How to build a simple access control system

If you are faced with the need to install a room access system and are lost in the endless list of components, read this article and you will learn how to select equipment for a simple access control system (ACS). The article will focus on the common request “I want the door to open using a card.” Everyone understands why this is needed: convenient, reliable and relatively safe. Let's start with the lock - one of the two main devices of the access control system responsible for security.

Which lock to choose?

The choice of lock depends on the design of the door and the level of intrusion protection you want to provide. There are locks: 1) electromagnetic, 2) electromechanical and 3) electric strikes, 4) solenoid and 5) motor - the list is sorted by degree of burglary resistance. The complexity of installing a lock increases in approximately the same sequence. Prices for the first four types of locks vary greatly, but motor locks cannot be cheap.

Electromagnetic lock

Connecting access system components

A cable is required to connect the access control system components. The number of cores is determined by the connection diagram; as a rule, you need or. If the lock is installed on the door, such as electromechanical or solenoid, then for mechanical protection cable is used. A cable with a monocore (“twisted pair” or power cable) will not work in this case - such a cable is not intended for frequent bending.

The solution is ready

To collect simple system Access control you will need: a lock, access cards or keys and a reader, a controller, an exit button and a power source. Locks can be normally open or normally closed; the choice of a specific model depends on the door design and burglary resistance requirements. The reader must be suitable for the selected type of cards or keys. The most resistant to attempts to deceive the system is the reader Mifare, operating in protected mode. As for the controller, any standalone access controller will provide minimum required functions. Network controllers provide recording of working hours and access schedules. The top of the evolution of exit buttons is a contactless backlit exit button, but any other simpler one will do just fine. The power source must provide sufficient current. It is better to use a separate source for the lock to increase the system’s resistance to hacking. An 8-core signal cable is suitable for connecting system components, but for connecting electromechanical and motor locks it is better to take a separate cable with a larger cross-section.

Using this guide, you can easily assemble an access control system that meets your requirements even in the smallest detail. To save your time, we have selected the most frequently requested configuration options in ready-made solutions.

Ensuring safety at the facility currently plays a very important role. One of the main means of achieving this goal is the system. All security lines are expanded through the integration of various subsystems. As part of a single protective complex includes:

  • ACS;
  • Video surveillance subsystem;
  • Intercom subsystem;
  • Security and fire alarms.

Thanks to access restriction systems (ARS), you can easily ensure access mode to any room. You can extract information about the client from the database and use it in the future to solve certain problems. Using such schemes, it is possible to record the number of people staying in the territory of a protected facility and determine their exact location. Operator security scheme can track the time employees spend at work.

What is a protective complex?

Regardless functional characteristics The ODS is designed to restrict access within a certain period of time. Its presence ensures total control over the situation, as well as the safety of employees, law and order, and the safety of material assets. The simplest limitation scheme is door lock. You definitely need to understand that this is not an ordinary door lock, but a so-called smart lock.

The video describes the operation of a smart lock:

Restrictive systems include not only electromechanical lock. To ensure comprehensive functioning, a controller must be installed that controls the position of the locking device. A reader is also installed, which transmits a signal to the controller about a change in the door position. The entire mechanism is activated by an electronic key (identifier).

Network ODS are becoming increasingly popular. Access control in in this case carried out through a combination of hardware, software and control subsystem.

The use of this type of protection is optimal not only for controlling the entry and exit of employees. For a certain period, you can receive reporting information for accounting.

An innovation in the field of access systems is universal ODS. They combine local and centralized functions. This allows operation to continue as normal. In the absence of power supply, they switch to an individual operating circuit.

Components of the equipment

In terms of equipment composition, access restriction schemes are similar to access control systems. In practice, an analogy is drawn between them, since their functionality is aimed at performing the same tasks. The SOD includes:

  • Access restriction equipment (controllers);
  • Identifiers (contactless and contact cards, electronic keys, key fobs);
  • Card readers of various levels of complexity (including for reading biometric data);
  • Executive devices.

Particular attention must be paid to identifiers. After all, they play an important role in the process of allowing access to the protected premises. Depending on the choice of identifier, the total cost of the entire security line is determined. Mainly used for access control:

  • Identification key;
  • Map;
  • Radio key fob.

Key Touch Memory Today it is the most common means of identification. Most often it is used in apartment buildings to restrict access to the home. Despite advances, this technology is used most preferably. A modern option The key is the Em-marine electronic card.

This card is used for contactless reading of information. There is no need to select the proportionality of the reader and the electronic key. Card readers for contactless cards are very stylish and fit well into any interior. Systems with such identifiers are easily integrated with other ODS.

The video talks about the Touch Memory key:

Modern technologies - paid pass devices

IN Lately The system of paid admission and automation of settlement operations is gaining enormous popularity. The system uses contactless cards or cards with a magnetic stripe. The areas of application are varied:

  • Resorts;
  • Shopping and entertainment centers;
  • Casino;
  • Park rides;
  • Sport complexes;
  • Fitness centers, etc.

An important advantage of the system is the principle of its operation. All components work individually and are not connected by one network. In this case, there is no need for complex cable laying. At the same time, this work scheme allows you to carefully process information at all checkpoints.

The operation of the system is based on the use of an electronic card as a key. This card serves as a kind of wallet. It displays everything in the database necessary information: indicates the owner, card type, payments made.

The card is universal, so when using it, the system does not request data from the controller, since they are all read directly from the key. This type of control is very convenient for both clients and owners of the protected area. The presence of such systems will reduce personnel costs. Throughput is increased and ensures that malpractice is prevented.

The latest advancement for limiting paywalls is smart cards (contactless). They read information from a distance. When using them, it is not necessary to select a clear position relative to the reader. The cards are durable and protected from counterfeiting.

The picture shows a diagram of how a smart card works

Cards are often used in areas where disposable plastic or paper tickets are widely used. Thanks to its design, the system is designed to perform the following tasks:

  • Organizing unhindered client access to the place of service provision;
  • Codification of cards;
  • Comprehensive recording of operator actions;
  • Creation of reports;
  • Providing the client with information about the current card balance;
  • Control over all events related to the use of paid services by the client.

To summarize the information received and the productivity of the system, specialized software is used. It is intended to describe all operating parameters, including technical ones. The software is designed in such a way that it has a clear and easy-to-use interface and does not require additional training for employees.

ODS for an ATM - a technological solution to security issues

The ATM access restriction system has a narrow profile and is designed to ensure the personal safety of the client during transactions. The presence of such systems allows you to protect the device from possible acts of vandalism. This type of protection solves a number of problems, including:

  • Control of access to the ATM of a client who owns a plastic card of this particular banking institution;
  • It is inadmissible to admit persons who do not have plastic card or its validity period has expired;
  • Monitoring motion sensors and burglar alarm in a specific area;
  • Indication of light during client presence;
  • Triggering an alarm in the event of an emergency.

Today, such a means of restricting access to an ATM is a necessity. Installation of such equipment has its own characteristics:

  • Reliability, security;
  • Easy installation;
  • Easy to use.

The system is controlled by an electromechanical lock installed on front door. The ATM is located indoors. To get into it, the client must present to the card reader a card of the banking institution where he wants to gain access. Entry of other persons into the premises before the previous client has left is prohibited.


In the event of an emergency, the system begins to work differently. The room is always equipped with motion, security and volume sensors. If you spend a long time at the ATM or damage something in the premises, an alarm will sound and video recording will start.

Sensors monitor such a situation when the client presented a card and changed his mind about entering.

There is no restriction on access to the next client in this situation. The system has programmed cards from 10 payment systems. In this regard, access is also allowed to clients of other banks if their cards are classified as acceptable payment systems. The components of the ODS for the ATM are:

  • Access control controller;
  • Readers;
  • Electromechanical locks;
  • Sensors;
  • Information table;
  • Video cameras.

ATM access restriction systems are being supplemented software. It is necessary to configure the operation of the device. Access to the system is password protected. Using the software allows you to configure the following parameters:

  • Lists of payment cards;
  • Types of acceptable payment systems;
  • Limit period of time spent at the ATM;
  • Control over the validity period of the payment card.

Currently, every owner of a private house agrees that restricting access to his land plot plays a big role in ensuring own safety. Professional equipment and services for installing a limited access system are not exactly a cheap pleasure. Now video intercoms have appeared on sale, which already have not only color screens, but also calling panels, as well as electromechanical locks. On the basis of these sets you can mount effective system limited access to a private home.

Let's look at the main elements of a limited access system that will be needed for installation:
- electromagnetic or electromechanical lock (for example, Polis-1M);
- multi-core six-wire power copper wire(double insulation) with a cross section of 0.5 sq. mm, if the distance from the calling panel to the intercom is small, you can use the usual twisted pair network version (four from the video intercom of the calling panel and two power supplies from the UPS to the controller);
- source of uninterrupted or backup power(UPS), with a battery of a given power, in order to provide a certain period of power without an external home network (for example, SKAT-1200);
- two-core power copper wire (double insulation) with a cross-section of 0.75 sq. mm (UPS power supply);
- two-core power copper wire (double insulation) with a cross-section of 0.5 sq. mm (from the UPS to the intercom);
- a calling panel with a call button, a microphone and a video camera;
- access key reader and, accordingly, the Dallas keys themselves for the reader;
- controller Z-5R;
- video intercom with monochrome or color screen.


The perimeter of the private house is fenced with a fence, and the gate for vehicle entry and the entrance gate are locked from the inside and equipped with an access restriction system. On entrance gate a calling panel, a key reader and an electromechanical or electromagnetic lock are installed. The electromagnetic lock must be constantly powered; it holds the gate using electromagnetic forces, therefore, it is more energy dependent.


The controller can be installed in a protective box or waterproof case and serves to control the operation of the lock, allowing you to open it by touching the key to the reader.


Source uninterruptible power supply mounted indoors near the electricity input panel with package switches. Pad electrical wires will be in this order:
- 4-wire line from the video intercom to the calling panel;
- 2-wire reinforced line to the UPS from a household power supply, 220 volts;
- 2-wire line from the UPS to power the controller, 12 volts;
- 2-wire line from the UPS to power the video intercom, 12 volts.
The video intercom can be installed in any place convenient for you. As an intercom, I used an inexpensive device from the Chinese manufacturer Eplutus EP-2288 with a color display and a call button equipped with a camera and microphone. It has a calling panel with a good resolution camera, housed in a vandal-proof, waterproof housing. There is no audio handset to communicate with the visitor, since this model has a speakerphone. In addition, the video intercom is equipped with two audio-video inputs, thanks to which you can connect an additional two video cameras and increase the overview of the protected area.
The restricted access system is used in the following way, when you press a button on the calling panel of the fence door of the site, a signal is sent to the video intercom. The video function in the intercom is automatically activated and the microphone is turned on. To remotely open the lock on the entrance gate, just press the intercom button. In addition, the installed controller and Dallas key reader allows you to unlock the lock from outside the protected area using encrypted electronic keys. In this case, when required level security of the site territory, effectively limiting the entry of unauthorized persons.


To provide power to this system, an uninterruptible power supply was required, delivering a voltage of 12 volts, capable of powering the intercom, controller and electromechanical lock, even in the absence of external power. If your external power supply is turned off, then the backup power source will provide operation for 24 hours or more. battery the entire system.


The controller, mounted in a separate housing, is used to ensure the lock operates, the reader operates and the keys are programmed. Connecting all elements to the controller is carried out according to the instructions included in the kit. Using a given algorithm specified in it, it is possible to copy access keys, for example, if it is necessary to expand the circle of people who can enter the territory or if it is lost. Keys for the reader are programmed in any quantity, and you can distribute them to everyone who has access to the territory of the house. The cost of an access key is also low; accordingly, the key can be programmed for all persons who can enter the site unhindered at any time. By the way, don’t be concerned about the possibility of unwanted guests getting to you, even if they have an access key, for example, if it is lost. You can easily reprogram all the keys in a matter of minutes or use the master key to block the opening of the lock with all other keys; just one touch to the reader will be enough. This entire system can be equipped security sensors, connected to the controller, which will give a signal to the siren when the door or window is opened.




When installing the entire system, I encountered incorrect operation of the controller and video intercom with an electric lock. After some trial and error, I determined the reason. The voltage supply from the video intercom to the lock and from the key reader are not separated (it’s like two systems working in parallel), in order to separate them it was enough to install simple diodes that pass current only in one direction, allowing it to operate separately.

The security of an office or enterprise today is the impossibility of unauthorized entry of unauthorized persons into the territory. In this regard, the team of the IVP "Progress" company invites your attention to organize access control using cards to the territory of your institution or production.

General advantages of ACS

Any access control system is professional equipment that solves three main problems:

* restriction of access to certain premises;

* identification of persons having access to certain premises using special cards, keys, key fobs, fingerprints;

* ability to track time with great accuracy.

For access to certain premises, the most common system is card access control. This is a collection of software technical devices and means that ensure access to the premises only to identified users. The role of identifier can be attributive or biometric identifiers. In addition, each card user may have his own access capabilities, different from another employee of the institution.

Types of cards

Today, to control access by cards, there are several types of created cards, some of which have received greater application, others - less:

* magnetic cards today have become the most widespread due to the proper level of practicality and functionality, and comparative cheapness. Such a card has the ability to record information on different tracks, as well as high or low voltage of the demagnetizing field;

* RF contactless cards allow you to use them over a considerable distance, thereby providing sufficient throughput, trouble-free operation, and ease of use. The antenna built into the card, when it enters the radiation range of a specific electromagnetic frequency, activates the card chip. The chip receives energy to send a signal and transmit the card identification number;

* in card access control you can find barcode cards, the barcode in which is masked using special material that is visible only in infrared light;

* Wiegand cards have in their design a piece of a special alloy that reacts only to a read head with the same alloy. They are more reliable than conventional magnetic ones, but more expensive.


ACS controllers

Access control using cards involves not only an identification element, but also a reader that can read information from the card and enter it into the ACS controller. A controller is a device that reads information received by the reader, makes decisions and controls actuators. There are three main types of controllers for card access control:

* standalone controllers. They serve no more than one access point, can be combined with other system devices, and have a capacity of no more than 500 people. Any type of reader can work with such a controller;

* network controllers are one of the most common. They have proven themselves to be excellent large enterprises where there are thousands of workers, there are dozens of access points. Such a controller is controlled by a computer using specially developed programs and provides many advantages to the operator. Using such controllers, you can find out the location of a specific person at a real time, create reports on the presence of an employee at the workplace, automatically keep a time sheet, and receive reports on the movements of employees. In addition, such controllers make it possible to create a database of employees, create a time schedule of movement and monitor its execution.

In a word, access control using cards from our company is your confidence that only employees will be able to enter the enterprise.