简体中文
Current Location:Home > Application > Security equipment
System composition
Security mainly includes: closed-circuit monitoring system, anti-theft alarm system, building intercom system, parking lot management system, residential card system, infrared perimeter alarm system, electronic fence, patrol system, attendance access control system, security machine room system, electronic examination room system, intelligent door lock and so on.
In a simple summary, the basic configuration of each subsystem includes: front-end, transmission, information processing/control/display/communication three units. The specific contents of the three units are different in different subsystems.
Alarm system
Intrusion alarm system (IAS); An electronic system or network that uses sensor technology and electronic information technology to detect and indicate illegal entry or attempted illegal entry into a fortified area, process alarm messages, and issue alarm messages.
Intrusion alarm system is composed of perimeter protection, inner (outer) area/space protection of building and object protection separately or in combination. The front end devices of the system are various types of intrusion detectors (sensors). Transmission mode can use wired transmission or wireless transmission, wired transmission can also use special line transmission, telephone line transmission and other ways; Alarm controller can be used for terminal display, control and equipment communication of the system, and alarm center console can also be set. When designing the system, the intrusion detectors should be configured so that their detection range has sufficient coverage, and various detectors with different detection principles should be considered.
Monitoring and control system
Video security monitoring system using video technology to detect, monitor the fortified area and real-time display, record the scene of the image of the electronic system or network.
The front-end equipment of the system is a variety of types of cameras (or video alarm) monitor and its auxiliary equipment, transmission mode can use coaxial cable transmission or optical fiber transmission; The terminal equipment of the system is display, record, control, communication equipment (including multimedia technology equipment), generally using an independent video center console or monitor-alarm center console.
Control system
An electronic system or network that uses custom character recognition and/or pattern recognition technology to identify the entrance and exit targets and control the opening and closing of the entrance and exit actuators.
The entrance and exit control system is generally composed of three parts: entrance and exit image (person, object) recognition device, entrance and exit information processing, control, communication device and entrance and exit control actuator. The entrance and exit control system should have preventive measures to prevent one card from entering more than one person or one card from more than one person. There should be a password system to prevent similar devices from illegally copying valid identification cards, and the password system should be able to authorize modification.
Inspection system
Electronic patrol system An electronic system or network that manages and controls the patrol route, mode and process of security patrol personnel.
Management system
Parking garage (field) management system An electronic system or network that automatically logs in, monitors and manages vehicles entering and leaving the parking garage (field).
Check system
An electronic system or network that checks persons, baggage, and cargo for explosives, weapons, and/or other contraband.
Processing system
The safe EOD system includes: EOD portable water cutting system, EOD robot, EOD tank, EOD blanket, EOD suit, etc., aiming to safely dispose of the items involved in safety risks.
Alarm system
When the vehicle or other target is moved, it can timely feedback the status of its work.
Chain of command
Alarm communication command system.
Check attendance and access control
Access control security management system is a new type of modern security management system, it sets the microcomputer automatic identification technology and modern security management measures as a whole, it involves electronics, machinery, optics, computer technology, communication technology, biotechnology and many other new technologies. It is an effective measure to solve the security management of the entrance and exit of the important department. Suitable for all kinds of confidential departments, such as banks, hotels, computer rooms, armoury, confidential rooms, office rooms, intelligent residential areas, factories, etc.
Technical Support:WangGuang Network Copyright © 2023 Shenzhen Zhongke Ruier Information Technology Co., Ltd 粤ICP备2023097733号