Typical sign-in applications include attendance, meeting sign-in and patrol. The application characteristics of sign-in class are simple hardware control and complex software report. The main function of general hardware is to record the time and card number of card swiping. Take the attendance system as an example, the attendance machine only needs to swipe the card to save the record. Other requirements may include displaying name, card number, card swiping speed, and preventing repeated swiping, but these requirements are not necessary in the attendance system. The main function of attendance software is to collect hardware card-swiping records, and compare and analyze the attendance results with the attendance requirements stored in the database and display them. The complexity of the software lies in the input of attendance requirements and the output of attendance results. The author's company handles the output of attendance results through user-defined report output, and all report outputs can be exported to EXCEL without distortion. At present, various industries have a fine division of labor. Many software companies specialize in human resource management, attendance analysis and salary calculation, but the hardware is produced by other manufacturers.
Our system thinks that the attendance result of an employee on a certain day is caused by five factors: 1. Punching records, including punching records of the day, including manual attendance; 2. Shift, when to swipe the card, and the scope of swiping the card (swiping the card in advance and swiping the card later); 3. Absence records, including leave slips, business trips or leave slips; 4. Records of not going to work according to shifts, including overtime sheets and leave forms. 5. The definition of holidays, overtime allowance is different for different types of holidays, and this difference is mainly reflected in the salary system.
The application of meeting sign-in class can be regarded as simple attendance, the personnel managed in the module are participants, and the attendance time is only for meeting time. The application for patrol can be regarded as the attendance record of security personnel on the designated card swiping equipment. The visitor system can also be regarded as a sign-in application.
The typical IC card application of authority judgment is access control system. The scope of access control system is very wide. Parking lots, hotel IC card locks, turnstiles and ticket checking systems can all be regarded as access control systems. Its main function is to judge the authority of the card reader and deal with it according to different authority. Usually, this processing involves a series of input and output signals. The simple IC card access control system consists of two parts, the card reading part and the control part. Simple single-door controller, not connected with computer software, only a set of relay signal output and built-in card reading part. The control part mainly refers to the electric lock, including three-roll braking, road braking, rotary braking and so on.
The complexity of access control system lies in the combination of input and output signals and the selection of accessories. There are many kinds of access controllers, which can be built-in or external to the card reading part, and can control one, two, four, eight and so on. There are many communication modes, and the difference of communication modes lies not only between the controller and the computer, but also between the card reading part and the controller. Many specific applications involve the processing of some input signals, such as door magnetic input, door opening button input, fire fighting signal, anti-pick signal, vehicle detector in parking lot system, infrared signal in gate, manual control and so on. Sometimes it needs to be compatible with the input and output signals of other technical defense systems, such as the image comparison module in the parking lot system, which is a typical monitoring system.
There are also some special access control requirements, such as area protection, anti-stealing, anti-tailing, alarm output, multi-card door opening, double-door interlocking and so on. These controls are realized by setting the system software and hardware and judging the input and output. As for which control functions are realized by software and which functions are realized by hardware, we will discuss them in the next section.
Access control software mainly keeps personnel access records, manages hardware equipment and sets parameters. Many access control software of IC card system has attendance function, and many attendance software integrates salary management module.
IC cards are widely used by consumers. At present, the hardware mainly includes consumer computers and water resource controllers. Consumer machines are mainly used in canteens, and can also be used in canteens, medical rooms, libraries, gyms and other places.
The general IC card consumption system has some choices of debit and recharge methods. Some of these functions can be directly realized by hardware and some by software, and the functions and performances of specific products are different. Our company's consumption system adopts M 1 series compatible cards, and recent consumption and card balance information are stored on IC cards, as well as identity information such as card number and name. This processing ensures that the consumer transaction process is completed between the consumer and the card, without communicating with the background database, and realizes the complete offline operation. In order to facilitate reconciliation and inquiry, there is a button on the consumer machine, which can query the accumulated consumption of the current time, the accumulated consumption of unpaid money and the accumulated consumption of the last three days. I suggest that you can set up a separate automatic recharge machine or use the manual recharge button on the software interface to complete the recharge function. If only from the cost requirements, subsidies can be distributed on the consumer machine, but the consumer machine can complete the functions of deduction and addition at the same time, which will lead to some management loopholes in the system.
There will be many different companies in the specific catering system to customize their individual needs. For example, you can only eat when you order, and you can only eat when you are on duty. The amount of the first deduction is different from that of the second deduction. It is time-limited, limited to meals, limited to cards, and printed receipts.
There are many kinds of water resource controllers, and the control of boiling water and shower may be different. There are other controls that require external input and output devices. The water resource controller of our company can be externally connected with a flowmeter and an output control solenoid valve. Generally, the water resource controller is made waterproof. Put the card on the controller and press the button to release water. The total consumption is stored in the controller, and the controller can deduct the fee according to the time or flow table.
In short, the specific implementation of the enterprise card system is related to the specific needs, and a specific application may use several types of processing methods. Hardware can not only record the time of card swiping, but also judge different card marks, input signals and output different control signals to drive access control, alarm, printing and other equipment, and also record the amount of money, entry and exit signs and so on in card writing operation. The software can not only manage the information of personnel cards and equipment, but also collect credit card records regularly, download equipment parameters and card permissions, and handle related events such as card loss reporting, loss reporting, accounts and statements.
A slightly more complicated enterprise card management software will have many functional modules. Generally speaking, different functional modules are not managed on one computer, and there may be multiple workstations or even more than one database in the system. In addition, according to different needs, the operator's authority on different workstations and the interface he sees will be different.