Accessing the metro

July 2013 Access Control & Identity Management

In operation since the end of December 2010, the Fangshan Line of the Beijing Metro is 24,79 km long with 11 stations (nine surface and two underground). The line runs north and east from Suzhuang Dajie in the Fangshan District to Guogongzhuang in the Fengtai District, with an average of 2,3 km between metro stations. A backup control centre is located at the Yan Village line.

As a key component to the success of Beijing’s public transport system, strict requirements are imposed on the access control system to safeguard the passengers and staff.

The metro system features lengthy routes, numerous stations and lean management. Line sections and stations are the core management areas in the metro’s operating system, most of which are operated remotely. To ensure the metro is running safely, it is necessary to prevent unauthorised access and closely manage access to all stations, electrical substations, parking lots and major facilities at metro line sections.

The new access control system also had to safeguard the equipment and staff at key locations such as fixed plants, offices, equipment areas, the machine room, the automatic fare collection system management office and central station, communication equipment rooms and public areas. To improve the operation, the system was required to enable central monitoring for every passage area and location that housed equipment management facilities.

The access control system needed to cover an extensive network and all cardholder information from different entry points with a wide range of access control rules that have to be transmitted to the central station. The new access control system also needed to be reliable with a versatile architecture. In addition, the metro network comprises complicated installation environments such as underground, narrow door frames, channel gates and glass surfaces.

As a result, the access control products must withstand harsh environments, providing reliable performance and resistance to fire and electromagnetic interference.

HID solutions

With the HID Global VertX V1000 controller and partner software, HID offered a centralised, Web-based access control system to monitor all stations and site equipment in real-time. The system manually controls the access of high-risk zones, creates access rights settings and performs database management.

At the same time, each station control centre can independently operate using an HID V100 reader interface when communication is lost with the host. HID iCLASS R10 readers were also installed at the entry points of the offices, equipment and mechanical rooms, automatic fare collection system management office and central station and other locations. All iCLASS R10 readers were connected to a VertX network controller for central access management and report generation.

The metro line control centre performs all central management functions and it consists of the central server, access authority management station, central station and system software. The control centre network primarily monitors the operation of station equipment; manages access authority such as cardholder access rights and operator administrative levels; and facilitates system functionality and database management.

Every metro station office performs station-level management, database management, report generation and data tracking. An HID VertX V1000 controller was installed to enable the metro station offices to monitor the station’s system real-time status, entry records and card access information.

The administrator can also check the event logs and control the access to entry points remotely. Both the control centre and station offices are connected to the central server via TCP/IP for data transmission.

Finally, the metro’s network features complicated installations and extreme operating environments in which the small footprint of iCLASS R10 readers for mullion-mounted door installations and the VertX controller featuring an average MTBF of over 1 million hours and water-resistance to damp environments were ideally suited for the project.

The products are also UL94-certified with fire-resistant capability.

Top-to-bottom management

The resulting access control system from HID Global enables Beijing Metro to centrally monitor all stations, fulfilling their needs for a top-to-bottom management approach. The administrator at the central station can also track and manage the door access in all metro stations, offering greater flexibility and faster response to network failures.

The new system also provides multi-layered security and fail over support. Remote computers are deployed at high security level zones where access is manually controlled by the administrator and a V1000 controller is used for station access management, enabling metro station offices to work independently when offline with the central station. A V100 reader interface provides emergency support when communication between V1000 controllers and the V100 reader interface is lost. In case of communication failures, the station office executes all commands and once communications are restored, all buffered transactions are uploaded to the host, enabling real-time monitoring and data transmission.

For more information contact HID Global, +27 (0)82 449 9398, rtruter@hidglobal.com, www.hidglobal.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.