Главная страницаe-mailКарта сайта русская версияenglish version

Attention! New product

Godograf-Universal
Godograf-Universal

Product Details
BP-210RM
BP-210RM

Product Details
Rubezh-М
Rubezh-М

Product Details
Integral
Integral

Product Details
Focus-SМ 16/32
Focus-SМ 16/32

Product Details
RLD Redut-300 (-K, -S, -Т)
RLD Redut-300 (-K, -S, -Т)

Product Details
Home arrow Products arrow Integrated security systems arrow Entrance/Exit Control Point
 

NIKIRET - Russian leader of security technologies

   The system supports the realization of ID card algorithm with video verification; in this case a security officer at the automated workstation takes part in the procedure of user's identification. Access is granted on the base of the comparison of the picture from users' database and the picture displayed on the monitor unit of CCTV.

   Operator's board provides the following possibility:

  • surveillance of technical status of check points;
  • generation of sonic and visual messages about alarm situation in the check points;
  • remote release of apprehended employees;
  • simultaneous opening or unblocking of all check point cabins;
  • intercom telephony of a security man with the first check-point cabin.

   On the display panel of the board the messages about the reasons of prohibition of user's pass through check-point cabins are generated "Entrance is prohibited", "Suspensory veto", "Not your shift", "ID card is not used" and etc.).

   Access of temporary staff to a protected zone is granted by two methods.

   1. Temporary staff is escorted by permanent staff:

A user is identified by an impersonal user's card and both a ID card and a personal code of an accompanying person to be shown to the entry device of identification features (EDIF) immediately after the temporary user's ID card. If the results of identification are positive and current data meet the permissible data the system automatically unblocks a blocking controlled device);

   2. By automatically controlled method:

Identification means an electronic copy of the picture from the user's ID card is shown (after an impersonal card-pass of a temporary user is shown to EDIF) on the monitor screen of the security man and further visual check of user's face and an electronic copy of the picture. If the results of identification are positive, a security man orders to unblock a blocking controlled device.

   When a permanent staff or temporary staff leaves a protected area, identification is carried out by an ID card code.

   It is carried out in two variants:

   1. Transfer turnstiles:

   A checkpoint cabin is an entrance security cabin equipped with two pairs of turning self-closing leaves; one is located on the part of a protected area, the other is located on the part of an unprotected area.

   A service computer performs data exchange with file server of the system "Zirconiy-S2000" operates in round-the-clock continuous mode and provides control of checkpoint cabins. In the administrative computer there is a program receiving reference permissible data for the system users from the service computer and transferring information about the users' passes and about the actions of a security service operator to the service computer.

   2. Turnstiles:

   A service computer providing data exchange with file server of the system "Zirconiy-S2000" operates in the continuous round-the-clock mode and controls turnstiles. In the managing computer there is a program receiving reference permissible data for the system users from the service computer and transmitting information to the service computer about the users' passes and actions of security service man-operator.



Entrance Security Cabin Turnstiles

Checkpoint of entrance security cabin.  Product Details...