门禁监管系统外文翻译
更新时间:2023-10-18 13:12:01 阅读量: 综合文库 文档下载
- 门禁监管app推荐度:
- 相关推荐
The Access control system
Access control system is widely used in recent years and it is one of the high-tech and safety equipment , has become one of the intelligent signs of modern architecture. Access control , the export and the entrance control system, is to control the export and entrance channel system. Access control system is developed on the basis of the traditional locks (Entrance Guard/Access Control in English).
Access control is, in reality, an everyday phenomenon. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. Bouncers standing in front of a night club is perhaps a more primitive mode of access control (given the evident lack of information technology involved). The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment .Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.
Physical access by a person may be allowed depending on payment, authorization, etc. Also there may be one-way traffic of people. These can be enforced by personnel such as a border guard, a doorman, a ticket checker, etc., or with a device such as a turnstile. There may be fences to avoid circumventing this access control. An alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country. In physical security, the term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the Access control vestibule.
Within these environments ,physical key management may also be employed as a means of further managing and monitoring access to mechanically keyed areas or access
to certain small assets . Physical access control is a matter of who , where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. Historically this was partially accomplished through keys and locks. When a door is locked only someone with a key can enter through the door depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed. Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a
predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.
When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted .The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room. To prevent this, two-factor authenticationcan be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input.
There are three types (factors) of authenticating information :
? ? ?
something the user knows, ega password, pass-phrase or PIN something the user has, such as smart card
something the user is, such as fingerprint, verified by biometric
measurement.
Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, where another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password in combination with the extant factor of the user in question and thus provide two factors for the user with missing credential, and three factors overall to allow access. Now, as people's living standards improve and technology advances, more and more local needs of access control system such as residential entrance, garage entrance, the entrance and other public places. Many different types of access control system; because it has different characteristics, so do not use the place, IC card access control system because of its higher security, better convenience and cost-effective access control system into the mainstream. IC card technology is currently widely used in various industries, particularly public transport, wireless communications, identification, financial transactions and security and defense industries. Access Control System software is easy to use, simple features, operators do not need a professional level of computer operation.
正在阅读:
门禁监管系统外文翻译10-18
精致深邃市场报告年终总结模板05-13
王兆安第四版电力电子技术课后答案01-04
2022年全国安全生产月活动宣传标语07-31
现代文阅读 第二章 文学作品阅读 专题二 小说 考点针对练(一)04-09
C与C++经典面试题(内存泄露)10-08
那一次我笑了作文1000字07-01
- 多层物业服务方案
- (审判实务)习惯法与少数民族地区民间纠纷解决问题(孙 潋)
- 人教版新课标六年级下册语文全册教案
- 词语打卡
- photoshop实习报告
- 钢结构设计原理综合测试2
- 2014年期末练习题
- 高中数学中的逆向思维解题方法探讨
- 名师原创 全国通用2014-2015学年高二寒假作业 政治(一)Word版
- 北航《建筑结构检测鉴定与加固》在线作业三
- XX县卫生监督所工程建设项目可行性研究报告
- 小学四年级观察作文经典评语
- 浅谈110KV变电站电气一次设计-程泉焱(1)
- 安全员考试题库
- 国家电网公司变电运维管理规定(试行)
- 义务教育课程标准稿征求意见提纲
- 教学秘书面试技巧
- 钢结构工程施工组织设计
- 水利工程概论论文
- 09届九年级数学第四次模拟试卷
- 外文
- 门禁
- 监管
- 翻译
- 系统
- 村巡查汇报材料
- 第2章第10节实验:测定电池的电动势和内阻练习题及答案解析
- 2015年秋九年级物理(上)+(人教版)+期末检测题
- 礼仪文书:聘书的适用范围
- 2017年学生体质健康分析报告
- 通化市物业管理公司名录2018版147家 - 图文
- 内网门户平台建设解决方案
- 生化简答题(附答案)
- 生涯人物访谈报告
- 2018年中考模拟
- 与月亮有关的诗句
- 河南省中原名校2018届高三第三次质量考评试卷生物(含解析)
- 2014年数学建模选拔赛试题 2
- 2017七年级语文上册第六单元名著导读《精读和跳读》教案设计新人教版
- 八学分
- 厂纪厂规与员工守则
- 自动控制复习题集
- 乐东中环果蔬包装纸箱厂建设工程可行性研究报告
- 2015年5.23事业单位考试行政职业能力测试A类真题(含答案) - 图文
- 高财习题