IMRON Corporation.

Access Control Installation

An access control system typically comprises of the following components:

    • Cards/Tokens
    • Readers
    • Controllers
    • Host
The Host is a PC where the software resides and is used to manage the system.  The Host will communicate directly to the controllers via network.  Controllers make all access control decisions after being programmed from the host and the controllers are connected to devices such as readers, sensors, locks and sounders.  Readers are typically hardwired using Wiegand or OSDP.  Sensors are hardwired inputs that a controller uses to detect when a door is open or closed.  Push button sensors can be used to remotely unlock a door for a request to exit scenario.  All sensors are wired to the controller's input ports and reported back to the Host.  Door locks are wired to the output relay ports of the controller. The controller's relays can be toggled from the Host software to lock/unlock doors, and toggle aux outputs such as sounders and/or lights. 

Rule based logic can be programmed from the Host to make the system interact based on specific conditions being met.  This rule based logic is downloaded to the controller(s) and gives the user a way to customize the system's behavior and how it interacts with other systems.

Cards/Tokens are assigned to users of the system from the Host software that sends the information down to the controller's database.  All of the access controller intelligence occurs at the controller level without any dependency on the Host.