Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Integrate with Internet+ how today's access control system works

Integrate with Internet+ how today's access control system works

February 19, 2023
With the large-scale development of commercial buildings and smart communities, more and more import and export control sites have chosen to deploy smart access control management systems in order to achieve high-efficiency, high-security access rights management. However, among the people coming and going, there are a large number of internal owners, internal employees, merchants, etc., as well as a large number of customers, visitors, etc., which make personnel entry and exit control and management work with high management dimensions, complicated management objects, and hidden dangers. Management personnel have a large workload and require more advanced technical features and new features.
The development of R&D and technology of access control management products in China was relatively late, and the main product system architecture was introduced by foreign brands since the 1990s, and experienced long-term development of localization. Starting from early imitation learning, domestic brands have developed over the past 20 years and have now begun to dominate the industry.
Unfortunately, for a long time China's traditional access control brand products use foreign radio frequency IC cards as information carriers, and the development of front-end biometric identification technologies has made them weak in terms of technological innovation. Existing traditional access control management systems cannot cater to the new features and new demands of the mobile Internet era, especially in the face of open community, visitor management, personnel identification, and smart communities. The deficiency is as follows:
Radio frequency IC cards are difficult to carry, users often need to hold multiple IC cards, causing inconvenience; multiple IC cards usually have the same frequency and interfere with each other; radio frequency IC cards are subject to registration authorization, loss of card reports, blacklists, etc. The management link; visitor management lacks overall linkage and good user-experience hardware and software mechanisms, which in turn becomes a weak link in the access control management system; the use of manual registration checks for visitors often results in low efficiency and infringement of user privacy; The access control management security department and users can only work in face-to-face communication mode, which is inefficient and has a tight relationship. Existing biometric identification technology adopts front-end machine-based local identification, which has slow recognition speed and high user operation requirements.
With the continuous promotion of mobile Internet innovation technology, the access control management industry, which traditionally belongs to partial hardware and heavy applications, has also begun to attract a large number of new mobile internet brands. Cross-industry technologies are constantly emerging and are setting off a wave of innovation.
With the smart phone as the core carrier, the industrialization of innovative technologies such as Bluetooth 4.0, two-dimensional code, video streaming face recognition, APP, and WeChat has become mature, making the access control management industry under the “Internet Plus” environment present a flourishing development trend. It also attracted the interest of a large number of entrepreneurs and venture investors.
This article will discuss the characteristics of the above innovative technologies and the development prospects in the field of access control management from the technical application level.
1.iBeacon Bluetooth 4.0
(1) Technical Features
Bluetooth 4.0 technology is a low-power, high-speed, reliable and stable communication technology. Due to the further promotion of Apple’s iBeacon solution, not only in the field of identification, but also in the field of indoor positioning, electronic information marketing, rapid development.
The access control management system using iBeacon Bluetooth 4.0 technology uses a smart phone APP to work with a Bluetooth access card reader, which is mainly for the convenience of internal personnel. Its main technical features and advantages are reflected in:
The smart phone platform APP eliminates the need for cards or other media to effectively reduce the user's carrying difficulties and enhance the user experience. The mobile phone uses Bluetooth to open the door and does not require network support. It supports the triggering of opening or close to the door. The mobile phone APP is compatible with the Android and iOS platforms. The high security performance is dense. The key is managed by the management side. The management side does not need to worry about security risks; the system can implement key distribution and cancellation management, and the user can back up or add activations on its own; support quick and open doors for middle-distance distance recognition, compatible access doors, speed-through doors, and electric translation Doors, parking and other applications; the system is compatible with IC cards and biometric front-end equipment access.
(2) Evaluation index
To evaluate whether a Bluetooth 4.0 access control system is excellent or not, the following factors should be considered: It must be compatible with Android and Apple phones at the same time; The recognition time is less than 0.5 seconds, which is similar to the card recognition speed; It must satisfy the background standby open and close the screen to open the door; Should have an account Password protection and security mechanisms; should have functions such as remote key updates, access records, etc.; Bluetooth keys should be managed together with the access control management platform; products should have the ability to be compatible, and can quickly and economically and easily retrofit and deploy existing projects.
(3) Development prospects
Due to the need to install the APP, the Bluetooth 4.0 technology is mainly biased toward the internal personnel's permission control applications. Due to low power consumption, reliability, and other characteristics, it has begun to successfully use a large number of high-end commercial, smart communities, etc. In addition, its technical characteristics are well suited to the needs of equipment decentralized projects, such as base station access control management of the Tower Company, substation access control of the power company. Widely used in management and other occasions.
2. Two-dimensional code
(1) Technical Features
QR code scanning is a recognition control technology that has gradually become active with the development of smart phones in recent years. Because smart phones, tablet PCs and other smart terminals can be used for convenient operation, applications can be closely combined with WeChat public accounts and smart apps. The access control management system using QR code scanning can meet the convenience of internal staff and visitors. , is gradually recognized by the market and attention. QR code entrance and exit control has two different application directions: active scanning and passive scanning.
The principle of actively scanning code to open the door is to set a fixed two-dimensional code in the entrance and exit control area, and the system is deployed in the user's smart phone micro channel public number or APP. After the user scans the code using the smart phone, the data is decoded and passed through the mobile data network ( Or Wifi) Open the door by sending a door-opening instruction from the smart phone's WeChat public account or APP to open the door.
The principle of passive scanning is to set a two-dimensional code reader in the entrance and exit control area. The system is deployed in the user's smart phone micro-channel public number or APP. The user login clicks to open the two-dimensional code, or the printed two-dimensional code passes the ticket. It is placed in front of the two-dimensional code reader, the two-dimensional code reader and the entrance and exit controller decode the data, judge the authority and open the door.
Active scanning code is actually equivalent to opening the door by remote control. Relatively, passive scanning code is more secure and more in line with the needs of security mechanisms.
(2) Evaluation index
To evaluate whether a two-dimensional code access control system is excellent, the following factors should be considered: High-intensity algorithm encryption must be used to prevent the two-dimensional code from being forged; if it is intended for internal users, it must have encryption and copy protection, anti-screen-screen forwarding mechanism, and safety Vulnerabilities; if used for visitors, must consider time-limited, time-limited applications; recognition time is less than 0.5 seconds, that is, similar to card recognition speed; must be closely integrated with WeChat or smart app; background management should be unified management with access control management platform; products should have Compatible ability to transform existing projects quickly, economically and easily.
(3) Development prospects
The two-dimensional code has a good ability to communicate, especially for visitors or short-term access control management applications. The two-dimension code reader and access control management system of the passive scan code mode has the characteristics of fast recognition speed and strong ability of upgrading and replacement, and has been widely used in smart community and commercial building projects. At the same time, because of its convenient management model, it has catered to the application characteristics of the clock hotel, the public space, the short-term office, and the smart apartment. It has been adopted by a large number of O2O business models and will usher in "blowout" applications.
3. Video streaming face recognition
(1) Technical Features
Traditional face recognition usually requires multiple acquisitions of high-definition photos, restricting gestures, restricting the use of glasses, limiting expressions, and the user must cooperate with the adjustment when the recognition is performed. The recognition speed is 1 to 2 seconds and the recognition accuracy rate is 90% or less. What is more difficult is that due to the limitations of the algorithm architecture, traditional face recognition cannot improve performance by increasing computing resources.
Since deep learning algorithm research was implemented in 2013 in the field of face recognition to achieve technological breakthroughs, the use of deep-learning video streaming face recognition technology, began to enter the field of access control management.
The face recognition technology of video streaming adopting deep learning has technical superiority that cannot be matched by traditional identification methods such as feature learning, deep structure, global features, contextual connection, and joint learning, and can fully liberate user attitude, support cloud architecture, and fully satisfy mobile applications. And smart analysis application requirements.
(2) Evaluation index
To evaluate the excellence of a video streaming face recognition access control management system, the following factors should be considered:
Must have accurate face recognition without posture adjustment; recognition speed is within 0.8 to 1 second, that is slightly slower than the speed of credit card; the recognition rate should not be less than 99% within 5,000; high security project must have local template control capabilities Should meet mobile application access such as visitor remote face registration, VIP recognition, etc.; should fully consider the different characteristics of face attendance, channel access, access control access, with different trigger modes, different recognition distance control and other adjustment mechanisms; Management should be managed in a unified manner with the access control management platform; products should have compatible capabilities and can quickly and economically transform and deploy existing projects.
(3) Development prospects
The video stream face recognition access control management system is actually a floor-standing product of deep learning technology under the cloud computing architecture and has broad application prospects. It fully liberates the user's attitude and high accuracy recognition effect, and can “spike” the current mainstream tradition. Face recognition instrument.
Although relatively low-end face recognition devices are currently used, video streaming face recognition devices have higher manufacturing costs, but with the advancement of the production process and the development of the market, prices will be gradually reduced, and large-scale industrial substitution and upgrading are in close proximity. At present, the video streaming face recognition access control management system is mainly applied to the authorities, high-end commercial entities, etc. At the same time, there are a large number of people identification and identification applications, which are deployed in hotel registration, transportation hubs, and public places.
4. Wechat and APP
At present, China's mobile Internet industry has entered a stage of in-depth development, and a large number of O2O start-up companies have taken business model innovation and technological innovation as their core competitiveness and entered various traditional industries. Closely related to the access control management system, the vehicle entrance and exit control industry has already emerged a large number of new rising stars. At the same time, some foresighted traditional access control management companies are also planning new product technology directions, in order to promote innovation through innovation.
The above-mentioned O2O startup companies or traditional access control companies generally follow the typical development model of the mobile Internet industry: by building APPs, cooperating with marketing, obtaining a large number of active users, and building data traffic entrances, they will win the favor of the capital market and long-term development. In contrast, the WeChat account is usually not valued.
However, the author believes that in the low frequency secondary access control management application field, the technical advantages, convenience, and user experience of the WeChat public platform have won APP.
(1) Technical Ecology Comparison
The WeChat public account actually makes full use of the WeChat ecosystem created by Tencent and has obvious advantages in cross-platform operations, business operations, information dissemination, and user acquisition. Entrance and exit control areas such as access control, visitors and parking are applications that are not frequently used by users but are closely related. As long as the optimized and reasonable solutions are adopted, the front-end devices with fast speed and stable performance are identified, and a complete information processing mechanism is established, the WeChat public number can fully meet the application requirements.
WeChat occupies the majority of users' mobile phone usage time in China, and users are very sticky. The access control, visitor, and parking applications based on the WeChat public number can be uniformly planned into "human and vehicle intelligence" management. Users only need to focus on activation to get services, no need to download programs, no installation, and excellent user experience.
The development of a mature WeChat public number car smart products, its R & D focus is the logic of various business processes, data flow, data security, user interaction, etc., do not need to spend time planning cross-platform compatibility, without considering the promotion, installation difficulty and other issues .
In contrast, APP is mainly for application scenarios with complex processes and frequent user interactions. To develop a stable and reliable APP, it is necessary not only to solve the compatibility issues between the Android and iOS platforms, but also to consider many difficulties such as APP promotion and security loopholes. The R&D personnel investment, time cost, and maintenance cost are much higher than the WeChat public number. In addition, in the current situation that a large number of mature social APPs and video entertainment APPs have occupied the time and space of users' smartphones, a low-frequency application access control APP is required to obtain a large number of users. Ultimately, it is difficult and inefficient to master the data entry. .
(2) Comparison of development prospects
The current technical limitations of WeChat Persons' Smart Public Number are mainly reflected in the lack of some device sensor call interfaces. For example, the current WeChat public number cannot call the Bluetooth interface well, making the Bluetooth 4.0 technology available only for APP applications.
However, with the continuous development of the WeChat platform, such as the recent launch of the "small program" service, the WeChat person car wisdom will gain more powerful features and a better user experience. Regarding the direction of product development, it is also prudent and feasible for solutions that focus on identification technology and user experience to be successfully verified and used on the WeChat public account before moving to APP.
Unless it is a special request of the user or a professional application that is biased towards supervision, the application prospect of APP in access control management is very limited.
5. Summary
In summary, under the “Internet” environment, the emergence of a large number of innovative technologies will change the competitive landscape of China's access control management industry in a large scale, and both the newcompetitors and the traditional vendors and integrators will face enormous opportunities. And challenges.
Standing at the crossroads of technology and humanities, we must strengthen the spirit of craftsmanship, strengthen product stability and reliability, and fully meet the changes of the times, respond to user needs, and concern user experience in order to ultimately win the market and the future.
Hubungi Kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk popular
You may also like
Related Categories

E-mel kepada pembekal ini

Subjek:
E-mel:
Mesej:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kita

Siasatan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Menghantar