Welcome To b2b168.com, Join Free | Sign In
中文(简体) |
中文(繁體) |
Francés |Español |Deutsch |Pусский |
| No.13635621

- Product Categories
- Friendly Links
Information Name: | Shenzhen Mays compulsory detoxification access high reliability |
Published: | 2014-12-30 |
Validity: | 365 |
Specifications: | |
Quantity: | 1.00 |
Price Description: | |
Detailed Product Description: | Overview: One of the main places of detention perpetrators are compulsory rehabilitation. Compulsory detoxification construction and use of the access control system, for the monitoring of compulsory detoxification inject new ideas and scientific management, to build a high-tech platform for all aspects of the work, for compulsory rehabilitation management level reached in the new century high The new levels to create the foundation. By modern high-tech access control systems compulsory rehabilitation management tools to build a complete, integrated, reliable and easy to operate compulsory treatment are integrated access control systems to act as an organic whole of compulsory detoxification monitoring and management . Access by modern management tools to effectively prevent, deter and reduce the likelihood and dangers of Prison Break, prison violence and other accidents. Mays compulsory rehabilitation management system is the technical foundation "RBS-Ⅱ" on strict compliance with the modern management of compulsory detoxification high security, high reliability requirements from research and development. Its biggest feature is the requirement for the management of compulsory detoxification different areas to adopt different management models, professional access control system is used in large-scale compulsory detoxification management. Program structure: compulsory detoxification program access control system architecture diagram advantages: 1. full compliance with compulsory detoxification of management practices, citing close wind, leaked, martial law concept used to. 2. The key areas can be dual controller hot backup program to ensure that the system is absolutely safe and reliable. 3. Auto Arming disarming, multiple alarm level to ensure the safety of the system. 4. Super interference, the reader can add metal protection, in line with compulsory rehabilitation needs high security environment. 5. A high-capacity, fast response, 100,000 cardholders response time of less than 0.2 seconds. Wang Sisi: 1800-2579-611 / QQ: 225-4380-771 basic functions: 1, professional A, two doors management a, fully in line with the Ministry of Public GA576-2005 June 1, 2006 began the implementation of the "anti-tail interaction Security door lock linkage general technical conditions. " b, the switching state of the door by door unlock output simultaneously detect, lock and door sensor state to determine the state, which completely eliminated the two doors in the traditional prone to "false lock", "leak lock" caused by interlocking failure phenomenon. c, fingerprint recognition technology and seamless integration of access control systems, with two doors Mays dedicated to complete fingerprint access control platform and configuration upload and download, no way like the traditional system, a set of fingerprint management software, access control with a software, you need to build twice personnel data, and the data may be inconsistent. d, AB door access card can be flexibly set different door model based on the actual security needs, to ensure the safety and ease of use of the system. e. You can have as many different actions based on twenty kinds of voice prompts, such as "the door is open, go to" "the door opened out," "the door is not closed," and so B, dormitory management a, with a master + two-stage structure, sub-control system structure clear, easy to maintain, to the maximum to prevent the deliberate destruction of the prisoners access control systems and system accessories, and the system provides real-time status of each door, door lock switch status for remote monitoring, greatly improved security of the system. b, and non-professional compulsory rehabilitation management system compared to the system joined the leaked to close the wind, the concept of martial law, the use and management of full compliance with the compulsory detoxification traditional management processes to ensure that the system is absolutely safe and easy to use. c, by setting the duty room at police officers under the jurisdiction of the field controller to complete the leaked dormitories, to close the wind, curfews and other monitoring functions without special computer control. While for its operation requires operator authentication, to ensure safety of the system. 2, the system can be easily expanded and strong expansion into Patrol, consumption, parking and other compulsory detoxification card. Online Patrol no extra hardware cost, graphical interface can easily manage patrol route scheduling and patrol officers. 3, by calendar type schedule, you can easily set access permissions for compulsory drug rehabilitation centers and other important channel gate door. 4, dual controller hot backup system can be set up at the door point of management in key areas of the use of certain features dual master controller hot backup, even in extreme cases where the destruction of a master controller, the controller can be backed up timely take over the system, to ensure system reliability. 5, can be integrated or linked with other monitoring subsystems can increase automation and intelligence level of security throughout the compulsory detoxification office area, to achieve comprehensive, integrated digital security. Such as: the linkage with the matrix: access door open encounter illegal, the control matrix switching image, call the preset position; and the alarm system: Zone Alarm after mandatory access control corresponding to lock or unlock the door; and DVR linkage: access door action linkage capture video and photos. Subsystems and fire linkage: compulsory detoxification can improve the ability to protect human life, especially the center, staff density is relatively large, you can quickly when faced with an emergency evacuation. 6, a variety of alarm type system based on the severity of the alarm level is generally divided into multiple alarms, serious alarms, emergency alarms, alarms and different grades with different color-coded according to the needs of the user can choose which alarms to be displayed, which may constitute an alarm condition. Divided into three levels of warning: ① Emergency Alarm: Alarm must be dealt with immediately. ② important warning: the need for an alarm within 12 hours of treatment. ③ general warning: should pay attention to events. Among them, an emergency alert to red logo, it is important to identify the alarm in pink, blue logo general warning to the normal state with a green logo, and you can set a different sound for each alarm level file output. Various alarm settings 7, the system quick, easy to operate. Operation of software and Microsoft Windows operating systems like manner, to provide a rich context menu, drag function, accustomed to Windows users is very easy to use, and we provide a multimedia operating system is set up on the software interface demo When the operator steps on which I do not know how to do, click the Help button in this step, you can see a multimedia presentation of the operation of this step, basically do not read the instructions you can easily operate the software. Hotline: 1800-2579-611 / 0755-8980-1234-838 business manager: Wang Sisi QQ: 204-550-9881 |
Admin>>>
You are the 6354 visitor
Copyright © GuangDong ICP No. 10089450, Shenzhen City in the Innovation Automation System Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility
You are the 6354 visitor
Copyright © GuangDong ICP No. 10089450, Shenzhen City in the Innovation Automation System Co., Ltd. All rights reserved.
Technical support: ShenZhen AllWays Technology Development Co., Ltd.
AllSources Network's Disclaimer: The legitimacy of the enterprise information does not undertake any guarantee responsibility