mainly connected to the control layer and Data interaction between device layers, standard protocol disclosure, protocol function disclosure; layer 3 is the control layer, the underlying software is controlled, the underlying interface function is exposed, the database interface function is exposed; the fourth layer is the management layer, for the application service, Add, delete, and modify.

Ejector Header Connector

Ejector Header Connector,Ejector Header Smt Connector,Ejector Header Right Angle Connector,Ejector Header Straight Connector

Dongguan Yangyue Metal Technology Co., Ltd , https://www.yyconnector.com