Requirements For The Construction Of Hospital Access Control System

Access Control System

Introduction

The hospital access control management system has unified identity authentication and data management functions, reflecting the people-oriented hospital management and service concept. All spaces and all types of personnel in the hospital have potential infection control risks. Through the control of the access control system, some clean areas can be effectively physically isolated. Patients will carry a certain amount of property with them when they go to the hospital for treatment. Due to the high mobility of personnel in the ward area, it provides opportunities for thieves. How to ensure the safety of patients’ property has become one of the key points of public security work; in addition, a large number of medicines and dangerous chemicals are stored in the treatment rooms and laboratories of the hospital wards. Standardized access control management can ensure that such items are not lost. In addition, it can also achieve medical isolation and ensure the personal safety of medical staff.

The access control system is not a simple doorway and key management, but a complete access management system. It replaces passive surveillance with active control, politely excludes unwelcome personnel, and all entry and exit actions are recorded, which is convenient for targeted inquiries and the implementation of accident responsibilities.

Construction objectives

(1) The construction of the hospital access control management system first forms a unified information platform for hospital management, promotes the standardization of hospital information management, builds an excellent digital space and information sharing environment, and further realizes the intelligentization of information management, networked data transmission, and intelligent user terminals in the hospital.

(2) With the help of the hospital access control management system, unified identity authentication is realized, one card replaces multiple cards, and multiple identification methods replace one identification method, reflecting people-oriented hospital management and making management easier.

(3) With the help of the basic data provided by the hospital access control management system, integrate and drive the construction of various management information systems in the hospital, provide comprehensive information services and auxiliary decision-making data for various management departments, and comprehensively improve the management efficiency and management level of the hospital.

Construction principles

The hospital access control system is an Internet of Things technology based on information-based intelligent services. The most fundamental requirement is “multi-dimensional identification, information sharing, and centralized control”. The design idea of ​​the access control system should bid farewell to the traditional card-dependent model, adopt multiple identity identification methods to achieve management, build a digital hospital with face recognition, mobile phone recognition and other technologies as the link, and build an identity recognition intelligent management system to take the hospital management methods and management level to a higher level.

Access Control System

Design principles

1. Data statistics

Through high-performance time-sharing concurrent technology, each thread can make full use of the CPU and network bandwidth, greatly accelerating the transmission efficiency. The system uses SOL for data storage, and uses distributed file storage as the basic architecture to conduct in-depth data mining, processing, statistics and analysis to complete the presentation of the final results, improve the service quality of the hospital, and help the hospital achieve precise management.

2. Stability

The system adopts an independent network service system, and through the network topology that supports multi-point applications, it improves the system data throughput and the ability to handle large amounts of data. Use a high-performance front-end login server and scheduling system to reasonably allocate system resources, balance the load intensity between systems, effectively utilize server resources, and ensure the stable operation of the system.

3. Advancedness

The system adopts an intelligent modular design concept, and the network communication adopts the internationally popular TCP/IP protocol, which is compatible with LAN and WAN communications, ensuring that the system will not be eliminated within ten years.

4. Convenience

Users can use face/mobile phone/card to conduct various activities such as attendance, dining, access control, office, meeting, and equipment control.

5. Connectivity

Data is processed centrally and completed on the front line. Each subsystem and terminal can automatically organize and summarize the collected information for system query, summary, statistics, management and decision-making, and can also achieve cross-department and cross-regional management, and realize global data sharing.

6. Scalability

After the system is designed, upgrade interfaces and upgrade space should be reserved. Wireless terminal equipment can be optionally equipped to achieve real-time wireless transmission of information. Users can also send and receive notifications through mobile phones; and data can be shared with other business systems to provide data support for the improvement of hospital service quality.

7. Easy to use and maintenance-free

The system is easy to deploy, the management software is installed uniformly, the process is simple, and the operation is convenient. There is no need to install software on the client, and it can be used normally directly by connecting to the Internet.

Current status of hospital access control

The area is not isolated: The medical work area and public places are not completely isolated. Patients and social personnel can enter the area that needs to be isolated, such as wards, medical staff’s office area, etc., and the identity of the personnel cannot be identified and managed.

Access control is used alone:There is only one function of access control, no typesetting attendance, or the attendance mode is single, and it is impossible to connect with the hospital’s shift schedule, and there is no one-card management for the hospital area, resulting in employees having more than two cards, which is very inconvenient to use

Access control is mainly based on cards, without face and mobile phone functions: most of the access control and other equipment that need to be identified and verified on site are still based on traditional cards, set for offline use, poor management, and single identification. Multiple identity recognition is not adopted: face recognition, mobile phone recognition and other technologies, physical cards replace virtual cards, which is convenient to use.

Access Control System

System function

B/S architecture

The system adopts Browser/Server architecture, core technology of the Internet of Things, supports multiple databases, supports distributed deployment, and supports all subsystems running on browsers.

Platform strategy

The identity recognition system platform is mainly composed of data center, personnel center, card service center, equipment management center, online monitoring and other systems. The platform covers multiple subsystem modules: access control management module, attendance management module, smart canteen management module, water control management module, visit and escort management module, meeting sign-in module, elevator control management module, dormitory management module, shuttle management module, smart door lock management module, etc. At the same time, it can derive other customized module functions based on its own data advantages.

Authority classification

The system supports the group management of cloud platform services and has hierarchical management functions. Different administrators have different management permissions, so that permissions can be delegated according to departments and query management can be coordinated.

Identification diversification

The platform system has multi-dimensional identity recognition functions. In addition to traditional card recognition, it must have mobile phones and biometric recognition technologies such as QR codes, fingerprints, and faces. It has the characteristics of diversified recognition and convenient use.

Mobile phone management function

The system platform supports mobile phone management functions, which can realize remote control, data query, recharge consumption and other functions.

Intelligence

Intelligent transactions, only identity recognition is needed to complete all financial transactions, avoiding the tediousness of cash transactions.

Data Analysis

Identity recognition big data, based on the traditional report and other methods to display various data records, can be used to conduct in-depth mining and intelligent analysis of the original data to generate visual data analysis charts.

Basic functions

(1) Monitoring linkage: The access control system can be connected to the network camera to receive video signals in real time. At the same time, when people enter and exit, the corresponding high-definition monitoring will automatically capture or record.

(2) Fire linkage alarm: The access control system can be linked with the fire automation system to quickly open the fire passage and safety passage in the event of a fire in conjunction with the monitoring system to guide people to evacuate quickly.

(3) Convenient authorization: The system is user-friendly, with diversified authorization methods and traceable operation records, which can meet the access control security needs of the hospital.

(4) Multiple door opening methods: card swipe, card swipe + password, super password, duress password, first card, multiple cards, QR code, face recognition, remote door opening and other methods.

(5) Remote door opening: supports real-time monitoring and remote control (including PC and mobile terminals), can remotely open the access control under its own authority, and remotely open and close the door for on-site personnel, basically meeting the company’s requirements for office security and convenience.

(6) Duress password door opening: When employees are threatened by criminals and asked to open the door, they can open the door for the criminals by entering the duress password. At the same time, an alarm message will be sent to the server for help.

(7) First card always open: After the first card authority is opened, the door remains always open. After the door opening time exceeds the effective period of the first card access control rule, the door returns to normal.

(8) Multiple card swipe always open: realize the function of continuous multiple card swipe always open (that is, quickly set the access control always open function). The number of multiple card swipes and access control rules can be set according to needs.

(9) Anti-tailing alarm: When a person without a card follows the cardholder in and out, the channel will automatically alarm, and the tailing record can be reported to the server to generate an illegal intrusion record.

(10) Support multi-door interlocking: Under the same controller, all other doors are not allowed to be opened before any one or more doors are closed. The two-door controller can realize two-door interlocking, and the four-door controller can realize friendly door interlocking, three-door interlocking, and four-door interlocking.

(11) Equipment online monitoring: The online status of the equipment and data collection status can be detected at any time on the unified monitoring interface, which is convenient for rapid troubleshooting of system failures and ensuring the integrity of background data.

Access Control System

Access control system design

Medical staff: Medical staff enter and exit the medical corridor, office area, and waste elevator by swiping cards. In medical elevators, pharmacies, financial centers, and hospitalization procedures, personnel can enter and exit by swiping cards or facial recognition. The financial center can also set double-door interlocking or first-card door opening according to actual conditions, which can effectively increase safety. Important archives, imaging center control room, radioactive department, dangerous goods, drug distribution area, infectious disease area and bacterial culture, national controlled anesthetic drugs centralized parking place, highly pathogenic microorganisms experiment, storage place, precision instrument room and other places are important prevention places in the hospital, which need to adopt fingerprint, face and other biometrics, and cooperate with card swiping to enter and exit. Large surgical areas use visual access control to reduce the entry and exit of irrelevant personnel. Enter and exit the designated location according to the authority to achieve doctor-patient separation.

Inpatients: The flow of personnel in the inpatient department is relatively large, and the control of the inpatient department is particularly important. Patients can swipe the card in the ward through authorization when handling relevant procedures during hospitalization, and swipe the card or QR code on the passage gate of the inpatient department.

Patient family members and accompanying personnel: Accompanying personnel and patient family members apply for access control function through mobile phones. After approval by the relevant personnel, they swipe the card or QR code to enter and exit at the gate of the inpatient department, the entrance of the ward, and the entrance and exit of the inpatient garage. It can effectively prevent the entry and exit of irrelevant personnel and reduce the number of management personnel.

Logistics staff of the hospital area: Visual access control is used in the security and fire control rooms to reduce the entry and exit of irrelevant personnel. Passive electronic locks are installed in the strong and weak current rooms to reduce the number of keys for staff and achieve electronic management. Two-way card access control is used to restrict the entry of people to the corridors and roofs.

Why Choose Us?

CN MEDITECH

CNMEDITECH is dedicated to the long-term research of the medical consumables market. Our mission is “People oriented and win-win strategy,Matching the real needs of the region with a focus on human health,To be the world’s first-class medical field solution expert”. We have been manufacturing high-quality medical device products for more than ten years.

We have built our reputation on delivering quality healthcare solutions on time and on budget. All our products comply with international health and safety regulations and all products come with a warranty.

Are you still worrying about your customer’s product needs? Are you still angry that the product is expensive?Our medical consumables support personalized product customization.

Our company has many styles to choose from. In addition, we have high-quality pre-sales consulting guidance and professional after-sales service, all to meet your needs.

Whether it is a cost-effective or high-end product, there will always be something suitable for you. If you have any needs for products, you can ask us, our factory will meet your needs as soon as possible, and we will make every effort to provide you with solutions.Feel free to send us your inquiries.

Facebook
Twitter
LinkedIn
Pinterest

Leave a Reply

Your email address will not be published. Required fields are marked *

Latest Post

We Love to Hear From You

We will contact you within 1 working day.