Ask a question

Sigur supports a variety of intercom systems as part of your access control system and can register all door opening events and store photos or videos for every access event.

How it works

An intercom system is a type of access control system. It is often used in the office buildings, business centers or multi-dwelling units.

If a classical access control system and intercoms are used together, it is important to ensure that the information about access events from both systems is conveniently accessible from a centralized interface to monitor events in real time or to gain access to the archived data, e.g. to investigate a disputed situation.

Connection of intercoms

The lock is connected to Sigur controllers using the same ports as to the intercom. In this case, the intercom will lose direct control over the lock and will communicate the command to open the door via the controller.

There are two most commonly used intercom connection options:

  • the lock and the intercom are connected in a series circuit to the power supply unit and the lock is controlled via a relay built into the intercom
  • voltage is supplied to the lock directly from the intercom

The recommended connection diagrams are usually provided in the intercom manuals.

Control of the lock by the intercom relay

This is the most common type of connection. You can find connection diagrams for Sigur controllers in the manuals on our website.

Connection of an intercom supplying the lock

In this case, the circuit connecting the lock is not just closed or open, it supplies voltage directly.

If the intercom is configured to operate an electromechanical lock, the terminals of the intercom relay are normally open and no additional settings are required.

If the intercom is configured to operate an electromagnetic lock, the terminals of the intercom relay are normally locked and minimal settings are required to reassign terminals in Sigur software.

Integration with CCTV IP cameras

If an RTSP-enabled video intercom (real time video streaming) or IP cameras logically connected to checkpoints are used, access events can be linked to the relevant photo or video footage, which can be accessed in the archive