title>GA/T 394-2002 Technical requirements for access control systems - GA/T 394-2002 - Chinese standardNet - bzxz.net
Home > GA > GA/T 394-2002 Technical requirements for access control systems
GA/T 394-2002 Technical requirements for access control systems

Basic Information

Standard ID: GA/T 394-2002

Standard Name: Technical requirements for access control systems

Chinese Name: 出入口控制系统技术要求

Standard category:Public Safety Industry Standards (GA)

state:in force

Date of Release2002-09-25

Date of Implementation:2002-12-31

standard classification number

Standard ICS number:Environmental protection, health and safety >> 13.310 Prevention of criminal acts

Standard Classification Number:General>>Public Security>>A91 Security Alarm System

associated standards

Publication information

publishing house:China Standards Press

ISBN:155066.2-14924

Publication date:2004-04-30

other information

Publishing department:Ministry of Public Security of the People's Republic of China

Introduction to standards:

This standard specifies the technical requirements for access control systems and is the basic basis for the design and acceptance of access control systems. This standard applies to access control systems or equipment that log, identify and control specified target information for the purpose of security. Other access control systems or equipment [such as building intercom (visual) systems, anti-theft security doors, etc.] are specified by the corresponding technologies. GA/T 394-2002 Technical Requirements for Access Control Systems GA/T394-2002 Standard Download Decompression Password: www.bzxz.net

Some standard content:

ICS13.310
People's Republic of China Public Security Industry Standard GA/T394-2002
20030382
Technical requirements for access control systems
Specifications of access control system2002-09-25 issued
The Ministry of Public Security of the People's Republic of China issued
2002-12-31 implementation
Normative reference documents
Terms and definitions
System functional requirements
System design and equipment installation requirements·
Safety requirements…
Electromagnetic compatibility requirements
Lightning protection and grounding requirements…
Environmental adaptability requirements·
Reliability requirements
Document provision
System protection level classification recommendation table
Appendix A (informative appendix)
GA/T394—2002
Appendix A of this standard is an informative appendix.
This standard is proposed and managed by the National Technical Committee for Standardization of Security Alarm Systems. GA/T394-—2002
The drafting units of this standard are: Beijing Aixes Technology Development Co., Ltd., the Secretariat of the National Security Alarm System Standardization Technical Committee, and Beijing Tianlong Control System Co., Ltd. The main drafters of this standard are: Zhu Feng, Liu Xiqing, Tian Jing, Jin Wei, and He Peizhong. Check the standard on the construction standard website wwiz321.net
1 Scope
Technical requirements for access control systems
GA/T394—2002
This standard specifies the technical requirements for access control systems and is the basic basis for the design and acceptance of access control systems. This standard applies to access control systems or equipment that log in, identify and control specified target information for the purpose of security. Other access control systems or equipment [such as: building intercom (visual) systems, anti-theft security doors, etc.] are specified by the corresponding technical standards. 2 Normative references
The clauses in the following documents become the clauses of this standard through reference in this standard. For any dated referenced document, all subsequent amendments (excluding errata) or revisions are not applicable to this standard. However, parties that reach an agreement based on this standard are encouraged to study whether the latest versions of these documents can be used. For any undated referenced document, the latest version is applicable to this standard. GB4208-1993 Enclosure protection grade (IP code) (eqvIEC529:1989) GB8702 Electromagnetic radiation protection regulations
GB12663 General technical conditions for anti-theft alarm controller GB/T15211 Alarm system environmental test
Safety requirements and test methods
GB16796-1997 Electrostatic discharge immunity test for security alarm equipment (idtIEC61000-4-2: Electromagnetic compatibility test and measurement technology
GB/T17626.2-1998
GB/T17626.3-1998
61000-4-3:1995)
GB/T17626.4-1998
610 00-4-4:1995)
GB/T17626.5--1999
5:1995)
GB/T17626.11—1999
Electromagnetic compatibility
Electromagnetic compatibility
Electromagnetic compatibility
Electromagnetic compatibility
Test (idtIEC61000-4-11:1994)
GA/T73-1994 Mechanical anti-theft locks
Test and measurement technology
Test and measurement technology
Test and measurement technology
GA/T74—2000 General graphic symbols for security systems 3 Terms and definitions
The following terms and definitions apply to this standard. 3.1
Access
The passageway through which people and/or articles pass. 3.2
Radio frequency electromagnetic field radiation immunity test (idtIEC electrical fast transient pulse group immunity test (idtIEC surge (impact) immunity test (idtIEC61000-4-Voltage sag, short interruption and voltage change immunity test)Access control system
accesscontrolsystem
The equipment (device) or network that uses electronic and information technology to identify and process relevant information and drive the actuator to act and/or indicate, thereby implementing operations such as release, rejection, recording and alarming of the target's access behavior at the entrance and exit.1
Check the standard on the construction standard network wwwiz321.net||t t||GA/T394—2002
Target object
People and/or objects that pass through the entrance and exit and need to be controlled. 3.4
Target information objectinformation
Special and identifiable characteristic information given to the target or the target. Numbers, characters, graphic images, human biological characteristics, object characteristics, time, etc. can all become target information.
Key key
Information and/or its carrier used to operate the entrance and exit control system and obtain access rights. The system is designed and manufactured to be operated only by its specific key.
The information represented by the key can have the characteristics of a person. and/or the identity of an object, access rights, system operation rights, and other single or multiple functions.
Personnel coding identification humancodingidentification An identification method that obtains the personal coding information of the target person through a coding identification (input) device. 3.7
Article coding identification articlecodingidentification 3.8
An identification method that reads the coding carrier attached to the target object through a coding identification (input) device to identify the object information. Human body biometric information humanbodybiologiccharacteristic The body characteristics or behaviors that the target person is born with, cannot be imitated or are extremely difficult to imitate, and can be converted into information with unique characteristics of the target.
Human body biometric information identification humanbodybiologiccharacteristicidentification uses biometric (statistical) methods to obtain the biometric information of the target person and identify the information. 3.10
Article characteristic information articlecharacteristic The physical, chemical and other characteristics that are unique to the target object and can be converted into information with unique characteristics of the target. 3.11
Article characteristic information identification article Characteristic identification is the identification of the characteristic information of a predetermined object by an identification device. 3.12
Key, key quantity and key difference key-code, amount of key-code, difference of key-code The target information that can constitute a single key is the key. The total number of keys represented by all the keys that a system can theoretically have is the system key quantity. If a system has different types of keys with equal authority, the key quantity of each type of key is calculated separately, and the key quantity with the lowest key quantity is taken as the system key quantity. The difference between the target information that constitutes a single key is the key difference. 3.13
Key authorization key authorization
Permitting the operation of a certain key or certain keys in a system. 3.14
False identification
Check the standard on the construction standard network wwwiz321.net
The system identifies a key as another key of the system. 3.15
refuseidentification
The system does not make an identification response to a key of this system that has been operated normally. 3.16
Identification local
The place and/or environment where the key is read. 3.17
Identification equipment localidentifyequipmentThe equipment (device) with protective surface at the reading site that can be touched by the target of entry and exit. 3.18
GA/T394—2002
Protection surface protection surface
After the equipment is installed, it may be damaged or opened by human intervention at the reading site, and therefore the structural surface of the equipment needs to be protected.
Antidestroyedability After the system is installed, the equipment (device) with a protection surface can resist the destructive attack by professional technicians using specified tools, that is, the ability of the entrance and exit not to be opened (expressed in the net working time required to resist the entrance and exit being opened). 3.20
Antitechnical opened ability After the system is installed, the equipment (device) with a protection surface can resist the technical opening by professional technicians using specified tools (such as various probing, scanning, imitation, interference and other methods to cause the system to be misidentified or misoperated and opened), that is, the ability of the entrance and exit not to be opened (expressed in the net working time required to resist the entrance and exit being opened). 3.21
Combination identification
combination identification
The system uses two or more information identification methods to identify the entry and exit behavior of a certain target and performs logical and judgment.
Anti-pass-back
A control method that can restrict the target that has passed through a certain exit through normal operation from passing through the same exit again without the normal passage track.
Multi-identification control
The system uses a certain identification method and must identify two or more target information at the same time or within an agreed time before it can complete the control of a certain exit. 3.24
Jjremoteapprovecontrol
Remote approval control
The system operator (manager) reconfirms the target that can be identified by the system and allowed to enter and exit at a non-reading site (usually the control center), and remotely closes or opens a certain entrance and exit for this target. 3.25
Econtrolledarea,the samelevel controlled area,highlevel controlledarea,samelevel controlledarea,highlevel controlledarea
If an area has only one (or multiple equal-function) entrance and exit, the area is regarded as the controlledarea of ​​this (or these) entrances and exits. That is, the corresponding area restricted by a certain (or multiple equal-function) entrance and exit is its (their) controlled area. Multiple controlled areas with the same entrance and exit restrictions are controlled areas of the same level. Other controlled areas with stricter exit and entry restrictions than a certain controlled area are controlled areas of a higher level relative to the controlled area. 4 System Function Requirements
4.1 System Overview
The entrance and exit control system is mainly composed of the reading part, the transmission part, the management/control part and the execution part as well as the corresponding system software. Its principle block diagram is shown in Figure 1.
Reading part
4.2 System composition mode
Transmission part
Management/control
Control part
Figure 1 Principle block diagram of access control system
Transmission part
Execution part
Access control system has multiple construction modes. According to its hardware composition mode, it can be divided into integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type. 4.2.1 Integrated type and split type
4.2.1.1—Integrated type
The various components of the integrated access control system are connected, combined or integrated together to realize all the functions of access control. The integrated structure and composition block diagram are shown in Figure 2. Key
Reading part
Reading part, management/control part, and execution part are connected into one device management/control part
Figure 2 Block diagram of integrated product composition
4.2.1.2 Split type
Execution part
The various components of the split type access control system have separate parts in structure and parts combined in different ways. The separate parts and the combined parts are connected into a system through electronic, electromechanical and other means to realize all the functions of access control. The common patterns in the split type 4
structure are shown in Figure 3a) and Figure 3b). Key
Reading part
Management/control
Control part
Reading part and management/control part are connected as one devicea) Split structure composition block diagram 1
Reading part
Transmission part
Management/control
Control part
b) Split structure composition block diagram 2
Figure 3 Split structure composition block diagram
4.2.2 Independent Control type, networked control type and data carrier transmission control type 4.2.2.1 Independent control type
Transmission part
Transmission part
GA/T394—2002
Execution part
Execution part
Independent control type entrance and exit control system, all display/programming/management/control and other functions of its management/control part are completed in one device (entrance and exit controller), as shown in Figure 4. Display
Entrance and exit controller
Figure 4 Independent control type composition block diagram
4.2.2.2 Network control type
Network control type exit and entry control system, all display/programming/management/control functions of its management/control part are not completed in one device (entry and exit controller). Among them, the display/programming function is completed by another device. The data transmission between devices is realized through wired and/or wireless data channels and network devices, as shown in Figure 5.5
GA/T394—2002
4.2.2.3 Data carrier transmission control type
Data network
Transmission equipment
Management Management/control part
Network control type composition block diagram
Entrance and exit controller
The only difference between the data carrier transmission control type entrance and exit control system and the networked entrance and exit control system is the different data transmission method. All the display/programming/management/control and other functions of its management/control part are not completed in one device (entry and exit controller). Among them, the display/programming work is completed by another device. The data transmission between devices is completed through the input/export operation of the removable, readable and writable data carrier, as shown in Figure 6.
4.3 System protection level
Data carrier
Management/control part
Figure 6 Data carrier transmission control type composition block diagram control
Access controller
The protection level of the system is determined by the protection capability of the protective surface shell of the equipment used, the anti-destruction capability, the anti-technical opening capability, the control capability of the system, confidentiality and other factors. The protection level of the system is divided into three levels: A, B, and C. The recommended classification method for the protection level of each component of the system is shown in Appendix A.
4.3.1 Protection level of the system reading part
The protection capability classification and corresponding requirements of the system reading part are shown in Table A.1 in Appendix A. 4.3.2 Protection level of the system management/control part The protection capability classification and corresponding requirements of the system management/control part See Table A.2 in Appendix A. 4.3.3 Protection level of the execution part of the system
The protection capability classification and corresponding requirements of the execution part of the system are shown in Table A.3 in Appendix A. 4.4 System functions
4.4.1 Access authorization
The system authorizes the identification information and carrier of the entry and exit target as a key and records it in the system. It should be possible to set the entry and exit authorization of the target, that is, when and where to enter and exit the target, which entrance and exit can be made, the number of times the entry and exit can be made, and the direction of passage. In a network system, except for management functions such as authorization, query, centralized alarm, and remote approval control, the functions required by this standard should not depend on whether the central management machine is working. 4.4.2 System response time
The following main operation response time of the system should be less than 2s. a) Except for working in the remote approval control mode, the time from the reading part obtaining the complete information of a key to the execution part starting to open and close the entrance and exit.
b) The time from the operator (manager) issuing the opening and closing command to the execution part starting to open and close the entrance and exit. 6
c) The time from the execution of the remote approval control to the execution part starting to open and close the entrance and exit. 4.4.3 Timing
a) System time synchronization
GA/T394-2002
The timing components related to event recording, display and identification information of the system should have a time synchronization function; in a network system, the system management software running on the central management host should be set up to synchronize the time of other timing components related to event recording, display and identification information every day.
b) Timing accuracy
The timing accuracy of non-network systems shall not be less than 5s/d; the timing accuracy of the central management host of network systems shall not be less than 5s/d, and the timing accuracy of other timing components related to event recording, display and identification information shall not be less than 10s/d. 4.4.4 Self-test and fault indication
The system and its main components shall have a self-test function to indicate that they are working normally, and protection levels B and C shall also have a fault indication function. 4.4.5 Alarm
The system alarm function is divided into on-site alarm, alarm to the operator (on-duty) personnel, remote transmission alarm, etc. The transmission method of the alarm signal can be wired and/or wireless, and the display of the alarm signal can be visible light display and/or sound indication. The system should alarm when the following situations occur: a) When wrong operations are performed on the target information reading device or management/control part for several consecutive times (no more than 5 times, the specific number should be specified in the product manual); b) When the exit is forced through without using an authorized key; c) When the entrance is opened without normal operation; d) When the reading field device of protection level B and C is forcibly removed and/or opened; e) When the main power supply of protection level B and C is cut off or short-circuited; f) When the network connection of the network type system of protection level C fails. The system can alarm when the following situations occur: a) When the components on the protection surface are hit hard; b) When there is an act of stealing information in the system; c) When it is damaged by tools.
4.4.6 Emergency opening
The system should have an emergency opening method. For example: a) The exit can be opened in an emergency by using special methods to partially damage the system components using special tools made by the manufacturer, and the damaged parts can be repaired or replaced immediately.
b) A redundant design can be adopted to increase the number of exits (but the technical requirements of the system shall not be reduced) to achieve emergency opening. 4.4.7 Indication/display
The system and its parts shall give indications of their working status, operation and results, permission to exit, and events. Indications can be in a variety of ways that are easily perceived by human senses, such as visible, audible, object displacement, and/or a combination thereof. a) Luminous indication/display
Luminous indication information should be distinguished by the following colors: Green: used to display information such as "correct operation", "valid", "permitted", "release", etc., and can also display information such as "normal" and "safe". Red: Use slow flashing (or constant light) with a frequency of less than 1Hz to display information such as "incorrect operation", "invalid", "not allowed", "not released", etc., and can also display information such as "abnormal"; use fast flashing with a frequency of more than 1Hz to display information such as "alarm", "fault", "unsafe", "power supply undervoltage", etc.
Yellow (orange): If used, it is used to display reminders, prompts, warnings, and other types of information. Blue: If used, it is used to display "ready", "entered/left", "certain part is put into work", and other types of information. b) Voice indication/display
GA/T394-2002
The voice indication during alarm should be clearly distinguished from other sounds. Non-alarm voice indications should be intermittent; if a composite indication of sound, color, or graphic symbols is used, they should be issued and stopped synchronously. c) Graphic symbol indication/display
The graphic symbols used for graphic symbol indication/display should comply with the provisions of GA/T74 and relevant standards. 4.4.8 Software and information storage requirements
a) Except for the central management computer of the network-type system, all required software for the functions required by this standard should be saved in solid-state memory.
b) System management software with text interface, the text used for operation, prompt, event display, etc. must be in simplified Chinese. c) Except for the central management machine of the network system, each microprocessor module with a programming unit in the system shall be equipped with a hardware monitoring circuit (WatchDog) independent of the module to monitor whether the program of the module is working normally in real time. When the program of the module is found to be working abnormally, an alarm signal and/or a reset and other control instructions shall be issued to the module within 3 seconds to put it into normal operation. This operation shall not affect the normal operation of the system clock, and shall not affect the storage of authorization information and event information. d) When the power supply is abnormal, the power is off or the battery is replaced, the system's key information and various record information shall not be lost. 4.5 Functions of each part of the system
4.5.1 Functions of the reading part
a) The reading part shall be able to obtain operation and key information and identify the target through the reading field device, and shall be able to pass the information to the management/control part for processing, and can also accept the instructions of the management/control part. b) The system should have indicators such as "recognition rate"/"false recognition rate", "rejection rate", "reading response time", etc., and they should be listed in the product manual. c) There should be corresponding indication signals for various operations of the reading field device and the acceptance of instructions from the management/control part. d) The identification method (such as coding identification, feature identification) and mode (such as "one person/one object corresponds to one identification information" and/or "one type of person/object corresponds to one identification information") adopted should be easy to operate and the reading information should be reliable. 4.5.2 Functions of the management/control part
a) The management/control part is the management-control center of the access control system and the human-machine management interface of the access control system. b) The response time of the management/control part of the system to transmit information to other parts of the system should be listed in the product manual. c) Receive the operation and key information from the reading part, compare and judge with the pre-stored and set information, identify and approve the target's entry and exit behavior; for the target that meets the entry and exit authorization, issue a release instruction to the execution part. d) Set the identification mode, entrance and exit control mode, and output control signals. e) Process alarm conditions and send alarm signals. f) Realize extended management functions (such as attendance, patrol, etc.), and connect with other control and management systems (such as linkage with anti-theft alarm, video surveillance, fire alarm, etc.).
g) Manage the authorization management and login approval of system operators (managers), and set operation permissions so that operators (managers) of different levels have different operating capabilities for the system; there should be a predetermined procedure for the handover and login of operators; systems with protection levels B and C should record operators and operation information in the system. h) Event recording function: Store records of exit events, operation events, alarm events, etc. in the relevant carriers of the system, and form reports for viewing. The total number of records for each exit and entry in the field control equipment of the management/control part of the A protection level shall not be less than 32, and the total number of records for each entrance and exit in the field control equipment of the management/control part of the B and C protection levels shall not be less than 1,000. The event storage carrier of the central management host should be able to store at least 180 days of event records according to management and application requirements. The stored records should maintain the latest record values. Event records use the 4W format, namely When, Who, Where, What. The time information should include: year, month, day, hour, minute, second, and the year should be recorded in millennium. i) Event reading, printing and report generation functions: Authorized operators (managers) can retrieve, display and/or print event records within the authorized scope and event information stored in system-related carriers, and can generate reports. 4.5.3 Execution part functions
a) The execution part receives the access control commands sent by the management/control part, and makes corresponding actions and/or instructions at the entrance and exit to achieve 83 Timing
a) System Timing
GA/T394-2002
The timing components of the system related to event recording, display and identification information should have a time calibration function; in a network system, the system management software running on the central management host should be set up to calibrate the time of other timing components related to event recording, display and identification information every day.
b) Timing Accuracy
The timing accuracy of non-network systems shall not be less than 5s/d; the timing accuracy of the central management host of a network system shall not be less than 5s/d, and the timing accuracy of other timing components related to event recording, display and identification information shall not be less than 10s/d. 4.4.4 Self-check and Fault Indication
The system and its main components shall have a self-check function indicating that they are working normally, and the B and C protection levels shall also have a fault indication function. 4.4.5 Alarm
The system alarm function is divided into on-site alarm, alarm to the operator (duty) personnel, remote transmission alarm, etc. The transmission mode of the alarm signal can be wired and/or wireless, and the display of the alarm signal can be visible light display and/or sound indication. The system should alarm in the following situations: a) When wrong operations are performed on the target information reading device or management/control part for several consecutive times (no more than 5 times, the specific number should be specified in the product manual);
b) When the entrance is forced through without using an authorized key; c) When the entrance is opened without normal operation; d) When the reading field device of protection level B and C is forcibly removed and/or opened; e) When the main power supply of protection level B and C is cut off or short-circuited; f) When the network connection of the network type system of protection level C fails. The system can alarm in the following situations: a) When the parts on the protection surface are strongly impacted; b) When there is an act of stealing information in the system; c) When it is damaged by tools.
4.4.6 Emergency opening
The system should have an emergency opening method. For example: a) The manufacturer's special tools can be used to take special methods to partially destroy the system components, so that the exit can be opened in an emergency, and the damaged parts can be repaired or replaced immediately.
b) A redundant design can be adopted to increase the opening of the exit passage (but the technical requirements of the system shall not be reduced) to achieve emergency opening. 4.4.7 Indication/display
The system and its parts should give indications of their working status, operation and results, permission to exit, and events. Indications can be in a variety of ways that are easily perceived by human senses, such as visible, audible, object displacement and/or a combination thereof. a) Luminous indication/display
Luminous indication information should be distinguished by the following colors: Green: used to display information such as "correct operation", "valid", "permitted", "release", etc., and can also display information such as "normal" and "safe". Red: Slow flashing (or constant light) with a frequency below 1Hz to display information such as "incorrect operation", "invalid", "not allowed", "not released", etc., and can also display information such as "abnormal"; fast flashing with a frequency above 1Hz to display information such as "alarm", "fault", "unsafe", "power supply undervoltage", etc.
Yellow (orange): If used, it is used to display reminders, prompts, notices, warnings, etc. Blue: If used, it is used to display information such as "ready", "entered/left", "certain part is put into operation", etc. b) Voice indication/display
GA/T394-2002
The voice indication during alarm should be clearly distinguished from other sounds. Non-alarm voice indication should be intermittent; if a composite indication of voice, color, or graphic symbol is used, it should be issued and stopped simultaneously. c) Graphic symbol indication/display
The graphic symbols used for graphic symbol indication/display should comply with the provisions of GA/T74 and relevant standards. 4.4.8 Requirements for software and information storage
a) Except for the central management machine of the network-type system, all software required for the functions required by this standard shall be stored in solid-state memory.
b) For system management software with a text interface, the text used for operation, prompts, event display, etc. must be in simplified Chinese. c) Except for the central management machine of the network-type system, each microprocessor module with a programming unit in the system shall be equipped with a hardware monitoring circuit (WatchDog) independent of the module to monitor in real time whether the program of the module is working normally. When the program of the module is found to be working abnormally, an alarm signal and/or a reset and other control instructions shall be issued to the module within 3 seconds to put it into normal operation. This operation shall not affect the normal operation of the system clock, and shall not affect the storage of authorization information and event information. d) When the power supply is abnormal, the power is off, or the battery is replaced, the system key information and various record information shall not be lost. 4.5 Functions of each part of the system
4.5.1 Functions of the reading part
a) The reading part should be able to obtain operation and key information and identify the target through the reading field device, and should be able to pass the information to the management/control part for processing, and can also accept the instructions of the management/control part. b) The system should have indicators such as "recognition rate"/"false recognition rate", "rejection rate", "reading response time", etc., and list them in the product manual. c) There should be corresponding indication signals for various operations of the reading field device and acceptance of instructions from the management/control part. d) The identification method (such as coding identification, feature identification) and mode (such as "one person/one object corresponds to one identification information" and/or "one type of person/object corresponds to one identification information") adopted should be easy to operate and the reading information should be reliable. 4.5.2 Functions of the management/control part
a) The management/control part is the management-control center of the access control system and the human-machine management interface of the access control system. b) The response time of the management/control part of the system transmitting information to other parts of the system should be listed in the product manual. c) Receive the operation and key information from the reading part, compare and judge with the pre-stored and set information, identify and approve the target's entry and exit behavior; for the target that meets the entry and exit authorization, issue a release instruction to the execution part. d) Set the identification method and entrance and exit control method, and output the control signal. e) Process the alarm situation and issue an alarm signal. f) Realize the extended management function (such as attendance, patrol, etc.), and connect with other control and management systems (such as linkage with anti-theft alarm, video surveillance, fire alarm, etc.).
g) Manage the authorization management and login approval of system operators (administrators), set the operation authority, so that operators (administrators) of different levels have different operating capabilities for the system; there should be a predetermined procedure for the handover and login of operators; systems with B and C protection levels should record the operator and operation information in the system. h) Event recording function: store records of personnel events, operation events, alarm events, etc. in the relevant carriers of the system, and can form reports for viewing. The total number of records for each exit and entry in the field control equipment of the management/control part of the A protection level shall not be less than 32, and the total number of records for each entrance and exit in the field control equipment of the management/control part of the B and C protection levels shall not be less than 1000. The event storage carrier of the central management host should be able to store at least 180 days of event records according to management and application requirements. The stored records should maintain the latest record values. Event records use the 4W format, namely When, Who, Where, What. The time information should include: year, month, day, hour, minute, second, and the year should be recorded in millennium. i) Event reading, printing and report generation functions: Authorized operators (managers) can retrieve, display and/or print event records within the authorized scope and event information stored in system-related carriers, and can generate reports. 4.5.3 Execution part functions
a) The execution part receives the entry and exit control commands sent by the management/control part, and makes corresponding actions and/or instructions at the entrance and exit to achieve 83 Timing
a) System Timing
GA/T394-2002
The timing components of the system related to event recording, display and identification information should have a time calibration function; in a network system, the system management software running on the central management host should be set up to calibrate the time of other timing components related to event recording, display and identification information every day.
b) Timing Accuracy
The timing accuracy of non-network systems shall not be less than 5s/d; the timing accuracy of the central management host of a network system shall not be less than 5s/d, and the timing accuracy of other timing components related to event recording, display and identification information shall not be less than 10s/d. 4.4.4 Self-check and Fault Indication
The system and its main components shall have a self-check function indicating that they are working normally, and the B and C protection levels shall also have a fault indication function. 4.4.5 Alarm
The system alarm function is divided into on-site alarm, alarm to the operator (duty) personnel, remote transmission alarm, etc. The transmission mode of the alarm signal can be wired and/or wireless, and the display of the alarm signal can be visible light display and/or sound indication. The system should alarm in the following situations: a) When wrong operations are performed on the target information reading device or management/control part for several consecutive times (no more than 5 times, the specific number should be specified in the product manual);
b) When the entrance is forced through without using an authorized key; c) When the entrance is opened without normal operation; d) When the reading field device of protection level B and C is forcibly removed and/or opened; e) When the main power supply of protection level B and C is cut off or short-circuited; f) When the network connection of the network type system of protection level C fails. The system can alarm in the following situations: a) When the parts on the protection surface are strongly impacted; b) When there is an act of stealing information in the system; c) When it is damaged by tools.
4.4.6 Emergency opening
The system should have an emergency opening method. For example: a) The manufacturer's special tools can be used to take special methods to partially destroy the system components, so that the exit can be opened in an emergency, and the damaged parts can be repaired or replaced immediately.
b) A redundant design can be adopted to increase the opening of the exit passage (but the technical requirements of the system shall not be reduced) to achieve emergency opening. 4.4.7 Indication/display
The system and its parts should give indications of their working status, operation and results, permission to exit, and events. Indications can be in a variety of ways that are easily perceived by human senses, such as visible, audible, object displacement and/or a combination thereof. a) Luminous indication/display
Luminous indication information should be distinguished by the following colors: Green: used to display information such as "correct operation", "valid", "permitted", "release", etc., and can also display information such as "normal" and "safe". Red: Slow flashing (or constant light) with a frequency below 1Hz to display information such as "incorrect operation", "invalid", "not allowed", "not released", etc., and can also display information such as "abnormal"; fast flashing with a frequency above 1Hz to display information such as "alarm", "fault", "unsafe", "power supply undervoltage", etc.
Yellow (orange): If used, it is used to display reminders, prompts, notices, warnings, etc. Blue: If used, it is used to display information such as "ready", "entered/left", "certain part is put into operation", etc. b) Voice indication/display
GA/T394-2002
The voice indication during alarm should be clearly distinguished from other sounds. Non-alarm voice indication should be intermittent; if a composite indication of voice, color, or graphic symbol is used, it should be issued and stopped simultaneously. c) Graphic symbol indication/display
The graphic symbols used for graphic symbol indication/display should comply with the provisions of GA/T74 and relevant standards. 4.4.8 Requirements for software and information storage
a) Except for the central management machine of the network-type system, all software required for the functions required by this standard shall be stored in solid-state memory.
b) For system management software with a text interface, the text used for operation, prompts, event display, etc. must be in simplified Chinese. c) Except for the central management machine of the network-type system, each microprocessor module with a programming unit in the system shall be equipped with a hardware monitoring circuit (WatchDog) independent of the module to monitor in real time whether the program of the module is working normally. When the program of the module is found to be working abnormally, an alarm signal and/or a reset and other control instructions shall be issued to the module within 3 seconds to put it into normal operation. This operation shall not affect the normal operation of the system clock, and shall not affect the storage of authorization information and event information. d) When the power supply is abnormal, the power is off, or the battery is replaced, the system key information and various record information shall not be lost. 4.5 Functions of each part of the system
4.5.1 Functions of the reading part
a) The reading part should be able to obtain operation and key information and identify the target through the reading field device, and should be able to pass the information to the management/control part for processing, and can also accept the instructions of the management/control part. b) The system should have indicators such as "recognition rate"/"false recognition rate", "rejection rate", "reading response time", etc., and list them in the product manual. c) There should be corresponding indication signals for various operations of the reading field device and acceptance of instructions from the management/control part. d) The identification method (such as coding identification, feature identification) and mode (such as "one person/one object corresponds to one identification information" and/or "one type of person/object corresponds to one identification information") adopted should be easy to operate and the reading information should be reliable. 4.5.2 Functions of the management/control part
a) The management/control part is the management-control center of the access control system and the human-machine management interface of the access control system. b) The response time of the management/control part of the system transmitting information to other parts of the system should be listed in the product manual. c) Receive the operation and key information from the reading part, compare and judge with the pre-stored and set information, identify and approve the target's entry and exit behavior; for the target that meets the entry and exit authorization, issue a release instruction to the execution part. d) Set the identification method and entrance and exit control method, and output the control signal. e) Process the alarm situation and issue an alarm signal. f) Realize the extended management function (such as attendance, patrol, etc.), and connect with other control and management systems (such as linkage with anti-theft alarm, video surveillance, fire alarm, etc.).
g) Manage the authorization management and login approval of system operators (administrators), set the operation authority, so that operators (administrators) of different levels have different operating capabilities for the system; there should be a predetermined procedure for the handover and login of operators; systems with B and C protection levels should record the operator and operation information in the system. h) Event recording function: store records of personnel events, operation events, alarm events, etc. in the relevant carriers of the system, and can form reports for viewing. The total number of records for each exit and entry in the field control equipment of the management/control part of the A protection level shall not be less than 32, and the total number of records for each entrance and exit in the field control equipment of the management/control part of the B and C protection levels shall not be less than 1,000. The event storage carrier of the central management host should be able to store at least 180 days of event records according to management and application requirements. The stored records should maintain the latest record values. Event records use the 4W format, namely When, Who, Where, What. The time information should include: year, month, day, hour, minute, second, and the year should be recorded in millennium. i) Event reading, printing and report generation functions: Authorized operators (managers) can retrieve, display and/or print event records within the authorized scope and event information stored in system-related carriers, and can generate reports. 4.5.3 Execution part functions
a) The execution part receives the entry and exit control commands sent by the management/control part, and makes corresponding actions and/or instructions at the entrance and exit to achieve 85 Alarm
The system alarm function is divided into on-site alarm, alarm to operator (duty) personnel, remote transmission alarm, etc. The transmission mode of alarm signal can be wired and/or wireless, and the display of alarm signal can be visible light display and/or sound indication. The system should alarm in the following situations: a) When wrong operation is performed on the target information reading device or management/control part for several consecutive times (no more than 5 times, the specific number should be specified in the product manual); b) When the entrance is forced through the entrance without using the authorized key; c) When the entrance is opened without normal operation; d) When the reading on-site device of B and C protection levels is forcibly removed and/or opened; e) When the main power supply of B and C protection levels is cut off or short-circuited; f) When the network connection of the network type system of C protection level fails. The system can alarm in the following situations: a) When the parts on the protection surface are strongly hit; b) When there is an act of stealing information in the system; c) When it is damaged by tools.
4.4.6 Emergency opening
The system should have an emergency opening method. For example: a) The manufacturer's special tools can be used to partially destroy the system components in a special way to enable emergency opening of the exit, and the damaged parts can be repaired or replaced immediately.
b) A redundant design can be adopted to increase the opening of the exit passage (but the technical requirements of the system shall not be reduced) to achieve emergency opening. 4.4.7 Indication/display
The system and its parts should give indications of their working status, operation and results, permission to exit, and events. Indications can be in a variety of ways that are easily perceived by human senses, such as visible, audible, object displacement and/or a combination thereof. a) Luminous indication/display
Luminous indication information should be distinguished by the following colors: Green: used to display information such as "correct operation", "valid", "permitted", "release", etc., and can also display information such as "normal" and "safe". Red: Slow flashing (or constant light) with a frequency below 1Hz to display information such as "incorrect operation", "invalid", "not allowed", "not released", etc., and can also display information such as "abnormal"; fast flashing with a frequency above 1Hz to display information such as "alarm", "fault", "unsafe", "power supply undervoltage", etc.
Yellow (orange): If used, it is used to display reminders, prompts, notices, warnings, etc. Blue: If used, it is used to display information such as "ready", "entered/left", "certain part is put into operation", etc. b) Voice indication/display
GA/T394-2002
The voice indication during alarm should be clearly distinguished from other sounds. Non-alarm voice indication should be intermittent; if a composite indication of voice, color, or graphic symbol is used, it should be issued and stopped simultaneously. c) Graphic symbol indication/display
The graphic symbols used for graphic symbol indication/display should comply with the provisions of GA/T74 and relevant standards. 4.4.8 Requirements for software and information storage bzxz.net
a) Except for the central management machine of the network-type system, all software required for the functions required by this standard shall be stored in solid-state memory.
b) For system management software with a text interface, the text used for operation, prompts, event display, etc. must be in simplified Chinese. c) Except for the central management machine of the network-type system, each microprocessor module with a programming unit in the system shall be equipped with a hardware monitoring circuit (WatchDog) independent of the module to monitor in real time whether the program of the module is working normally. When the program of the module is found to be working abnormally, an alarm signal and/or a reset and other control instructions shall be issued to the module within 3 seconds to put it into normal operation. This operation shall not affect the normal operation of the system clock, and shall not affect the storage of authorization information and event information. d) When the power supply is abnormal, the power is off, or the battery is replaced, the system key information and various record information shall not be lost. 4.5 Functions of each part of the system
4.5.1 Functions of the reading part
a) The reading part should be able to obtain operation and key information and identify the target through the reading field device, and should be able to pass the information to the management/control part for processing, and can also accept the instructions of the management/control part. b) The system should have indicators such as "recognition rate"/"false recognition rate", "rejection rate", "reading response time", etc., and list them in the product manual. c) There should be corresponding indication signals for various operations of the reading field device and acceptance of instructions from the management/control part. d) The identification method (such as coding identification, feature identification) and mode (such as "one person/one object corresponds to one identification information" and/or "one type of person/object corresponds to one identification information") adopted should be easy to operate and the reading information should be reliable. 4.5.2 Functions of the management/control part
a) The management/control part is the management-control center of the access control system and the human-machine management interface of the access control system. b) The response time of the management/control part of the system transmitting information to other parts of the system should be listed in the product manual. c) Receive the operation and key information from the reading part, compare and judge with the pre-stored and set information, identify and approve the target's entry and exit behavior; for the target that meets the entry and exit authorization, issue a release instruction to the execution part. d) Set the identification method and entrance and exit control method, and output the control signal. e) Process the alarm situation and issue an alarm signal. f) Realize the extended management function (such as attendance, patrol, etc.), and connect with other control and management systems (such as linkage with anti-theft alarm, video surveillance, fire alarm, etc.).
g) Manage the authorization management and login approval of system operators (administrators), set the operation authority, so that operators (administrators) of different levels have different operating capabilities for the system; there should be a predetermined procedure for the handover and login of operators; systems with B and C protection levels should record the operator and operation information in the system. h) Event recording function: store records of personnel events, operation events, alarm events, etc. in the relevant carriers of the system, and can form reports for viewing. The total number of records for each exit and entry in the field control equipment of the management/control part of the A protection level shall not be less than 32, and the total number of records for each entrance and exit in the field control equipment of the management/control part of the B and C protection levels shall not be less than 1000. The event storage carrier of the central management host should be able to store at least 180 days of event records according to management and application requirements. The stored records should maintain the latest record values. Event records use the 4W format, namely When, Who, Where, What. The time information should include: year, month, day, hour, minute, second, and the year should be recorded in millennium. i) Event reading, printing and report generation functions: Authorized operators (managers) can retrieve, display and/or print event records within the authorized scope and event information stored in system-related carriers, and can generate reports. 4.5.3 Execution part functions
a) The execution part receives the entry and exit control commands sent by the management/control part, and makes corresponding actions and/or instructions at the entrance and exit to achieve 85 Alarm
The system alarm function is divided into on-site alarm, alarm to operator (duty) personnel, remote transmission alarm, etc. The transmission mode of alarm signal can be wired and/or wireless, and the display of alarm signal can be visible light display and/or sound indication. The system should alarm in the following situations: a) When wrong operation is performed on the target information reading device or management/control part for several consecutive times (no more than 5 times, the specific number should be specified in the product manual); b) When the entrance is forced through the entrance without using the authorized key; c) When the entrance is opened without normal operation; d) When the reading on-site device of B and C protection levels is forcibly removed and/or opened; e) When the main power supply of B and C protection levels is cut off or short-circuited; f) When the network connection of the network type system of C protection level fails. The system can alarm in the following situations: a) When the parts on the protection surface are strongly hit; b) When there is an act of stealing information in the system; c) When it is damaged by tools.
4.4.6 Emergency opening
The system should have an emergency opening method. For example: a) The manufacturer's special tools can be used to partially destroy the system components in a special way to enable emergency opening of the exit, and the damaged parts can be repaired or replaced immediately.
b) A redundant design can be adopted to increase the opening of the exit passage (but the technical requirements of the system shall not be reduced) to achieve emergency opening. 4.4.7 Indication/display
The system and its parts should give indications of their working status, operation and results, permission to exit, and events. Indications can be in a variety of ways that are easily perceived by human senses, such as visible, audible, object displacement and/or a combination thereof. a) Luminous indication/display
Luminous indication information should be distinguished by the following colors: Green: used to display information such as "correct operation", "valid", "permitted", "release", etc., and can also display information such as "normal" and "safe". Red: Slow flashing (or constant light) with a frequency below 1Hz to display information such as "incorrect operation", "invalid", "not allowed", "not released", etc., and can also display information such as "abnormal"; fast flashing with a frequency above 1Hz to display information such as "alarm", "fault", "unsafe", "power supply undervoltage", etc.
Yellow (orange): If used, it is used to display reminders, prompts, notices, warnings, etc. Blue: If used, it is used to display information such as "ready", "entered/left", "certain part is put into operation", etc. b) Voice indication/display
GA/T394-2002
The voice indication during alarm should be clearly distinguished from other sounds. Non-alarm voice indication should be intermittent; if a composite indication of voice, color, or graphic symbol is used, it should be issued and stopped simultaneously. c) Graphic symbol indication/display
The graphic symbols used for graphic symbol indication/display should comply with the provisions of GA/T74 and relevant standards. 4.4.8 Requirements for software and information storage
a) Except for the central management machine of the network-type system, all software required for the functions required by this standard shall be stored in solid-state memory.
b) For system management software with a text interface, the text used for operation, prompts, event display, etc. must be in simplified Chinese. c) Except for the central management machine of the network-type system, each microprocessor module with a programming unit in the system shall be equipped with a hardware monitoring circuit (WatchDog) independent of the module to monitor in real time whether the program of the module is working normally. When the program of the module is found to be working abnormally, an alarm signal and/or a reset and other control instructions shall be issued to the module within 3 seconds to put it into normal operation. This operation shall not affect the normal operation of the system clock, and shall not affect the storage of authorization information and event information. d) When the power supply is abnormal, the power is off, or the battery is replaced, the system key information and various record information shall not be lost. 4.5 Functions of each part of the system
4.5.1 Functions of the reading part
a) The reading part should be able to obtain operation and key information and identify the target through the reading field device, and should be able to pass the information to the management/control part for processing, and can also accept the instructions of the management/control part. b) The system should have indicators such as "recognition rate"/"false recognition rate", "rejection rate", "reading response time", etc., and list them in the product manual. c) There should be corresponding indication signals for various operations of the reading field device and acceptance of instructions from the management/control part. d) The identification method (such as coding identification, feature identification) and mode (such as "one person/one object corresponds to one identification information" and/or "one type of person/object corresponds to one identification information") adopted should be easy to operate and the reading information should be reliable. 4.5.2 Functions of the management/control part
a) The management/control part is the management-control center of the access control system and the human-machine management interface of the access control system. b) The response time of the management/control part of the system transmitting information to other parts of the system should be listed in the product manual. c) Receive the operation and key information from the reading part, compare and judge with the pre-stored and set information, identify and approve the target's entry and exit behavior; for the target that meets the entry and exit authorization, issue a release instruction to the execution part. d) Set the identification method and entrance and exit control method, and output the control signal. e) Process the alarm situation and issue an alarm signal. f) Realize the extended management function (such as attendance, patrol, etc.), and connect with other control and management systems (such as linkage with anti-theft alarm, video surveillance, fire alarm, etc.).
g) Manage the authorization management and login approval of system operators (administrators), set the operation authority, so that operators (administrators) of different levels have different operating capabilities for the system; there should be a predetermined procedure for the handover and login of operators; systems with B and C protection levels should record the operator and operation information in the system. h) Event recording function: store records of personnel events, operation events, alarm events, etc. in the relevant carriers of the system, and can form reports for viewing. The total number of records for each exit and entry in the field control equipment of the management/control part of the A protection level shall not be less than 32, and the total number of records for each entrance and exit in the field control equipment of the management/control part of the B and C protection levels shall not be less than 1000. The event storage carrier of the central management host should be able to store at least 180 days of event records according to management and application requirements. The stored records should maintain the latest record values. Event records use the 4W format, namely When, Who, Where, What. The time information should include: year, month, day, hour, minute, second, and the year should be recorded in millennium. i) Event reading, printing and report generation functions: Authorized operators (managers) can retrieve, display and/or print event records within the authorized scope and event information stored in system-related carriers, and can generate reports. 4.5.3 Execution part functions
a) The execution part receives the entry and exit control commands sent by the management/control part, and makes corresponding actions and/or instructions at the entrance and exit to achieve 87 Indication/display
The system and its parts shall give indications on their working status, operation and results, permission to enter, and events. Indications may be given in a variety of ways that are easily perceived by human senses, such as visible, audible, displacement of objects, and/or a combination thereof. a) Luminous indication/display
Luminous indication information should be distinguished by the following colors: Green: used to display information such as "correct operation", "valid", "permitted", "release", and can also display information such as "normal" and "safe". Red: Use slow flashing (or constant light) with a frequency of less than 1Hz to display information such as "incorrect operation", "invalid", "not permitted", "not released", and can also display information such as "abnormal"; use fast flashing with a frequency of more than 1Hz to display information such as "alarm", "fault", "unsafe", "power supply undervoltage", etc.
Yellow (orange): If used, it is used to display reminders, prompts, notices, warnings, and other types of information. Blue: If used, it is used to display information such as "ready", "entered/left", "certain part put into work", etc. b) Voice indication/display
GA/T394-2002
The voice indication during alarm should be clearly distinguished from other sounds. Non-alarm voice indication should be intermittent; if a composite indication of sound, color or graphic symbol is used, it should be issued and stopped synchronously. c) Graphic symbol indication/display
The graphic symbols used for graphic symbol indication/display should comply with the provisions of GA/T74 and relevant standards. 4.4.8 Software and information storage requirements
a) Except for the central management machine of the network system, all software required for the functions required by this standard should be saved in solid-state memory.
b) For system management software with a text interface, the text used for operation, prompts, event display, etc. must be in simplified Chinese. c) Except for the central management machine of the network system, each microprocessor module with a programming unit in the system shall be equipped with a hardware monitoring circuit (WatchDog) independent of the module to monitor whether the program of the module is working properly in real time. When the
Tip: This standard content only shows part of the intercepted content of the complete standard. If you need the complete standard, please go to the top to download the complete standard document for free.