Teshou Technology South Korea imported fingerprint access control and attendance system
[ad_1]
Chapter One Company Profile
Teshou Technology (Shenzhen) Co., Ltd. was established in 2001. It is a group company specializing in biometric system development, global sales, system services, engineering planning, program formulation, and project construction. The company is headquartered in the United States and has offices in Shenzhen and Beijing. There are branches. The main business of the group is biometric products: fingerprint lock, fingerprint module, Suprema fingerprint machine, Ingersoll Rand face shape meter, three-dimensional face shape recognition meter, access control system accessories and other products sales and services. Teshou Technology is a strategic partner in China for the technology development and system sales of South Korean Suprema’s fingerprint identification project. The Ingersoll-Rand hand shaper and Canadian Bioscrypt three-dimensional face shaper (formerly A4VISION), which are represented by Special Guard Technology, are widely used in prisons, finance, government agencies, enterprises, construction and other industries.
Teshou Technology (Shenzhen) Co., Ltd. has excellent localized technical developers, dedicated and responsible sales team, experienced construction team, scientific management methods and concepts, and has always adhered to the professional, standardized and enterprising tenet.
Chapter 2 Overview of System Projects
The fingerprint machine is a more reliable high-tech biometric product that replaces the traditional access control system. It has the advantages of fast, simple and flexible. Confirm the user’s identity by identifying the unique fingerprint characteristics of the user to ensure that only authorized personnel can enter a specific area. As a substitute for magnetic cards and key access control systems, fingerprint machines enable users to save the cost of using and managing cards or keys. The fingerprint machine can also be used in combination with other access control systems to enhance security and convenience. The fingerprint machine has been widely used worldwide and is a proven and reliable biometric system. Fingerprint recognition technology is used in prison, finance, insurance, securities and other industries due to its high security. The security and convenience of the system have been extensively verified. The identity of the user is identified based on the biological characteristics of the human body, ensuring safety and convenience ,fair and just.
Fingerprint recognition is the most widely used identification technology in biometrics. Fingerprint recognition technology combined with computer technology, network communication technology, and automatic control technology is the most effective measure to realize identity recognition. For example, the system can be used with a non-contact IC card system as a means of identifying the identity of entrance and exit personnel to strengthen the security of the prevention area. At the same time, it is more convenient for users to use. In this project, we have adopted multiple sets of mature security management technologies to realize the project’s special requirements for personnel access security management (namely, access control management).
Chapter 3 Basis of Scheme Design
The design standards and specifications involved in the system design mainly include:
“Intelligent Building Design Standard” (GB/T50314-2000)
“Code for Electrical Design of Civil Buildings” (JGJ/T16-92)
“Code for Design of Communication Grounding in Industrial Enterprises” (GBJ79-1985)
“Code for Construction and Acceptance of Cable Lines of Electrical Installation Engineering” (GB50168-92)
“Safety Protection Engineering Procedures and Requirements” (GA/T75-94)
“Graphical Symbols Applicable to Security System” (GA/74-94)
“Code for Low Voltage Power Distribution Design” (GB50054-95)
“Code for Lightning Protection Design of Buildings” (GB50057-2904)
“Commercial Building Cable Standard” (EIA/TIA-569)
Chapter 4 System Requirements Analysis
Teshou Technology’s fingerprint access control and attendance system is divided into two parts: access control and attendance. According to the current actual situation and your system requirements, the summary is as follows:
4.1, access control system requirements
(1) Each office has one access control point.
(2) South Korean fingerprint machines, of which one is used for access control and the other is used for attendance. Each fingerprint machine used for access control is equipped with an access controller, the PC is equipped with a converter, and an access control management software; IC card (optional).
(3) Whether the system adopts the hybrid networking mode of smart card and fingerprint biometric identification, smart card identification access control point, fingerprint identification access control point.
(4) One one-way access control (swipe in, button out) points; two two-way access control (swipe in, swipe out) points.
4.2. Attendance system requirements
(5) There are a total of places for fingerprint attendance, and a total of places for credit card attendance.
(6) It is required to be able to swipe the card to check attendance normally after a power failure.
(7) Use TCP/IP communication method.
Chapter 5 System Design
After analyzing the actual situation on site and carefully studying the engineering drawings, we made the following access control system design:
5.1 Fingerprint machine connection method
1) The fingerprint machine (BioStation) is directly connected to the local area network through the TCP/IP interface to form a network, and then the fingerprint machine can be managed through the access control time and attendance software.
2) The fingerprint machine (BioStation) can be easily connected to the control system of the electric door through the built-in relay and Wiegand interface;
5.2 Main engineering network diagram (BioStation)
Figure 5.1 Schematic diagram of fingerprint machine networking
We have designed a fingerprint machine to achieve dual-verification access control management. Install an integrated IC card fingerprint machine at a distance of 1 meter from these gates; collect fingerprint data for personnel who have the right to enter and exit these gates. While collecting fingerprint data, enter the basic information of employees; employees who work in the above locations, Leaders can adopt various methods such as card reading, fingerprint or fingerprint + card reading to realize identity confirmation, entry and exit points. For the convenience of leaders, we can set the door of the leader’s office to directly verify the fingerprint, without the need to read the card.
In order to facilitate the use of users and strengthen safety and security, we have set up the entire access control system to work in various ways according to needs:
1. Card reader + fingerprint machine dual verification mode:
as the picture shows:
Figure 5.2 IC card, fingerprint dual verification access control system workflow
In the verification mode of card + fingerprint recognition, after the employee reads his IC card in the card reader, the system judges the card authority. If it is a valid card and within the valid pass time period, the employee enters the fingerprint in front of the fingerprint access control attendance machine again After confirming the identity, the system determines that it is the same person as the IC card holder, and then opens the door to let it go. If it is not the same person, the door will not be opened. At the same time, the system will automatically alarm through the sound and light alarm and activate the closed-circuit monitoring of the location in parallel. The camera will automatically record and track the person.
2. Individual fingerprint authentication mode:
The employee enters the fingerprint in front of the fingerprint machine, and the system confirms whether the employee has permission to enter the room and within the valid time period. If there is permission to enter, the door will be opened and let go. If there is no permission to enter or not within the valid time period, it will not Open the door, at the same time the system will automatically alarm through the sound and light alarm, and the closed-circuit surveillance camera at this position will automatically record and track the person in parallel.
Features of Fingerprint Access Control Time Attendance System
1), more convenient and more scientific
Compared with the traditional access control and attendance system, the fingerprint recognition system does not need to carry cards, keys, etc., and is more convenient to use. At the same time, fingerprint attendance is unique, irreplaceable, and irreplaceable, making the access control attendance on-site, and other people cannot replace the unattended employees, making the access control attendance more scientific, strengthening the security of the access control system, and saving enterprise labor costs .
2), easy to integrate
The fingerprint machine can be conveniently used together with the card access control system, so as to seamlessly integrate the truly safe and convenient biometric technology with the existing or new system. The ID code can be input by pressing the key or reading the card through the card reader port. The card reader connection supports inductive, Wiegand, magnetic stripe, and bar code readers.
The fingerprint machine can communicate with the access control system in a variety of ways, and provides a card reader emulation output mode that supports Wiegand format and is compatible with standard access control systems. In addition, it supports TCP/IP, RS422, RS485 and RS232 communication interfaces to communicate with the access control system or other face shape instruments.
3) Automatic management of fingerprint data
When multiple fingerprint machines are connected via TCP/IP, the built-in template management system of the system will transmit the fingerprint data to other fingerprint machines in the network, so users do not need to log in again when using other fingerprint machines after logging in on a single fingerprint machine . Managers can also simply log in to a single fingerprint machine in the system to add and delete personnel.
4), advanced communication methods
The TCP/IP interface that comes with the fingerprint machine can be easily connected to the enterprise’s local area network system. It also has the most common 485 communication method in the access control system, and can be compatible with existing network resources. The system has high stability, security and operability. sex.
5), can work offline
The fingerprint machine can be used offline. When the attendance data needs to be managed, it is only necessary to connect to the management host to download the attendance data. The fingerprint machine can be used normally when the network is connected or disconnected, and the shutdown or crash of the management system does not affect the use of the terminal.
6), the processing function is more powerful, faster, and more fingerprint storage
The recognition speed of the fingerprint machine is fast, less than 1 second;
Capacity up to 50,000 users
7) Provide WIEGAND26 output, wide application
The fingerprint verification result is output to a professional access control controller through WIEGAND 26, which is suitable for occasions where there are fingerprint access control and IC card access control, but you do not want to use two sets of management systems.
Chapter VI Access Control Time Attendance Management System
The purpose of TOSOLE access control attendance management system is to provide convenient, fast and modern management for the unit’s attendance, improve efficiency and save labor costs. The access control time and attendance system is responsible for the statistical work of employees’ commuting and attendance; the use of the access control time and attendance management system can realize the process of staff access management, attendance data collection, information query and attendance statistics process automation, improve the modernization of personnel management, and replace the previous manual card signing and clocking , It is convenient for management staff to make statistics and assess the attendance rate of various departments, and accurately grasp the attendance of employees. For this project, it is only necessary to add attendance management software to the existing access control system, without additional equipment, to realize the attendance function; after employees enter the company through card reading and fingerprint entry, attendance data is automatically collected, and the system automatically Process relevant attendance data and generate reports.
[ad_2]