Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Analysis of Challenges and Security Hiddens in Conventional Access Control Systems

Analysis of Challenges and Security Hiddens in Conventional Access Control Systems

April 06, 2023
Today's energy conservation and environmental protection has once again become a global concern. As the rapidly developing security industry is no exception, there has been a new wave of environmental protection and energy saving features of security products. As we all know, human biometric technology and products are one of the important industries in the security industry. While applying a very wide range of development, we must not ignore the impact on the environment. Among them, the access control identification system is also a typical one. It starts with its own products, achieves energy conservation, and achieves environmental protection. For this purpose, this paper will use the challenges faced by the access control identification system in environmental protection applications as an example. This will lead to the development of the overall design of a novel fingerprint identification technology with environmental protection and energy saving, and the finger vein recognition technology developed and non-contact For example, the face recognition attendance machine technology and its products were studied, and its technical characteristics and applications were studied. At the same time, the features of conventional access control systems were compared and explained. Based on the narrative, this article begins with the challenges faced by conventional access control systems.

Conventional access control systems face challenges and security risks. Conventional access control systems

With the improvement of the security, advancement, and stability requirements of access control systems in China, the currently commonly used access control systems mainly include fingerprints, palms, irises, and biometric recognition systems represented by radio frequency cards. Common access control systems include: password access control systems, contact card access control systems, contactless card access control systems, and biometric access control systems. At present, fingerprint access control systems are more commonly used. The Fingerprint Access Control System replaces the traditional keys and existing IC and ID cards with fingers. It uses the anisotropy and invariability of human fingerprints to provide users with safe and reliable encryption means. When using them, they only need to place their fingers on the fingerprints. On the acquisition window of the acquisition instrument, the task of unlocking can be completed and the operation is very simple.

New challenges and security risks

Although fingerprint, palm-shaped, iris and other biometric identification access control systems not only need to have their own specialties in terms of security, convenience, manageability, etc., but the fingerprint identification method itself has relatively serious security risks.

This kind of biological characteristics exposed to the human body is more easily copied;

High requirements on the environment, sensitive to finger humidity, cleanliness, etc. Dirty, oil, and water can cause no recognition or affect the recognition results;

Some people or some groups have few fingerprint features or even no fingerprints, so they are difficult to image; for low-quality fingerprints such as peeling, scars, etc., there are difficulties in recognition and low recognition rate. For some hands-on workers, there are more manual workers. It is difficult to register and identify other special groups.

Fingerprints can not be scratched, the eyes can not be swollen and bleeding, the face can not be injured and so on, and even the number of beard will affect the accuracy and sensitivity of the recognizer.

With the development of society and the acceleration of the pace of life, the flow of people in public places such as office buildings, libraries, etc. is getting larger and larger. Controlling the normal operation of these places and ensuring public safety has become an important task for the management agencies. From the perspective of energy conservation and environmental protection, China has a population of over 100 million, and the amount of access card holdings is considerable. With the major trends and new requirements for energy conservation and environmental protection, new breakthroughs in the access control system are the key points. How to combine medical science and biometric energy-saving advantages with the advantages of traditional access control cards is the question that security guards need to ponder.

The overall design idea of ​​novel fingerprint identification technology

Fingerprint biometric technology refers to the use of fingerprint features to identify people. So what is the overall design idea of ​​the novel fingerprint identification technology?

The first is the use of a fingerprint sensor, which can use capacitive, optical, pressure or thermal sensing techniques to acquire images of finger features. The most commonly used fingerprint sensor solution first uses a laser or near-infrared or LED light to illuminate the fingerprint, and then uses a CCD or a cheaper CMOS sensor for image acquisition. Fingerprint sensors are typically self-contained modules that include an analog-to-digital converter that can convert analog information into a digitized data stream. Resolution, dynamic range, and pixel density are all factors that determine image quality and affect sensor accuracy. Once the image is captured, the digital information will be transmitted to the digital signal processor to generate a match. The first step in the matching process is to adjust the scanned fingerprint. Fingerprint readers rarely use full fingerprints for recognition. Instead, DSPs use algorithms to extract the features and styles of each fingerprint to generate unique digital codes. The second step in the software flow is to read the code generated from the scanned image and then compare it with the potential matches of the database. The comparison step will require the system to access the fingerprint information in the networked database or non-volatile memory.

The gray dashed area in Figure 1 is the basic part of the fingerprint reader, and the white dashed area is the optional peripheral feature of the fingerprint reader. The novel fingerprint recognition technology is used in various applications such as electronic access control systems, smart cards, vehicle ignition switch control systems, USB memory sticks with fingerprint control access functions, and many other applications. Digital signal processing components in a fingerprint scanner can perform complex DSP functions such as filtering, conversion, feature extraction, matching operations, and other algorithms.

With the fingerprint sensor and real-time signal processing DSP, and then through the combination of medical applications science has become a novel overall design of fingerprint recognition, and thus to build a typical product with environmental protection features - finger vein recognition device. For this purpose, a new fingerprint reader-finger vein identification device was constructed for analysis.

Finger Vein Recognition Technology Based on Absorption of Near-Infrared Radiation Finger Vein Recognition Technology Architecture 1. Medical basis

The finger vein is a new biometric identification technology. It originated from the advanced development project of human brain function management in the field of medical science and technology. In this development, near-infrared rays are used to observe the increase of blood flow, when near-infrared Through the human tissue, hemoglobin in veins has a significant absorption effect on near-infrared rays, so that the vein blood vessel distribution characteristics are characterized by different gray values ​​in the image. Due to the randomness of the direction of elongation, the blood vessels of the finger veins of the individual appear to have different structures, so that it can be determined whether the two vein images are from the same finger. At the same time, it was found that this technique is also applicable to the collection of finger vein images.

2, technical architecture

Finger vein recognition uses light propagation techniques to compare and identify finger veins. When near-infrared rays pass through a human finger, some of the rays are absorbed by the hemoglobin in the blood vessels, capturing a unique finger vein pattern, and then comparing it with a pre-registered finger vein pattern to authenticate the individual's finger. The vein identification technology architecture is shown in Figure 2. It has been proved through medical practice that the shape of finger veins is unique and stable, that is, each person's finger vein image is different, and the same person's different finger vein images are also different. The vein shape of healthy adults no longer changes, which provides a medical basis for the finger veins. Therefore, recognition technology based on the principle of finger vein images may become a reality. It is thus possible to use the vein distribution image within the finger for identity.

3, finger vein system identification process

As can be seen from FIG. 3 , the first is a vein scan, and the LED emits near-infrared rays on the finger side, transmitting the finger, and on the other side of the finger, the camera takes a vein image. From the process of extracting the finger vein image, this process mainly captures the vein image of the finger, and then extracts the finger vein feature information (ie, the vein shape of the finger, whose shape is shown in the enlarged view of the lower end in FIG. 3 ), and registers with the previously registered finger vein. The characteristics are compared to confirm the identity of the registrant. In order to compare the scanned pattern with the original registered pattern, the relevant recognition result can be obtained (that is, by comparing the scanned pattern with the original registered pattern, the relevant recognition result can be obtained).

The finger vein recognition algorithm uses the texture tracking method to extract the line structure information in the finger vein. Through the line structure matching for individual identification, it can run on the PC environment and embedded DSP platform.

Finger Vein Recognition Technology Highlights Features

Compared with other biometric technologies, this finger vein recognition technology has the following major advantages.

Since finger veins are hidden inside the body, there is no risk of copying or theft. Skin conditions on the human hand surface do not affect the recognition work.

Non-invasive and non-contact imaging technology uses infrared light to ensure user convenience and cleanliness. Compared with certain biometric technologies, finger vein recognition technology is non-contact and will be more hygienic in public places;

Due to the relative stability of the vein shape of the finger and the sharpness of the captured image, small, simple data image processing techniques can be performed on the pattern data captured by the low resolution camera.

High security. Because the venous blood vessels are hidden inside the fingers, it is extremely difficult to copy and steal, and this method is safer than other technologies that use human body's in vitro features for authentication. At the same time, venous authentication can sense the blood flow and blood pressure in the finger and can perform the biometric detection at the same time during the identification process.

High accuracy. The sampling sample is inside the human body, so the external interference during the matching process is very small. Put your finger gently and trigger a high degree of accuracy. According to strict medical certification and mathematical statistics, FRR (rejection rate) is 0.01%, FAR (false recognition rate) is 0.0001%, and FTE (registration failure rate) is 0%.

It can be seen that, compared with other biometric technologies, finger vein recognition technology is much more difficult to copy and steal than face, palm, fingerprint, and iris; it is much more accurate than recognition in terms of recognition accuracy and ease of use. The palm, fingerprint, and iris are much higher. Especially with respect to fingerprint technology, the use is more convenient, healthier and more humane. Finger vein recognition is an effective way to avoid the inadequacy of traditional access control systems. It has opened up a new way to protect personal and property safety for environmental protection and energy saving biometric identification technologies and products.

Finger vein recognition system application

The advantages of finger vein recognition technology make it quickly recognized by the market, for which it is widely used in financial systems, access control systems, and computer security.

1. Construction and application of finger vein recognition system

Due to its high safety, high accuracy, uniqueness, non-contact and other advantages, finger veins can be widely used in the field of access control security, providing a convenient, hygienic, and more humane ideal security solution for the office environment and living environment. . What is the structural composition of the typical finger vein identification access control system (for example, Hitachi)? Its main functional indicators are as follows: Item 1 is the maximum number of registered users including: First, the ID management server has up to 56,000 IDs; Second, the identification terminal has ID + finger vein registration, each system up to 6,000 ID (2 fingers/ID) and access control card alone, each system up to 50.000 ID. Item 2 is the identification method: one is a 1:1 identification method, 6,000 IDs, 12,000 fingers (two fingers registered for each ID), and the other is a 1:N identification method, 64 IDs 128 fingers (Register 2 fingers per ID). Item 3 is: Support language English, Chinese simplified characters. Item 4: Support for the type of the exchange card: One is the HIDiCLASS access control card (16k/2) [The card vein can store finger vein data; the other is the Mifare access control card (only serial number comparison is supported. Card vein cannot store finger vein data) . Item 5: Finger vein registration time is less than 1 second (1 finger); finger vein recognition time is less than 1 second (1 finger). Item 6 is: FAR (False Acceptance Rate) 0.0001%; ​​FRR (Rejection Rate) is 0.01%. Item 7 is: Communication Interface: One is RS485; the other is Wiegand 26-44bit (use: connected with the other three-way controller); and the second is LAN (use: connected with the server). Item 8 is: power supply, voltage DCI2V (DCl2V±5%), current 3A.

In the actual use environment, the finger vein system can be combined with the enterprise (company, factory access control) security system and the attendance system. The employee access log can be recorded in detail. It can be queried according to different search conditions and be alerted in case of danger. Such as the new finger vein system also has a dual function, only the different two different fingers have passed, only to have access to a higher level of security requirements. This will be a better security solution for high-end companies. In addition, hand vein system can be applied in many fields.

· Iron gates, office halls and other public venues will solve the phenomenon of congestion at the peak of peaks and hours in and out of nearly thousands of employees or employees of various companies, and will be promoted to high-security public places;

• Add a protective layer to the living environment. Applications in intelligent building systems: For example, intelligent building systems and hotel management can avoid frequent occurrences of forgetting to carry a card or being easily copied and stolen, as well as avoiding personal insecurity and property damage. It can provide residents with a more convenient and safe living experience. That is, when the owner comes home or returns to the room, he only needs to gently insert his finger into the venous system, and the system can verify the validity. Furthermore, the finger vein system can be linked to an elevator in an intelligent building system. When the user inserts a finger through the lobby door, the elevator will automatically descend to the first floor and automatically run to the user's floor according to the records of the finger vein system database when the user household enters the elevator. Throughout the process, tenants can return to their home without having to press any buttons. This will be a new life experience. Similar to the smart residential system, the management of the hotel will also be very convenient, and the realization of intelligent management can also improve a hotel's grade of a security solution.

Non-contact, anti-infective face recognition attendance machine face recognition attendance concept

Face recognition is a kind of biometric recognition technology based on human facial feature information. A camera or camera is used to capture images or video streams containing faces, and automatically detect and track faces in the images, and then perform a series of related technologies on the detected faces, including face image collection and face location. , Face recognition preprocessing, memory storage and comparison identification, to achieve the purpose of identifying different people. The face recognition attendance system is a combination of face recognition and attendance system, and face recognition as one of the elements of attendance management. Its greatest feature is non-contact, anti-contagion, non-replicable, eradication of punching, higher recognition rate, and accurate and rapid identification. This is also known as facial recognition.

Face Recognition Attendance Software Features

Its characteristics are: It is a carrier of advanced attendance management concept. Attendance software acquires personnel and attendance data for attendance statistics through TCP/IP connection “face recognition”, with user management, shift settings, shift schedule, attendance report statistics, and output / Print reports and other full features. The software intelligently simplifies and simplifies the workload of attendance management, enables all aspects of attendance management, maximizes people's ability, fulfills their responsibility, facilitates timely and smooth information exchange, facilitates query statistics, and facilitates attendance management.

Face recognition time and attendance application

Face recognition time and attendance system can effectively improve the company's attendance management methods, standardize employee attendance operations, prevent modern punching and falsifying behaviors, and it is convenient and effective to improve attendance efficiency. At the same time support TCP / IP networking, attendance data automatically upload management, management attendance data. Widely used in enterprises, institutions, primary and secondary education institutions, hotels, clubs, hospitals and so on.

Conclusion

In summary, with the characteristics of environmental protection and energy saving, security products will be favored by manufacturers and consumers because they not only satisfy people's demands for “environmental protection and high security”, but also have high recognition rate and are easy to use. The security of the environment provides the ideal solution. In addition to the above-mentioned novel fingerprint recognition overall design method and non-contact, the anti-infective face recognition attendance machine is a typical exception, and various intelligent security analysis modules and applications such as the development of various security technologies and products, I believe in the near future, Will be more widely used.
Hubungi Kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk popular
You may also like
Related Categories

E-mel kepada pembekal ini

Subjek:
E-mel:
Mesej:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kita

Siasatan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Menghantar