The access control system, often referred to as the entrance and exit control system, is a critical component in managing the flow of people and goods. In typical design and application, the system focuses on controlling access for authorized personnel. According to the Ministry of Public Security's GA/T 394-2002 "Technical Requirements for Access Control Systems" and the national standard GB50396-2007 "Engineering Design Specification for Entry and Exit Control Systems," the system must include four essential functions: release, rejection, recording, and alarm. As an active prevention system in security technology, it not only identifies and verifies individuals and items but also makes quick decisions to either grant or deny access. All activities are recorded and stored, and in case of a system breach, it should have built-in protection and alarm mechanisms.
GB50396-2007 outlines five mandatory requirements that must be strictly followed in system design. However, in real-world applications, several issues are often overlooked, leading to serious vulnerabilities in the system’s performance.
Equipment Selection and System Anti-Destruction and Anti-Technical Opening Requirements
When designing an access control system, equipment selection must align with the project’s security level. This primarily involves the system’s protective capabilities, especially its resistance to physical damage and technical tampering. The national standard GB50396-2007 categorizes equipment protection into three levels—A, B, and C—from low to high. However, many people confuse “anti-vandal†with “anti-device destruction.†The correct understanding is that the system should prevent unauthorized access even when the equipment on the protected surface is subjected to destructive attacks.
For example, a card reader may be completely destroyed within one minute, yet the door remains locked for 30 minutes. On the other hand, a more robust access control unit might take 10 minutes to destroy, but once damaged, the door can be opened in just one minute. This shows that the latter has weaker anti-destructive capability despite its strong appearance. In practice, the system and equipment must be chosen based on different security levels and management needs to meet both “anti-vandal†and “anti-technical opening†requirements. For instance, some fingerprint readers have a RESET button exposed on the protective surface, which can be easily triggered by a small needle, erasing all stored data.
Control Equipment Installation Location and System's Own Security Level
GB50396-2007 clearly specifies the installation location of control equipment. Article 6.0.2 states that control devices using non-coded signals must be placed in the corresponding controlled area, the same-level controlled area, or a higher-level controlled area. In most access control designs, card readers are installed outside the controlled area, while the controller and power supply are inside, reducing exposure to damage. However, when using multi-door controllers, which can manage multiple doors, the installation location becomes more complex and directly affects the system’s security level.
Figure 1 illustrates the standard layout of a single-door access control system. When dealing with multi-door controllers, such as a two-door or four-door system, the placement of the controller becomes a critical point. If the controller is located in a lower-level zone, it may expose higher-level zones to risks. For example, if a two-door controller is installed in Zone A, then Zone B is vulnerable, and vice versa. The weakest point, marked as “※,†is the most susceptible to attack.
In a higher-security setup, the controller should be placed in the highest-level zone, such as G, to ensure maximum protection. Figure 4 shows a comprehensive system where different zones have varying security levels. Zones A, B, and E are studios with the same access level, so a multi-door controller can be installed in Zone B. However, Zones C and D require independent control due to their sensitive nature, so each must have its own dedicated controller. Zone D connects to the laboratory, and since G is the core lab, a multi-door controller can be placed there to manage access to G, F, and D. This ensures that the security level of each area remains intact without compromising overall system integrity.
99% Ceramic Accessories,99 Porcelain Square Pieces,Ceramic Square Pieces,99 Ceramic Square Pieces
Yixing Guanming Special Ceramic Technology Co., Ltd , https://www.guanmingceramic.com