Industry News

New technology and application of access control system (two)

New technology and application of access control system (two)
The identity authentication technology favored reading
Remember the password keyboard and magnetic card entrance guard, and a lock key is compared with a qualitative leap, but the password is easy to be cracked and magnetic storage
The small space, easy to wear and replication, the safety and reliability of the password keyboard and magnetic card entrance guard is limited. Later
, the contact card, despite its than password and card has been greatly (storage and processing capabilities) progress, but because of its own is not overcome
Service shortcomings (wear a shorter life expectancy, inconvenient use), also eventually become obstacles to the development of its application. At the same time, non - contact type radio frequency clamp
There is no mechanical wear, long service life, high safety, the use of simple, very difficult to copy, therefore become the industry's concern
The new army. From the identification technology, the use of RFID technology is the trend of non-contact card, faster response speed and higher frequency is
The development trend of the future.
The last century 80 to 90 years, the rapid development of computer and optical scanning technology, the fingerprint extraction become reality. Image
By introducing and processing algorithms for fingerprint recognition application, promoting the development and application of biometric access control system.
Research shows that, fingerprint, palmprint, face, iris, retina, bone has uniqueness and stability characteristics of the individual, and the
These general characteristics of life will not change, and can therefore be used these features as discriminant personnel identity basis. Thus based on this
Some of the characteristics of the biological recognition technology. The biological characteristics of the human body, the only reliable, life-long, not lost and can't return
The characteristics, preparation of so, biometric access control systems from the identification of ways based on the safety and reliability of the highest.
At present, the entrance guard system of research and development is mainly non contact inductive and access control system based on biological recognition technology
. Biological recognition technology of fingerprint recognition access control especially in the most widely used. Both induction and biological recognition technology, their support
Technology: radio frequency identification and biological recognition technology are now more mature.
Networking technology to ensure operation
Network access control system is the important factor to ensure the normal operation of the system, the industry generally believe that, double network mode can be more
Good security access control system's stability and reliability. The so-called dual network has two kinds of meanings. One is to ensure the smooth communication using the same
Double network structure forms of communication, such as the double RS485, double TCP/IP interface, the same type of double interface complement each other and mutual switching, by
To improve the stability and reliability of the communication system.
The dual network architecture of another network is TCP/IPRS485, which adopted the RS485 network and TCP/IP mixed mode, is the
Subnet to network RS485 bus, subnet communication is based on Ethernet, this two kinds of network strengths fusion
Together, play a maximum efficiency of two. In general, it refers to the PC terminal and the access controller adopts TCP/IP network
But the subordinate controller, and the card reader is connected by RS485. Overall, the upper TCP/IP, lower RS485, two tier architecture
Is a complementary framework, the advantages of the two kinds of architecture for live fusion, makes the access control system can be a wide range of distribution and information
Speed transmission, and also maintain high performance in the system security and integration.

Integrated linkage technology integrated use
Access control system is how to realize multi system integration linkage? One is the entrance guard system based integrated linkage, the main way
Bias in the gate entrance management. Alarm front end will alarm information back to the management center, and can be used for site by calling the video image
Real time view, the access control system to realize the control of the scene. This kind of linkage, once an incident happens, the alarm event
Linkage of television monitoring DVR and video matrix to react accordingly. For example, a door being unlocked illegally, the system will control matrix diagram
Like a switch to the TV wall and management platform, at the same time, start the DVR video, if the camera with pan tilt, can also control the PTZ rotating to
The preset position.
The two is the system software integration, between each subsystem integration is not only to realize the integration between the hardware, but also realize the software
For integration, the integration depends on a variety of hardware protocol open degree, namely the hardware device is to provide interface protocol
. Only provides (SDK or API function), software can pass the interface to the hardware of the unified management and control, and master the hardware
Working state. Of course, the software should also provide linkage strategy and plan mechanism, at the same time integration system software should also support the classification
Administration.
However, also called for a software module, each kind of hardware to manage it with a module. As the WINDOWS platform, regardless of
How to configure PC machine, can be installed to use it, because of the different hardware, all have the corresponding driver for WINDOWS. The
In order to, security integration should also be gradually realized platform, modularization.
NFC Technology Globalization
Over the past decades, we use a plastic card authentication and other applications of intelligent mobile phone card, but with the popular
To accomplish these applications, users expect in a more convenient way. The emergence of NFC technology to deal with the demands, NFC Technology
Operation can realize the data exchange in the near distance within a few centimeters of, so as to support the NFC mobile phone to realize contactless applications and a variety of
Easy, including payment and bus tickets, key (card), data transmission (including electronic business card) and browse the network data.
At present, the application of NFC technology in electronic payment, but the future of NFC technology will be further integration into the access control solutions, thereby
For the security market has brought new development opportunity. The user only needs to put virtual certificate card configuration to the NFC mobile phone, can open the door.
This not only saves the user carry other access credential trouble, and the security manager can easily monitor the entrance personnel pass.
At the same time, access control system, NFC will create a more safe and convenient trading platform based on. Security manager can not only remote transmission, change
And the cancellation of the virtual credential, and this platform is built based on the standard authentication system, can support a variety of authentication node (including
Card reader, card, equipped with NFC mobile phone etc.) registered as "trusted nodes", to ensure that all can be safely performed anywhere in the world
To configure.