The most obvious elements of access control are the code reader and the electric lock. The reader and the electric lock form an access point.
Both are connected to an access controller that can operate independently, in conjunction with other controllers in local network, or in conjunction with an advanced access control application which can be installed on a local server or as a cloud service on HIQ Universe.
|4||Local access application server|
|5||HIQ Universe access cloud service|
The access code can be in the form of:
The PIN code is the least secure and is therefore only used when other codes are inappropriate for any reason.
In principle, RFID and QR codes offer the same level of security and reliability.
RFID is media-bound (card, stick) and therefore harder to duplicate, but media distribution is often a limitation.
QR codes offer the simplest distribution, as they can be easily sent. There is also no media cost and they make it easy to scan the code.
Most code readers are combined so we can enter multiple types of code.
|+12V||+12V||Code reader power supply|
|D0||D0-0+1||Wiegand data 0 for reader 0 and 1|
|D1-0||D1-0||Wiegand data 0 for reader 0|
|D1-1||D1-1||Wiegand data 0 for reader 1|
|GN-0||GN-0||Green LED indicator for reader 0|
|GN-1||GN-1||Green LED indicator for reader 1|
|RD-0||RD-0||Red LED indicator for reader 0|
|RD-1||RD-1||Red LED indicator for reader 1|
For specific reader wiring see reader page.
Depending on the type of door and preference, several types of electric locks can be used
Practically all locks that are unlocked with a 12 or 24 V DC signal are supported. It is recommended that the lock has a door open signal.
The electric mortise lock is mounted on the door leaf and therefore the wiring is movable. This can be problematic over time so we recommend wiring with wireless power and signal connection module.
|C0||C1||Common - Lock power supply|
|IX0||IW0||Door 0 state REED relay (0=opened, 1=closed)|
|IX1||IW1||Door 0 exit push-button|
|IX2||IW2||Door 1 state REED relay (0=opened, 1=closed)|
|IX3||IW3||Door 1 exit push-button|
The HIQ Access application is compatible with all Master controllers:
Each Master Controller supports up to 30 code readers.
The MC-230-3W is designed for direct connection of two code readers. Additional readers can be connected to the Master Controller via the CR-W2-IQ interface (2 readers per interface).
HIQ Access application can be installed to a dedicated controller or or it can be embedded in other HIQ applications (HIQ Home, HIQ GRMS …).
The list of access codes is stored in the HIQ Access controller. Each controller supports up to 100 access codes. Each code may have a limited validity period and a limited number of passages through each access point.
After scanning the code on the reader access verification is done in several steps. It is first checked in the local access controller code list. If there is no permission in the local list, a local network query is sent. The query can be answered by any controller within the network to allow access. Web server access can also be provided, if enabled. If access to the scanned code is granted, the lock is unlocked. The lock automatically locks again after the preset time has elapsed or when the door is open. For easy unlocking from the outside, an exit button can be installed.
Management of access codes can be:
A description of the code management applications is on the page: applications.
In case any of the ways to manage the access codes is not possible (network / internet is not working, the computer is defective, …), simplified management is also possible using the “master code”. Depending on the access point settings, you can use the “master code” to add and delete codes for each access point, or to allow passage with any code (for gateways such as corridors, staircases and the like).
Depending on the settings, the master code can be used to add and delete access codes or to allow all codes (intended for transitional access points as corridors, staircases in hotels).
All scanned codes will be added for an unlimited time and an unlimited number of passages for an access point controlled by the code reader.
All codes access rights for an access point controlled by the code reader will be deleted. Rights for other access points are not changed.
All codes will have access through the access control where the master code was scanned.