An application example of the remote guarding access control system in a bank in Zhaoqing City

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

At present, various independent and single security subsystems can no longer meet the requirements of high-risk security places such as banks. This project mainly integrates three security subsystems: vault access control system, closed-circuit monitoring system, and anti-theft alarm system, through the organic combination of the three , Complement each other, so as to achieve the maximum safety guarantee of the vault door.

The fast-growing banking business needs a stable security system to protect it. Therefore, it puts forward higher and more urgent requirements for preventing financial risks and eliminating blind spots in the management of huge funds. In recent years, banks in the same industry have invested more money in security protection systems year by year, and crimes in bank vaults still occur from time to time. Combining the actual situation of a bank vault in Zhaoqing City and the current technological development trend, we will pay close attention to four points from the root cause:

1. While ensuring protection against the outside world, it also takes into account the inside protection. For example, the case of the theft of a huge sum of money in the treasury of the Agricultural Bank of Handan, Hebei, is a typical insider theft.

2. Improve the technical defense system, not rely solely on passive defense systems such as closed-circuit monitoring and intrusion alarms, but emphasize proactive defense in advance.

3. Eliminate the disadvantages of independent security subsystems and lack of response, and carry out necessary system integration to create a complete overall security system.

Fourth, implement the security management system, closely combine technical defense, civil defense, and physical defense, so that the security system is no longer a display.

This article would like to take a bank vault in Zhaoqing City as an example to introduce to you the application examples of the remote security access control system in the bank.

demand analysis

Functional Requirements

Each vault fingerprint access control system can be operated offline and independently, or networked. It is required that fingerprints can be issued uniformly in the networked monitoring center, or fingerprints can be issued on the fingerprint meter of each branch, but the central console can manage all users Permissions, and users can be added, reduced or modified. The normal state of the system is networked operation, and the operation modes are divided into the following three types:

1. When the ordinary warehouse manager presses the fingerprint on the fingerprint device in front of the warehouse door, the central console can receive the application for opening the door (the delay is less than 3 seconds). Press the fingerprint in front of the warehouse door to apply for the photo, name, department and other identity information of the person who opens the door. After the duty staff checks that they are correct, click to confirm or press their fingerprint on the fingerprint reader, and the access door will open; if the duty staff finds an abnormality , Click Cancel, and the application for opening the door will be cancelled.

2. If the network is interrupted unexpectedly, the access door can be opened after two persons are authorized to press their fingerprints one after another (with an interval of 5-8 seconds).

3. Privileged users can directly press their fingerprints at any time to open the door.

System networking and safety management requirements

The system requires a remote monitoring function and needs to connect related equipment through Ethernet to centrally manage the fingerprint access control systems distributed in various business outlets. Personnel entering the branch must verify their fingerprints on the fingerprint access control system; the remote network monitoring center sets up a central console, configures a computer, and installs fingerprint access control management software on the computer to remotely monitor and manage the fingerprint access control system of each branch; The computer of the central console is equipped with a fingerprint reader. After the fingerprint is verified by the device, the fingerprint access control management software can be logged in, and the fingerprint data of the users of each branch can be registered and managed; the central console and the fingerprint access control system of each branch pass the original bank’s The network equipment is connected to the entire Ethernet network.

solution

This project is mainly designed for the remote security and access control system of a bank’s vault in Zhaoqing City. A bank in Zhaoqing City is a prefecture-level city branch. There are 16 county-level and township-level sub-branch vaults that need to be controlled. They are distributed in a wide range. The bank’s dedicated LAN is under the control of the Zhaoqing Center’s depot.

Each branch has two vault doors that need to be controlled, which are distributed in each county or township sub-branch. There are three doors to enter the vault. Two of the outer vault doors are steel anti-theft doors, each with a 500 kg heavy magnetic lock, while retaining the original mechanical lock. The vault inner door is a vault special door, and a special vault door is used. Lock.

The outer doors of the two vaults both use double fingerprints to enter the door, push the button to exit the door, and install a video intercom inside the door to assist the verification personnel and view the external situation. The first door is opened by local dual fingerprint verification, and the second door is opened by local fingerprint + central remote confirmation. The first door is opened in association with the second door area. The second door can only be opened when entering the first door area legally. . Local dual-fingerprint verification can be opened by two fingerprints of a main library and a secondary library; the central remote storage confirmation method, after a main library and a secondary library press their fingerprints respectively, the central remote storage The computer software displayed the personnel information (names, photos, etc.) of the two fingerprint users, and at the same time a pop-up window was requested to open the door. After checking by the center, click the confirm button to open the vault door. The door opening request window pops up in the center, accompanied by a voice prompt, reminding the remote guards to operate through the speaker.

Each treasury has multiple main treasury and sub treasury, which belong to different permission groups. Only one main treasury and one sub treasury can meet the opening conditions. The main treasury plus the main treasury or the sub treasury plus the sub treasury do not meet the requirements. Each combination of primary and secondary database sets the fingerprint validity period and time period.

 
System composition

The vault door control system of each county-level or township-level branch consists of an access control controller, two electric locks, two fingerprint machines, a door sensor, two exit buttons, a set of professional access control power supplies, and a network converter. The vault access controller is installed inside the vault, the fingerprint machine is installed outside the door, the exit button is installed inside the door, instead of the traditional key to open the door, the electric lock is installed on the outer door of the vault.

The central branch is mainly composed of remote access control software, SQL2000 database, and computers.
Vault access controller: configure a vault access controller;
Fingerprint machine: configure two fingerprint machines;
Electric lock: equipped with two 500 kg magnetic locks;
Power supply: one professional access control power supply (6A dual output) and one 12V/7Ah battery;
Door opening button: configure two door opening buttons;
Network converter: Configure a RS485 to TCP/IP network converter.

Vault Access Controller

The treasury access controller is the core equipment of the system, and its performance directly affects the stability of the system and even the safety of the entire system. The vault access controller can be connected to two fingerprint machines and control two electric locks. The storage chip uses a non-volatile flash memory chip, which can store 30,000 records, and the data will never be lost after a power failure. With anti-crash dongle circuit, self-check circuit and real-time clock circuit design, all input ports are optically isolated, and all relay outputs have instantaneous overvoltage protection, which enhances the stability and real-time performance of the controller. Industrial-grade design, can run continuously 24 hours a day. The controller has two connection modes: RS232 and RS485, plus accessories can be directly used in the WAN to facilitate remote control and management.

Multi-feedback power supply protection circuit design, three-level lightning and surge protection circuit design, and practical functions such as heavy load relay output design ensure the safety and stability of the controller and its system.

Fingerprint machine

The smart fingerprint device is based on biotechnology and can be independently applied to access control equipment. Covers fingerprint registration, comparison, security control, fingerprint data storage, online communication and other functions. The smart fingerprint device communicates in Wiegand mode, which can be easily connected to the smart access control system, replacing the proximity card (password) reader of the original system, and independently complete various fingerprint processing functions, and then verify the fingerprint successfully. The ID number (personal identification number) is sent to the access controller for processing by Wiegand signal. The operation of the smart fingerprint device is simple. You only need to place your finger gently on the surface of the fingerprint device to determine whether the user is legal or not according to the authorized fingerprint template. The entire processing process takes less than one second. It can be perfectly applied to treasury, financial system, postal system, museum and other places.

Treasury remote storage software

The vault remote access control software is a remote vault access control management software dedicated to banks. Its main function is to provide a series of programming, communication, management and control operations for the vault access controller. The backend supports large professional database SQL2000, which is stable and easy to use.
The remote storage center management software is a multi-level management, supports custom levels and level permissions, each level permissions can be refined to each sub-menu, all administrators are divided into different user levels according to the actual situation, each person uses Different user names and passwords log in to the software and have different permissions. According to the actual situation of a bank in Zhaoqing City, we have three levels of authority (the bank can customize, modify and add): the first level is the system administrator, who can operate all the function menus for system maintenance; the second level is the super management The administrator can operate most of the function menus, including modifying fingerprint user permissions, etc., but does not directly control and confirm the opening and closing of the vault door, and is authorized to be used by the leader of the bank security department; the third level is the administrator, who is only responsible for remote real-time monitoring to confirm whether the vault is open or not. door. In this way, the decentralization of power is realized, and the possibility of collusion and internal theft is effectively reduced.
The remote guarding access control system adopts C/S structure, installing SQL database on the central computer server, and installing the server-side vault access control management software to confirm the operation of opening and closing the vault door, and the computer led by the bank security department installs the client vault access control management software to open the door Modification and management of permissions, fingerprint validity period, time period settings, etc.

System flow

Each county-level treasury controller in the bank is connected to control the fingerprint machine, electric lock, and door opening button of the local treasury. All county-level treasury controllers are respectively connected to the central server through TCP/IP, and are controlled by the center’s remote treasury software.
Each vault has 3 doors, the first two doors are controlled by the access control system, and the third door is locked by the vault special door. The first door is opened with dual fingerprint verification, and the second door is opened with local fingerprint + central remote confirmation. The first door is opened in association with the second door area. The second door can only be opened when the first door area is legally entered. All operation records and login information will be recorded in the computer in real time.
When a bank staff member is duressed at the door of the vault, the duressed staff can use the duress fingerprint to open the vault door, and the alarm signal at this time has been sent to the police duty room, and the sirens in the control room remind the duty officer to take action Corresponding measures (or warning lights flashing), and the alarm information is also transmitted to the 110 alarm center through the 110 dialer, and these linkage actions are quietly proceeding. During non-working hours, the final opening of the door is confirmed by the remote depot. When the fingerprint is used, both the remote center and the local will alarm at the first time and the remote depot will decide whether to open the treasury door.

Features

Remote guard

A certain bank system in Zhaoqing City uses a combination of remote defensive and local defensive.

Local storage mode: a main library and a secondary library verify fingerprints on the fingerprint machine at the door one after another. After both fingerprints are verified within the specified time, the fingerprint data is instantly transmitted to the controller, and the controller can determine that it is legal. The electric lock is driven to open, and the relevant personnel enter the vault.

Remote storage mode: A main library and a secondary library verify the fingerprints on the fingerprint machine at the door one after another. After both fingerprints are verified within the specified time, the fingerprint data is instantly transmitted to the controller, and the controller judges that it is legal through the network The management software transmitted to the remote Vault Center pops up a window and fingerprint information for a vault requesting to open the door. At the same time, the computer sends out a sound to remind the remote keeper to verify and confirm. The remote keeper can choose to agree to open the door or refuse to open the door according to the actual situation.

Fingerprint verification

Fingerprint verification uses a fingerprint machine for fingerprint collection and identity verification of personnel, using advanced semiconductor technology. Provide fingerprint verification, password verification, and fingerprint and password combination verification and other authentication methods. With LCD liquid crystal display screen, display the time, prompt the user whether the operation is successful, and display the operation menu for the system administrator.
Multi-user associated verification: In order to improve the security of the system, the system can set up multiple simultaneous combined verifications as needed, that is, user-associated verification. Only all associated users can pass the verification successfully.
Multi-finger association verification: Each user can register several fingers, and at the same time can set a combination of multiple fingers to verify, that is, finger-association verification. Only when all the associated fingers are successfully verified can they pass.

Alarm function

The treasury is a place for high-risk prevention. In addition to the high-level security control, the treasury access control system must also have a variety of alarm methods to provide response to on-site emergencies.
1. System protection alarm, malicious use alarm: when five consecutive use of illegal fingerprints, the fingerprint machine will give an alarm to prevent malicious use of the fingerprint machine; illegal door opening alarm: the door is opened without legal identity verification, or the alarm generated by violent intrusion to open the door ; Door open overtime alarm: the alarm is generated when the door is opened for more than the specified time and is not closed.
2. Duress alarm: The system can set an alarm finger. Use the alarm finger for identity verification. When the door is opened, the system will automatically send an alarm signal secretly, effectively protecting the lives of employees.
3. Emergency alarm: When encountering an unexpected emergency, the staff can use the alarm finger, foot switch or alarm button to trigger the system alarm.
4. Alarm method: The system can provide multiple alarm methods according to the addition of different auxiliary equipment: local sound and light alarm, remote warehouse center alarm, 110 network alarm, telephone dial alarm, GSM SMS alarm, and other system linkage alarms.
5. Multi-level management authority: The system provides multi-level user authority management to ensure the effective and legal use of authorization. The system is generally divided into three management levels: system administrator, super administrator, and administrator. Banks can customize the addition and modification of permissions without modifying the software. The most senior system administrator shall be appointed by the Security Department.
6. Information update: The vault remote access control system provides flexible information update functions. When the user personnel are adjusted, the administrators with different authority input fingerprint verification and pass the fingerprint input, delete and other information update. It is even possible to remotely manage the fingerprint user permissions, validity period and time period of each fingerprint machine through the network through the fingerprint management software.
7. Door opening record: The system automatically records card swiping records, door opening records, alarm records, system logs and other information for verification.
8. Emergency opening measures: The design of the vault access control system of a bank in Zhaoqing fully guarantees the reliability and long-term working stability. At the same time, it also designed and provided a complete emergency mechanism to ensure the overall integrity of the program to ensure the high reliability of the system.
Fingerprint machine failure: When the fingerprint verification part fails, the main manifestation is that the fingerprint is not recognized, so the staff cannot enter the vault by entering the fingerprint to verify their identity. Therefore, the main method of providing remote security center computer control solutions is to directly open the vault door through the remote security center computer software.
Network failure: When the network fails, the remote vault access control software cannot connect to the vault access controllers in various places, and the remote vault cannot confirm the opening operation, use the local laptop with special control software to connect to the system, and open the vault through the software Door, the system will automatically form a record of opening the door. The computer is generally strictly kept by the local governor or security department leader, and only used under special circumstances.
Controller failure: When the controller fails, its manifestation is that it does not accept the signal of the fingerprint machine; the other is that it does not drive the electric control lock to unlock the state, which leads to the inability to open the vault door.
Since this system uses a magnetic lock that is opened when the power is off, the magnetic lock will automatically release the locked state when the power is not supplied. In case the controller itself fails, the door is usually opened by directly forcibly disconnecting the electric lock.

system integration

At present, various independent and single security subsystems can no longer meet the requirements of high-risk security places such as banks. This project mainly integrates three security subsystems: vault access control system, closed-circuit monitoring system, and anti-theft alarm system, through the organic combination of the three , Complement each other, so as to achieve the maximum safety guarantee of the vault door. Among them, the treasury access control system is the main, and the other two systems are supplemented to carry out system integration development.
The vault access control system mainly controls the two anti-theft doors of the outer vault, and the vault access control system is transmitted to the remote monitoring center through a software interface. As long as someone performs fingerprint verification, the closed-circuit monitoring software in the remote monitoring center will instantly pop up a video window, and automatically call up the user’s photos stored in the database for comparison. Legality, and video recording at the host and center of the bank vault at the same time. The verification method adopts the dual-fingerprint authentication method. After the authentication is passed, it is determined whether the branch center needs manual authorization according to the time period.
After the branch personnel have passed the dual fingerprint authentication, the system automatically requests the center for authorization. After the center confirms that it is correct through the monitoring images transmitted in real time, within a set time, it will issue an unlocking instruction so that the vault door can be opened and the infrared detectors are disarmed. If the authorization expires, you need to perform dual fingerprint authentication again. Only the super administrator of the center has the right to set whether the time period authorized by the center is required, and the local branch personnel have no right to change the time period for which the access control requires authentication. After the personnel are out of the warehouse, the system will automatically arm the external warehouse, and voice prompts to the center staff on duty. The branch personnel have already left the warehouse. Please verify the branch defense status.

  
System advantages


1. Adopt the principle of proactive prevention beforehand to break through the old model of the security system. Judging from the case of the treasury theft of the Agricultural Bank of China in Handan, Hebei, it is mainly the result of imperfect technical defense facilities and the failure to effectively integrate the all-round prevention system before and after the event. At present, banks generally believe that their closed-circuit monitoring facilities are advanced and have a lot of capital investment. However, closed-circuit monitoring is a post-incident verification system after all and cannot prevent personnel from committing crimes. The intrusion alarm system is an in-event prevention system, which often triggers the alarm after a criminal act occurs. Agile criminals still have time to quickly escape the scene. The vault access control system of a bank in Zhaoqing City uses advanced multi-fingerprint verification + remote guarding to prevent internal and external theft.
2. The central remote guard warehouse effectively prevents the occurrence of inside and outside theft. As a pre-prevention device, the vault access control system of a bank in Zhaoqing City can verify fingerprints through a variety of combinations, as well as remote center verification to confirm the door opening method. The fingerprints of multiple associated local vault administrators are quickly transferred to the remote via the network via the system The computer software of the Vault Center and the dedicated vault access control software screen will instantly pop up a prompt box to confirm opening the door, accompanied by a voice prompt. The full-time management staff of the center can open the door after clicking on the confirmation, thereby effectively preventing inside and outside theft. occur.
3. The front end adopts a fingerprint machine with more advanced semiconductor technology than optics to ensure the uniqueness of identity verification. Utilizing the uniqueness and immutability of human fingerprints, and using human fingerprints as a means of identification, it has high accuracy. Since the fingerprint of the human body is inseparable from the human body, compared with other identification tools, such as ID cards, IC cards, passwords, keys, etc., fingerprints have the advantages of being unable to forge, no need to remember, not to be stolen, deciphered, and not to be lost. It truly realizes uniqueness in identity authentication and is the best means of identity authentication.
4. Use powerful remote vault control software for vaults. The remote access control system management software of a bank vault in Zhaoqing City adopts an advanced C/S structure, which can realize flexible control and management of the server and multiple clients through the network. In addition, custom multi-level management can be realized, and the authority division can even be refined to the sub-menus of each level. In this way, each different user name and password realizes different management authority, the interface seen after logging in to the system and the achievable operations They are not the same, especially suitable for the bank’s multi-level management and mutual restriction.
The management software is based on professional large-scale database SQL, which is stable and reliable. And the openness is good, and it is easy for other security subsystems to develop integrated interfaces, forming an all-round comprehensive security system.

Concluding remarks


Although the current vault access control management methods of major banks are not consistent, the remote vault system solution for a certain bank in Zhaoqing that has been successfully operated is widely representative and typical. It is hereby shared with the majority of bank users for implementation. The transformation of the vault access control system provides a valuable reference.

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare