Frp Pipe,Grp Pipe,Frp Tube,Grp Pipe Fittings Hebei Chunfeng International Trade Co., Ltd , https://www.chunfengenergy.com
Discussion on Biometric Identification Access Control System>
In recent years, with the continuous development of biometrics, the application of biometrics in access control systems has gradually become mainstream. The biometric access control system is an access control system that recognizes human biometrics, including face recognition, fingerprint recognition, iris recognition, palmprint recognition, finger vein recognition, and voiceprint recognition.
1. Fingerprint identification access control system
The hardware of the fingerprint access control system is mainly composed of a microprocessor, a fingerprint recognition module, a liquid crystal display module, a keyboard, a clock/calendar chip, an electric lock and a power supply. The microprocessor acts as the host computer of the system and controls the entire system. The fingerprint identification module mainly performs functions such as collection, comparison, storage, and deletion of fingerprint features. The liquid crystal display module is used to display information such as door opening record, real time clock and operation prompts, and the keyboard constitutes a human machine world.
The fingerprint reading device (collector) uses the photoelectric technology or the capacitor technology to collect the fingerprint information, and then performs feature extraction and compares with the stored feature information to complete the identification process. This process is all done in the reading device, or the reading device only performs fingerprint acquisition and then transmits it to a background device (such as a PC) to perform feature extraction and recognition. The device for separately performing fingerprint collection is easy to be miniaturized, convenient to use, and the system recognition speed is also fast. Fingerprint feature collection requires that the human finger establishes a prescribed relationship with the collector during operation. Therefore, the system friendliness is slightly poor.
Biostatistics show that fingerprints are highly exclusive, and the probability of the same fingerprint appearing between people is very low. Because of the high safety, there is still the risk of being copied. Therefore, there is a product with a living fingerprint collection function, mainly to increase the detection of temperature, elasticity, and microvessels to confirm the authenticity of the collected finger. In addition to fingerprint identification, the security requirements of the access control system should also add other means of identification, such as passwords, to improve the security of the system.
2. Palmprint recognition access control system
The palmprint contains a wealth of information, and the palm line features, point features, texture features, and geometric features can completely determine a person's identity. The basis of palmprint recognition technology is palm geometry recognition. The geometric recognition of the palm is identified by the physical characteristics of the palm of the user and the fingers of the finder, and advanced products can also recognize three-dimensional images.
Palm geometry recognition is more convenient to use. It is suitable for scenes with a large number of users or easy to accept, and the accuracy is very high. Within 3 seconds, the user's identity is confirmed by detecting the three-dimensional features such as the size, shape, and surface area of ​​the user's palm to ensure that only authorized personnel are identified to ensure that only authorized personnel can enter a particular area. To achieve the purpose of access control. As an alternative to RF card access control systems, the palm-grain access control system saves users the cost of using and managing cards, and can be combined with other access control systems to increase security. Compared with the fingerprint recognition system, the palm-shaped recognition system has dirt and scars that do not affect the measurement, and the hand is easily placed in the correct position of the scanner, etc., and the user can easily accept it.
3.Iris recognition access control system
The iris recognition access control system determines the identity of people by comparing the similarities between iris image features and determines whether to open the door lock. The process of iris recognition technology generally involves four steps: one is to use the specific camera equipment to shoot the human eye, obtain the iris image and transmit it to the image preprocessing software of the iris recognition system. The second is to position the iris, determine the position of the inner circle, the outer circle and the quadratic curve in the image; adjust the size of the iris in the image to the system setting parameters to normalize and enhance the image. The third is to take a specific algorithm to extract and encode the feature points needed for iris recognition from the iris image. The fourth is to match the feature code extracted by the feature with the iris image feature code in the database one by one to determine whether it is the same iris, so as to achieve the purpose of identity recognition. The iris recognition access control system does not require physical contact, and the false recognition rate is low and the reliability is high. However, it is difficult to miniaturize the front-end equipment and the cost is high, and it is difficult to promote it in a large scale.
4. Face recognition access control system
Compared with other recognition technologies, face recognition technology has unique advantages in the application process, such as it is more convenient in the process of image information collection, and gradually becomes the most direct and natural one in biometrics technology. It has become the current artificial intelligence. And the focus of pattern recognition is also widely used in access control systems.
The face recognition access control system collects face information of all persons who are allowed to access the access control system and stores them in the face database. When an individual accesses the access control system, the face recognition access control system first obtains the portrait information through the camera, and then inputs the collected portrait information into the computer, and then performs face recognition. The process system preprocesses the visitor's portrait information to avoid the influence of expression, illumination and input device on the result, extracts the pre-processed portrait, and identifies and contrasts the extracted information with the face information in the database. And record the results of the identification. Once the face information that can be successfully compared is identified in the database, the access control system receives the computer's door open command, and realizes the operation that allows the visitor to enter through the hardware part of the access control system; otherwise, the computer does not issue an instruction to open the door, the access control The system will not open, and the visitor's face information will be recorded for future query and supervision.
Because the face recognition access control system can identify and record faces remotely, quickly and without contact, in the conditional buildings and communities, the access control system can be connected to the blacklist database or the database of the organization and real-time comparison, and suspiciously discovered in time. Personnel and automatic warning to achieve intelligent security management.
5. Two-dimensional code access control system
The two-dimensional code access control system is an access control system that is controlled and managed by two-dimensional code, integrating wechat, cloud service, two-dimensional code recognition, and entrance and exit management. The user can send control commands to the access control system through the shou machine, realize two-dimensional code opening, remote control to open the door, authorization management, send invitation codes to specific personnel, switch door record query, system log query and other functions. Users can implement the operation through the public number or the wechat applet. After the normal user is successfully registered, after passing the administrator's approval, the access rights represented by the generated QR code can be used. Advanced users or administrators can review new users who apply, choose to reject, pass, and so on. The user can scan the two-dimensional code of the entrance and exit through the wechat, open the access control, fill in the invitee information, set the effective time of the two-dimensional code, and send the generated two-dimensional code to the invitee through wechat. . Scan the QR code on the access controller at the specified effective time to open the corresponding door lock and pass.
The feature of the two-dimensional code access control system is that it can directly connect to the public number interface or small program in the cloud architecture server and database, and customize the service platform to assign an encrypted two-dimensional code to each user in real time by using the dynamic variable two-dimensional code method. The QR code refresh time can be set. After the scan, the QR code is refreshed immediately to prevent deliberate copying and copying. By using the wechat or web link cloud server, the administrator or advanced user can remotely open the door through the shou machine; The access rights of the specified entrances and exits can be obtained in advance; the administrator can log in directly to the background management system through the webpage to manage the project, and can realize the functions of project authorization, user review, event query, etc., and view and manage the application and entry records of the visitors at any time and place; . Given the real name system and mobile payment and bank account binding. There is no possibility of borrowing from the shou machine. Basically, the binding number can be determined to ensure the identity of the person.