The modern automated checkpoint consists of electronic turnstiles with a passage indication, plastic cards, and a computerized visitor identification system. It consists of a controller and a reader. The decision whether to let this person pass or not is made by the computer. This eliminates errors and significantly increases the throughput of the checkpoint.
Instructions
Step 1
All employees are issued access cards, which allow them to enter and exit the building and enter a specific office. Each pass has its own digital code. The computer records information about the user, the time of entry and exit and the zones in which this employee is allowed to enter.
Step 2
When an employee approaches the reader and presents a pass card, the information is read, the time of entry is recorded, the turnstile opens and allows the employee to pass.
Step 3
If the pass is lost, it will be impossible for another person to enter it. Since the owner's photo is shown on the guard's screen, and the fact of an intruder's penetration will be immediately recorded. Upon notification of the loss of the pass, its code is immediately canceled, and the pass becomes invalid.
Step 4
You can order a pass for any visitor from any computer of the company directly to the security guard or at the pass bureau. Issue the prepared card to the visitor, then his entrance, exit and passage to this or that office will be recorded.
Step 5
When a visitor exits, the guest key in the system becomes free and can be used for a new visitor. The guest card is returned to the security guard or to the pass office.
Step 6
To generate the pass data, it is not necessary to enter the photo into the database. It is enough to enter basic information.
Step 7
The same card is issued to another guest, entering his data into the database.
Step 8
At the request of the enterprise, the turnstile can be configured for automatic operation or switched to manual control mode.
Step 9
This form of passes allows you to streamline the passage and exit to the enterprise. Improves labor discipline. Allows you to monitor all employees and incoming guests. Eliminates terrorism and unauthorized acts at the enterprise. Facilitates the work of security guards and accounting. Prevents blacklisted persons from entering the enterprise.