In recent years, with the continuous development and maturity of biometric identification technology, the application of biometric identification technology in access control systems has gradually become mainstream. The biometric identification access control system is an access control system that uses human biometrics as recognition conditions, and mainly includes face recognition, fingerprint recognition, iris recognition, palm print recognition, finger vein recognition, voiceprint recognition, and the like.
1. Fingerprint identification access control system
The hardware of fingerprint access control system is mainly composed of microprocessor, fingerprint identification module, LCD display module, keyboard, clock / calendar chip, electric control lock and power supply. The microprocessor acts as the upper computer of the system and controls the entire system. The fingerprint identification module mainly completes the functions of collecting, comparing, storing and deleting fingerprint features. The LCD module is used to display information such as door opening records, real-time clock and operation prompts, and the keyboard? Formed the human-machine world.
Fingerprint reading device (collector) uses photoelectric technology or capacitive technology to collect fingerprint information, and then performs feature extraction and comparison with stored feature information to complete the identification process. This process is all completed in the reading device, or the reading device may only perform fingerprint collection, and then transfer it to a background device (such as a PC) to complete feature extraction and recognition. The device for fingerprint collection alone is easy to miniaturize, convenient to use, and the system recognition speed is also fast. Collecting fingerprint features requires that a human finger establishes a prescribed relationship with the collector during operation. So the system is less friendly.
Biostatistics show that fingerprints have high uniqueness, the probability of the same fingerprints appearing between people is low, and the security is high, but there is still the risk of being copied. Therefore, there are products with the function of collecting fingerprints in vivo, which mainly increase the detection of temperature, elasticity and microvessels to confirm the authenticity of the collection of finger graves. In addition to fingerprint identification, access control systems with security requirements should also add other identification methods, such as passwords, to improve the security of the system.
2. Palmprint recognition access control system
The palm print contains a wealth of information. Using the line features, point features, texture features, and geometric features of the palm print can completely determine a person's identity. Palmprint recognition technology is based on palm geometry recognition. Palm geometry recognition is performed by measuring the physical characteristics of the palm and fingers of the user. Advanced products can also recognize three-dimensional images.
Palm geometry recognition is more convenient to use. It is suitable for scenarios with a large number of users or easy to accept, with very high accuracy. In less than 1 second, the user's identity is confirmed by detecting the user's unique palm size, shape, surface area and other three-dimensional features to ensure that only authorized personnel are identified and that only authorized personnel can enter specific areas To achieve the purpose of access control. As an alternative to the RF card access control system, the palmprint access control system allows users to save the cost of using and managing the card, and can also be used in combination with other access control systems to increase security. Compared with the fingerprint recognition system, the palm shape recognition system has dirt and scars that do not affect the measurement, and the hands are easy to put into the correct position of the scanner, etc., which is easy for users to accept.
3. Iris recognition access control system
Iris recognition access control system is to determine the identity of people and determine whether to unlock the door by comparing the similarity between the iris image features. The process of iris recognition technology generally includes four steps: one is to use specific camera equipment to shoot the human eye, obtain the iris image and transmit it to the image preprocessing software of the iris recognition system. The second is to locate the iris, determine the position of the inner circle, the outer circle, and the quadratic curve in the image; adjust the size of the iris in the image to the system setting parameters to normalize and enhance the image. The third is to adopt a specific algorithm to extract the feature points needed for iris recognition from the iris image and encode them. The fourth is to match the feature code obtained by feature extraction with the iris image feature code in the database one by one to determine whether it is the same iris, thereby achieving the purpose of identity recognition. The iris recognition access control system does not require physical contact, low misrecognition rate, and high reliability; however, it is difficult to miniaturize the front-end equipment, the cost is high, and it is difficult to promote it on a large scale.
Compared with other recognition technologies, face recognition technology has unique advantages in the application process. For example, it is more convenient in the process of image information collection. It has gradually become the most direct and natural one in biometric recognition technology. It has become the current artificial intelligence. As well as the focus of pattern recognition, it has also been widely used in access control systems.
Face recognition access control system is to collect the face information of all persons who are allowed to access the access control system and store it in the face database. When an individual accesses the access control system, the face recognition access control system first obtains portrait information through a camera, and then inputs the collected portrait information into a computer for face recognition. This process system pre-processes the visitor's portrait information to avoid the effects of expressions, lighting and input devices on the results. The pre-processed portraits are subjected to feature extraction, and the extracted information is identified and compared with the face information in the database. And record the results of the identification. Once the face information that can be compared successfully is identified in the database, the access control system will receive the computer's door open instruction, and the operation of allowing the visitor to enter is realized through the hardware part of the access control system; otherwise, the computer will not issue the door open instruction, and the door The system will not open, and the visitor's face information will be recorded for future query and supervision.
Because the face recognition and access control system can recognize and record human faces from a long distance, quickly, and without contact, in conditional buildings and communities, the access control system can be connected to the blacklist database or the public security agency database and compared in real time to find suspicious people in time. And automatic early warning to achieve smart security management.
5. Two-dimensional code access control system
Two-dimensional code access control system is an access control system controlled and managed by a mobile phone two-dimensional code, integrating WeChat, cloud services, two-dimensional code identification, and entrance management. Users can send control instructions to the access control system via mobile phones to realize two-dimensional code door opening, remote control door opening, authorization management, sending invitation codes to specific personnel, door opening and closing query, system log query and other functions. Users can implement the operation through WeChat public account or WeChat mini program. After the ordinary user is successfully registered, after passing the administrator's approval, they can use the access permissions represented by the generated QR code. Advanced users or administrators can review the new users who apply for it, and choose to reject or pass the review. The user can either scan the QR code at the entrance and exit through WeChat to open the door, or fill in the invitee's information, set the valid time of the QR code, and send the generated QR code to the invitee via WeChat . Scan the QR code on the access controller with the lens within the specified valid time to open the corresponding door lock and pass.
The feature of the two-dimensional code access control system is that it can be directly connected to the WeChat public account interface or a small program on the cloud-based server and database, and a customized service platform; using a dynamically variable two-dimensional code method, each user is assigned an encrypted two-dimensional code in real time. Code, you can set the refresh time of the QR code. After scanning, the QR code is refreshed immediately to prevent deliberate copying and theft. By connecting to the cloud server through WeChat or the webpage, administrators or advanced users can remotely open the door through their mobile phones; external visitors can Obtain the access rights of designated entrances in advance; administrators can log in to the background management system directly through the webpage to carry out management, which can implement functions such as project authorization, user review, and event inquiry, and view and manage visitors' applications and entry and exit records anytime, anywhere; simpler to use . Whereas mobile phone real-name system and mobile payment and bank account binding. There is not much possibility of mobile phone loan, and the mobile phone number can basically be determined to ensure the uniqueness of personnel.
Youtube: Huifan Technology
Linkedin: Huifan Technology
Facebook: Huifan Technology