“Smartkey biometric technology and the perfect combination of access control” for bank alarm access control solutions

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

From the stolen of Handan Agricultural Bank’s vault, talk about the application of fingerprint access control of bank vault

As high-end application customers of cutting-edge security technology, financial institutions are increasingly paying attention to the application of biometric technology, especially fingerprint recognition, in bank vaults.

Case playback

At 2 pm on April 14, 2007, 51 million yuan in cash from the treasury of the Agricultural Bank of Handan, Hebei was stolen, and the whole country was shocked. The leaders of the central government successively issued instructions and requested the public security organs to mobilize all the police. A huge sum of 51 million yuan in the vault was stolen, and the Agricultural Bank of China Handan Branch bears the unshirkable responsibility. Six days later, the two suspects were arrested, and the head office of the Agricultural Bank of China notified the handling of the theft case of the Agricultural Bank of Handan.

The case of the theft of the Handan Agricultural Bank’s treasury should be a wake-up call for all banks. How to achieve the safety of the vault? People familiar with the Handan Agricultural Bank believe that there are three fatal details in the supervision of the Agricultural Bank: first, according to normal procedures, three people are required to open the lock of the vault: the master key, the auxiliary key and the password, but the password is leaked; second, the library cannot be checked. Timely and inconscientiously; third, the omissions in the connection between treasury management and security escort.

Problems with vault access control

From the perspective of modern access control security management, the above three problems more or less already exist in my country’s current bank treasury management system.

Open the vault with the main and auxiliary keys and passwords. This traditional access control management system itself has loopholes:

First, the primary and secondary keys are mechanical and there is a possibility of duplication. If the person who has the password obtains these two keys, he can open the vault door at any time;

Second, the password is easy to reveal, and there are inherent security risks. The holder of the password will pass the password to a third party intentionally or unintentionally, and the management personnel will also relax the management of the password because of the two keys of the master and the deputy;

Third, when opening the door and pressing the password, it is easy to be seen by others intentionally or unintentionally, so that the absolute security of the password cannot be ensured (in terms of access control, this is the insecurity caused by the insecurity of the uniqueness of the identity).

Fourth, there is no entry and exit records when opening the vault. With two keys and a security code (no matter how many people), as long as the three physically exist, the vault can be opened without leaving any traces. And there is no need to apply, let alone time zone control (in terms of access control, there is no record of people entering and leaving, resulting in no evidence to check).

Fifth, the traditional treasury management system makes treasury managers and security escorts believe that people are more people, and relax the strict implementation of the treasury management system. They would naively think that as long as they are acquaintances, there will probably not be any problems.

Advantages of fingerprint recognition

The two basic characteristics of fingerprints, “fingerprints remain unchanged for life” and “fingerprints are different” are unique characteristics of fingerprints. “Fingerprint immutability for life” was proposed by the anthropologist Welker in 1856. “Fingerprints are different” was put forward by the British Henry Fulds during his mission in Japan. It was later proved by a professor at the University of Paris, France, by the method of mathematics. The feature of fingerprint is the cornerstone of the entire fingerprint recognition technology, and it is also one of the effective methods and methods for identifying the uniqueness of a person’s identity. Therefore, many manufacturers have been launching series of fingerprint products with different shapes, performances and uses based on this principle. Widely used in: lock attendance machine, access control, lock security and anti-theft market with fingerprint module as the core application, fingerprint digital with PC peripheral as the application core, storage products and bank internal control, driving school training, social insurance and medical industries.

With all kinds of fingerprint apps, Linlin’s various advertising campaigns, are all fingerprint apps as reliable as propaganda?

No! Only users who are currently using and have already used fingerprint products know it best. So far, there are not many fingerprint access control products that are really well used in China. In the security field of networked fingerprint attendance, access control, etc., the common problems are: poor stability, frequent fingerprint machine time is not uniform, liquid crystal display is disordered or not displayed, after a period of use, there is no response when pressing the fingerprint, communication fails, and fingerprint data is lost Other quality problems; secondly, the fingerprint data that the computer downloads to the fingerprint machine cannot be accurately downloaded, or the fingerprints of a certain person or certain people cannot be designated to be downloaded to different fingerprint machines; the more serious problem is that the fingerprint is wrong. The fingerprint shows Li Si’s information, especially the fingerprint machine with a slightly larger fingerprint capacity (such as a fingerprint machine with a capacity of more than 1500 fingerprints). The reason is that fingerprint manufacturers have ignored the security of fingerprint products while pursuing rapid fingerprint identification, resulting in a high rate of misrecognition.

There may also be users who say: “Why is there no problem with the fingerprint safe (box) that I have used for several years?” Because of the fingerprints stored in fingerprint devices such as fingerprint door locks, fingerprint safes (cabinet), fingerprint laptops, fingerprint U disks, etc. There are only a few of them. They are not used on the Internet. The frequency of use is small and the frequency is low. Therefore, the probability of misidentification is much smaller than that of a networked fingerprint machine. It is not that the reliability of the fingerprint device is high.

Features of networked fingerprint access control

First, it is convenient to collect, save and download fingerprints. The fingerprint collector can collect fingerprints into the computer in time, and save the fingerprint data in the database as part of the personnel information. The background management software automatically downloads the employee’s fingerprint data to the corresponding fingerprint machine according to the access control authority assigned by the employee.

Offline fingerprint access control needs to register fingerprints one by one on each fingerprint machine. This offline method of registering fingerprints to the fingerprint machine requires each employee to go to each fingerprint machine installation site for fingerprint registration, which is time-consuming, laborious, and unreasonable. Once the fingerprint machine is replaced, each employee needs to go to the fingerprint machine installation site to re-register fingerprints.

There are also some so-called networked fingerprint access control on the market. Because the fingerprint reader is a product of another company, the fingerprint management database and the access control database are two independent databases, and the communication between the fingerprint reader and the computer cannot be used. The existing communication line between the controller and the computer leads to multiple construction links and complex system maintenance. The fingerprint data cannot be automatically issued to the corresponding fingerprint machine along with the distribution of the employee’s access control authority.

Second, real-time. When personnel enter and exit the fingerprint access control, the access control management software can timely see the personnel entering and exiting each channel: who, when, where, in or out, whether the door is open, and other information can be displayed on the computer monitoring screen in real time. The perfect access control management software not only has an electronic map to display the opening and closing status of each door, but also can display detailed information of entering and exiting personnel, including name, department, number, card number, photo, and so on. A powerful access control management platform (such as the SKEPS security management platform of Ximark) can be linked with the CCTV (closed circuit monitoring) system. By clicking the camera icon corresponding to a door on the electronic map, you can see the image data of the current door in real time. If the pan/tilt is installed, the rotation of the pan/tilt can be controlled by software. If necessary, you can directly record a piece of image data and back it up to a local computer.

Third, powerful report processing capabilities. The entry and exit records and alarm records of each door (such as forced door opening and door opening overtime alarm, etc.) are saved in the database in real time. Operators with usage rights can perform combined queries by person, door, equipment, time, and recorded events (such as door opening timeout, forced entry, etc.), and generate different reports for query, printing and export. Handan Agricultural Bank lacked access to inquiries after the fact, which caused internal personnel to commit crimes many times, and the security personnel had no way of knowing it. If the security personnel only need to count who enters and exits the vault every month, and print a report to see, if a certain internal personnel enters and exits frequently, then it should be paid attention to, and it can be prevented.

Fourth, the anti-cooperative security mechanism. The perfect networked fingerprint machine is equipped with several anti-forcing fingerprints when fingerprint collection. When it is hijacked by a gangster, the staff will use the registered alarm fingerprint to open the channel, and the fingerprint machine will send a highest priority alarm to the background management software at the same time. Information, the access control management software immediately displays information such as the person and location of the assisted event. The background software can also pass the alarm information to the BA system through the OPC server, realize real-time linkage with the BA system, and achieve the dual protection purpose of life and property.

Choose the standard of networked fingerprint machine

How to measure and judge the quality of the networked fingerprint machine in special applications such as bank vaults? It is mainly compared from three aspects: recognition rate, fingerprint capacity and recognition speed. The three parameters of recognition rate, fingerprint capacity and recognition speed are complementary to each other. One must not lose sight of the other. Blindly pursuing a certain parameter index will greatly reduce the overall performance of the fingerprint machine. Therefore, a high-quality fingerprint machine must be the best of these three parameters. combination. The smaller the capacity, the lower the recognition rate, and the faster the speed; conversely, the larger the capacity, the higher the recognition rate, and the slower the recognition speed. For example, the fingerprint machine used in the fingerprint lock on the safe has a small fingerprint capacity, and its recognition speed is faster under the condition of ensuring the same recognition rate. Therefore, this type of fingerprint machine does not require high chip processing capabilities and peripheral circuits. The development cycle is short and the production cost is low, generally within 200 yuan. However, networked fingerprints require not only large fingerprint capacity and high recognition accuracy, but also fast processing speed. Therefore, fingerprint recognition modules have much higher requirements for software and hardware. Usually a dedicated DSP chip is used for processing, and the peripheral single-chip microcomputers are all processed by ARM chips. At the same time, a dedicated R&D team is required to continuously upgrade the fingerprint algorithm. Therefore, compared with non-networked fingerprint machines, the development cycle of networked fingerprint machines is Long, strict production process, high product cost.

Don’t believe the manufacturer’s promised false recognition rate, false rejection rate and other boring figures, just test its limit value according to the manufacturer’s declared fingerprint capacity to judge its pros and cons. A good fingerprint machine must have a low misrecognition rate and a fast recognition speed. For example, the capacity of a series of standard fingerprint machines is 1900 (9500 according to need), you can collect 1900 (or 9500) fingerprints into certain fingerprint machines, and then use these people and some unregistered fingerprints People test repeatedly on the machine (one person can register multiple fingerprints). If it cannot be accurately identified within 1 second, or if there is a phenomenon of wearing a crown and wearing a crown, it can be judged whether it is good or bad. Practice is the only criterion for testing truth, and it can be applied to the test of any networked fingerprint machine.

Smartkey network fingerprint machine function

Smartkey fingerprint networking refers to the collection of fingerprints into the database, and the background software downloads it to the designated fingerprint machine through 485 or TCP/IP communication. Generally, networked fingerprint machine manufacturers only pay attention to the backup of fingerprints in the research and development process. Their collection method is to collect directly from a fingerprint machine, back up a file in the software, and then download it to each fingerprint machine, so that the fingerprints in each fingerprint machine are the same. If different access rights are required, it is very inconvenient to set up.

The network function of the fingerprint machine not only requires the fingerprint machine to have a strict communication mechanism, but also puts forward higher requirements for the fingerprint collection, storage and automatic download of the background software. A mature networked fingerprint access control system requires the background software to display the collected fingerprint images in real time when fingerprints are collected. At the same time, it can automatically send the employee’s fingerprint data to the fingerprint machine with the permission to open the door according to the employee’s access permission, instead of all fingerprints. machine. The figure below shows how the SKEPS networked fingerprint access control system collects and saves fingerprint data.

The measurement of the networking capability of a fingerprint machine also depends on the speed and data security in the process of downloading fingerprint data. Generally, the download speed of 2000 fingerprints through 485 should be less than 30 minutes, and the data should be less than 20 minutes through TCP/IP, and the data requirements are very accurate. 2000 can not be transmitted, but only more than 1,000 are received. A high-quality networked fingerprint machine also requires personnel entry and exit records to be stored in the fingerprint machine when offline. Once the fingerprint machine is connected to the computer, it can automatically upload the entry and exit records and save them in the database without losing any entry and exit records. The networking method of Ximark fingerprint machine is shown in the figure below.

In the picture, SK100T-NT-FOP is a network fingerprint attendance machine that can be directly connected to a network switch, and SK100K-FOP is a fingerprint reader. There are two communication methods between the Smartkey fingerprint reader and the network controller. One is Wiegand connection, which is used to transmit the characteristic data after verifying fingerprints to the controller, and the other is 485 connection, which is used to connect data from the computer. The fingerprint data is forwarded to the fingerprint reader through the controller. This communication design ensures the speed and accuracy of the fingerprint download, and at the same time prevents the fingerprint reader installed outside the door from being damaged to open the door or access equipment Accident happened. Normally, the power supply of the fingerprint machine is separated from the door lock to avoid opening the door lock after the power cord of the fingerprint machine is short-circuited, and the controller is installed in the door at the same time.

The applicability of Smartkey networked fingerprint machine

The Smartkey networked fingerprint machine is suitable for installation in important places with high requirements for access control and security (such as prisons, bank vaults, financial rooms, etc.), as well as in attendance call application places to prevent card punching. Considering that some people have very shallow fingerprints and those with handicapped fingers, high-quality networked fingerprint machines usually have other identification methods, such as swiping card + password, etc., so as to ensure that the fingerprint machine can adapt to all people. In order to achieve friendly human-computer interaction, the fingerprint machine must have a Chinese LCD display and buzzer prompts.

The high-end networked fingerprint machine also supports reading the fingerprint data stored in the IC card. The biggest advantage of this method is that the number of users of the fingerprint machine is no longer limited by the fingerprint storage space in the fingerprint machine, and it can allow up to 50,000 users to use it. The same fingerprint machine. Generally, an IC card (usually Mifare1) requires storage of two fingerprints. When one fingerprint is damaged, the second fingerprint can serve as a backup.

The stolen treasury of Handan Agricultural Bank sounded a wake-up call to all treasury access control and important control passages. Smartkey network fingerprint access control application in important places with high security requirements undoubtedly provides a thorough solution.

For more related systems, please contact us:

Sun Dong (Northern Regional Manager)

Singapore Seamark (Beijing) Branch

Room 514, Moma Building, 199 Chaoyang North Road, Chaoyang District, Beijing

Post Code: 100026

Mobile: 13581807620 QQ: 81920843 MSN: [email protected]

Phone: 010-85982757 / 85989381/85986721

Fax: 010-85982757 / 85989381/85986721 ext. 803

Email: [email protected]

Http://www.smartkey.net

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare