好文档就是一把金锄头!
欢迎来到金锄头文库![会员中心]
电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

信息科学与工程专业毕业论文中英文资料外文翻译文献门禁管理系统.docx

17页
  • 卖家[上传人]:gg****m
  • 文档编号:214682507
  • 上传时间:2021-11-23
  • 文档格式:DOCX
  • 文档大小:71.04KB
  • / 17 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 毕业设计(论文)中英文对照资料外文翻译文献(此文档为word格式,下载后您可任意编辑修改!)1、 外文翻译是毕业设计(论文)的主要内容之一,必须学生独立完成2、 外文翻译译文内容应与学生的专业或毕业设计(论文)内容相关,不得少于 XXXX印刷符号3、 外文翻译译文用A4纸打印,需包含中文翻译和英文原文4、 年月日等的填写,用阿拉伯数字书写,要符合《关于出版物上数字用法的试 行规定》,如“2017年5月26日”5、 所有签名必须手写,不得打印附件:外文原文The Access control systemAccess control system is widely used in recent years and it is one of the high-tech and safety equipment , has become one of the intelligent signs of modern architecture・ Access control , the export and the entrance control system, is to control the export and entrance channel system・ Access control system is developed on the basis of the traditional locks (Entrance Guard/Access Control in English).Access control is, in reality, an everyday phenomen on. A lock on a car door is essentially a form of access control. A PIN on an ATM system at a bank is another means of access control. Bouncers standing in front of a night club is perhaps a more primitive mode of access control (given the evident lack of information technology involved). The possession of access control is of prime importance when persons seek to secure important, confidential, or sensitive information and equipment .Item control or electronic key management is an area within (and possibly integrated with) an access control system which concerns the managing of possession and location of small assets or physical (mechanical) keys.Physical access by a person may be allowed depending on payment, authorization, etc. Also there may be one-way traffic of people. These can be enforced by personnel such as a border guard, a doorman, a ticket checker, etc., or with a device such as a turnstile・ There may be fences to avoid circumventing this access control. An alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country. In physical security, the term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons・ Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the Access control vestibule・Within these environments , physical key management may also be employed as a means of further managing and monitoring access to mechanically keyed areas or access to certain small assets ・ Physical access control is a matter of who , where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. Historically this was partially accomplished through keys and locks・ When a door is locked only someone with a key can enter through the door depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be keyed・ Electronic access control uses computers to solve the limitations of mechanical locks and keys・ A wide range of credentials can be used to replace mechanical keys・ The electronic access control system grants access based on the credential presented・ When access is granted, the door is unlocked for a predetermined time and the transaction is recorded・ When access is refused, the door remains locked and the attempted access is recorded・ The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.When a credential is presented to a reader, the reader sends the credentiaPs information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credentiafs number to an access control list, grants or denies the presented request, and sends a transaction log to a database・ When access is denied based on the access control list, the door remains locked・ If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted ・The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room・ To prevent this, two・factoT authenticationcan be used・ In a two fac。

      点击阅读更多内容
      关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
      手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
      ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.