Flap Barrier Gate
Flap Barrier
Flap Barrier
Flap Barrier
Flap Barrier
Flap Barrier
Flap Barrier
Flap Barrier
Flap Barrier
Flap Barrier
Flap Barrier

Flap Barrier

Flap barrier is a control device for the passage of people. It is used in places where personnel control is required for exits and entrances, such as canteens, hotels, museums, gymnasiums, clubs, subways, stations, and docks. Flap barriers can make people
share:
Advantages


1. Introduction

Flap barrier is a control device for the passage of people. It is used in places where personnel control is required for exits and entrances, such as canteens, hotels, museums, gymnasiums, clubs, subways, stations, and docks. Flap barriers can make people flow through the channel in an orderly manner.

The combination of the flap barrier and the IC/ID read head constitutes an intelligent flap barrier. The intelligent flap barrier is combined with computer and access control attendance management software to form an intelligent flap barrier management system, which can realize access control, attendance, and current limiting functions.

2. System Structure

 The intelligent flap barrier management system consists of computer, card reader, flap barrier, IC/ID card, and management software. TCP/IP communication is adopted between the computer and the flap barrier, and a single computer can connect multiple flap barriers. The flap barrier can run both online and offline.

2.1 Card Reader

Card Reader
1. CPU: AT89C52, 8K EEPROM
2. Frequency: 13.56MHz
3. Effective range of RF card operation: 100mm
4. Communication interface: 485/232 interface
5. Baud rate: 9600 bit/s
6. RF card communication rate: 106K bit/s
7. Single power supply 12V
8. Security: Three times mutual authentication (ISO/IEC DIS9798-2) all data in the communication process are encrypted to prevent signal interception and transmission password, write protection
9. Typical processing time: typical transaction process <100ms
10. Working temperature: -15℃~+70℃
11. Ambient humidity: 10%~90%
12. Card storage capacity: 8Kbit
13. Support C language, WINDOWS, FOXPRO, and other function library calls
 

2.2 Access Controller

Access Controller
1. Name: Double door TCP/IP network access controller
2. Number of management doors: 2
3. Number of accessible card readers: 4
4. Number of registered cards that can be stored: 20,000
5. Number of records that can be stored: 100,000
6. Communication method: TCP/IP
7. Databases supported by the supporting software: Access and SQL

2.3 Access control management software

Access control management software
Software operation process:
1. Find the software installation package, open it, select setup, and double-click to open it.
2. Enter the installation interface and click Next to complete the installation.
3. After the installation is complete, a key icon "Access Control Management" will appear on the desktop of the computer.
4. Double-click to enter the software login interface. The user is "abc" Password is "123"
5. After entering the software, select "1. Add a controller by searching"
6. Click to search the controller in the network, the software will automatically search out the controller. The default IP address of the controller is 192.168.0.0
7. The default IP address of the controller is 192.168.0.0 Click to modify the network parameters of the controller to modify it to the local network IP address
8. After the modification is completed, the controller is added to the software
9. Click on the department to add department and user information
10. Click "Permissions" to add or delete permissions, and the permission management interface will appear.
11. Move the user and optional door to the right and click Allow to prompt whether to confirm or not. Click OK
12. After the authorization is completed, the
13. Click to operate, select all to select two doors
14. After selecting the door, click Upload Settings. The option to upload to the controller appears, click OK
15. After the upload is complete, the following interface appears
16. After uploading the card data, you can swipe the card to open the gate. After swiping the card and there is a record, click to select all two doors to extract the record
17. After the extraction of records is completed, click Query Original Records to check the card swiping time of the personnel

2.4 Flap barrier

Flap barrier is to manage personnel passages. This product has fine processing, complete functions, and high grades. It is mainly used in residential areas, office buildings, hotels, subways, docks, and clubs.
The device is compatible with IC cards, ID cards, barcode cards, fingerprints, and other card-reading. It can control and manage personnel passages by matching various identification system equipment and safety protection devices, alarm devices, and direction indications.

3. Features

1. The employee must read the card through the personal identification card, and then can open the gate only after being approved by the system.

2. There are privileged users and ordinary users to open the gate. Privileged personnel are not affected by the opening time and opening method, and can perform operations such as card issuance and deletion when offline.

3. You can specify the general user's authority to open the gate within a certain period of time.

4. The validity period of a certain card can be flexibly set.

5. Real-time alarm for some abnormal gates(such as gate not closing for a long time), the illegal opening of gates, etc.

6. Statistical query on the movement of all gates and cards.

7. Establish a software operator's authority control level, and generate a diary file for all the operator's operations.

8. There are five gate opening modes: card, card + password, card or password, internal gate button, and remote gate.

9. It can work independently offline. When working offline, basic operations such as batch card issuance or deletion can be realized through the keyboard. After reconnecting to the network, the event records during the offline period will be automatically uploaded.

10. Built-in timing chip when working offline, which can ensure that the event recording time during the offline period is consistent with the current system time.

11. Different gate opening methods can be set, such as delayed gate opening (automatic gate closing after a delay) and gate normally open method (gate opening does not close, only need to swipe the card to close).

4. Software function

1. Controller working status setting
In addition to reading the card to open the door and the system operator directly sending instructions to open the door, the system can also perform various settings for the working state of the controller. Conversion can also be automated through a specified schedule. This is a very useful function. If there are some public passages that need to be open during working hours during the day, when idlers are not allowed to enter and exit at will after get off work, we can set a work schedule, and use this schedule to automatically control the opening state of the gate.

2. Support alarm event selection
 The system can select the events that need to be alerted by the authorized system operator. When selecting, you only need the nature of the alarm event required in the point, which is very convenient and intuitive. After making the selection, there will be an alarm only when the selected event occurs. If we do not select the "blacklist card swipe" situation as the alarm event, the system will give an alarm signal when the blacklist card is swiped. Therefore, this operation item requires a higher authority to be set. Normally, only the highest-level system operator has the authority to change alarm event selections.

3. Automatic detection of the communication loop of the controller
The system automatically detects the communication loop of the controller. When the communication line fails, the system will automatically alarm.

4. Support login event filtering
The system can make filter selections for unwanted events by a privileged system operator. As with alarm event selection, events that do not need to be recorded and displayed can be conveniently and intuitively located. In this way, when the system receives such information, it can automatically filter. This operation item also requires a higher authority to be set. Normally, only the highest-level system operator has the authority to change alarm event selections. Otherwise, some unforeseen events will not be recorded. 5. Graphical User Interface
WINDOWS-based system. Therefore, users can perform most operations by simply selecting the icon and clicking it, just like using other WINDOWS applications, such as Microsoft Office.

6. Rich online help
In the event of trouble during operation, the responsive online help provides user guidance at all times. Users can easily find the explanations and suggestions they need through the index without bothering to find them.

7. System entry and exit security
The system can set levels for all operators, increasing the security of the system. The level setting will prevent unauthorized persons from entering, exiting, and controlling the system. Operator activities are logged by the system and reported by authorized users. Any functional module can be managed uniformly.

8. Real-time activity monitoring
The activities that occur on the controller will be immediately reported and displayed on the online monitoring screen, and at the same time, they can be printed out in real-time through the printer connected to the PC (can also be set to offline printing). When there is an alarm or other abnormal event, the sound and light alarm on the online monitoring screen can make the operator feel it immediately.

9. Cardholder Permissions
The cardholder authority is designed by the operator: using different timetables and time limits, for different controllers, different cardholder authorities can be arbitrarily formed. These permissions define the doors or electric wing gates that can pass through, and are automatically downloaded to the smart communicator and controller when the permissions are confirmed.

10. Timetable and Time Limits
Provide 2048 timetables and 2048 time limits for the card reader, input and output to automatically call. The established schedule and time limit are automatically downloaded to the smart communicator and each controller upon confirmation.

11. Large-capacity cardholder database
The system can have 100,000 cardholders and 50,000 blacklist data. All cardholder record fields can be indexed and used as index keys to print the cardholder database. The cardholder's login interface is friendly and intuitive, and various permissions, levels, and validity periods are all selected by clicking, which is quick and convenient. Logged cardholder information is automatically downloaded to the smart controller and controller upon confirmation.

12. Convenient database output
Cardholder database and data files can be output in TXT text files, ASCII, DBF, and other database formats for query or other purposes.

13. Monitoring center management software
This software can be installed in the security monitoring room to monitor the person entering and leaving each gate in real time.
 
14. Convenient and fast electronic map browsing function

RECOMMENDED
QR code Turnstile
QR code Turnstile
As a professional access control product
Electronic Turnstile
Electronic Turnstile
As a professional access control product
Metro Turnstile
Metro Turnstile
As a professional access control product
Glass Security Turnstiles
Glass Security Turnstiles
As a professional access control product
Get your quotation now!
Fields marked with an asterisk (*) are required.
Kit