New approaches to the construction of access control systems using WEB-technologies

Advances in technology have had a significant impact on the architecture of access control systems. By tracing the path of its development, we can predict what awaits us in the near future.

Past

Once upon a time, computer networks were still a rarity. And the then access control systems were built as follows: the master controller served a limited number of controllers, and the computer acted as a terminal for programming it and displaying information. The logic of work was determined by the master controller that controls the secondary controllers.

Secondary controllers could not exchange information directly with each other, the exchange took place through the master controller. This model imposed significant restrictions on the development of access control systems.

New approaches to the construction of access control systems using WEB-technologies

The development of computer technology and network equipment has influenced the architecture of systems, resulting in the emergence of multi-server access control systems. The changes affected the software, but bypassed the controllers, which limited the growth and development of the system.

New approaches to the construction of access control systems using WEB-technologies

Real

The development of microelectronics has made it possible for equipment manufacturers to radically change the ACS architecture. The previous model was replaced by an architecture in which controllers could communicate directly with each other.

In this model, the software could be installed anywhere within the local network, integration with other security systems was simplified through the use of a single information exchange environment.

New approaches to the construction of access control systems using WEB-technologies

This model has been successfully working to this day, but the current level of technological development allows building systems with a completely different architecture. There is a wide range of physical and logical options for providing communication between system components and means of interaction between users and the system. Among them are console applications, specialized controllers with a graphical interface, various control panels, tablet computers and phones, and the use of standard WEB browsers. The capabilities of microcontrollers are already many times greater than the resources of computers used in the first access control systems.

Further development of the ACS architecture

Controller as server

The server in the ACS is needed to correctly execute the business logic of the system, store data about users and events. 20 years ago, the master controller handled this as well. Since then, the requirements for access control systems have increased significantly, but the capabilities of modern controllers are superior to those of computers 20 years ago.

The system server can also be installed in the controller itself, if it has the appropriate resources. The system server, deployed in the memory of the controllers, has significant advantages. The first of these is the ease of starting the system.

New approaches to the construction of access control systems using WEB-technologies

One of the controllers in the system is assigned as a server (or master, as it used to be), he receives instructions with which controllers he will work. Everything, the system is ready. To work with remote objects, the controller assigned by the server is given a "white" IP, it is indicated to other controllers, and they independently connect to it. To integrate with 1C, you just need to transfer the address of the controller to the program. To integrate with the license plate recognition system, specify the vehicle number and the IP address of the camera or system capable of recognizing license plates as the pass number.

ACS as a service

The second important advantage is user convenience. The customer no longer needs to think about which computer to deploy the system on, where it will stand, and who will serve it. Now the client simply receives an IP address, login and password - and can monitor the discipline of employees, assign access rights and issue guest passes in any browser convenient for him. It is enough to purchase a turnstile and a controller (or a ready-made solution - an electronic checkpoint) and identifiers. And the system is ready.

This approach maximally corresponds to the modern trend of perception of ACS as a service. The customer does not think about installing and maintaining the system, all this is carried out remotely by specialists. Here the question inevitably arises about the speed of the controller and its ability to work with 10 users and 200 turnstiles? So far this is not possible, but the database can be hosted in the cloud or on a dedicated server. Over time, the capabilities of controllers will grow, and the system described above can be deployed even in large enterprises with a large number of employees and actuators.

Future

Standardization as a trend

The ACS architecture will be built on the basis of "smart" controllers that will independently interact with each other, having several master controllers among themselves, acting as a server. They will also be able to unite on the basis of a single server (or several servers) that provides the necessary interaction logic.

New approaches to the construction of access control systems using WEB-technologies

It is necessary that standardization of protocols be supported by all market players - not only at the level of interaction with the controller, but also at the level of system interaction.

Perhaps the development of a single standard will be implemented in the distant future. But even if it doesn't, the standardization of interaction based on REST API and access to information through the browser should be implemented as soon as possible.

Source: habr.com

Add a comment