Palm Vein Recognition Prison Access Control System Application Scheme
[ad_1]
1. Application scheme
On October 17, 2009, felons Qiao Haiqiang, Gao Bo, Li Hongbin, and Dong Jia in the third prison area of Hohhot No. 2 Prison in Inner Mongolia snatched the uniform of the police officer Xu Mou on duty, tied it up, and placed another police officer on duty. Lan was brutally killed, and then fled. It was these four desperadoes who were almost illiterate, but actually staged a shocking escape in Hohhot. However, the French Open was full of care and attention. Only two days after the escape from Inner Mongolia, the four fugitives who had disappeared in the vast sea of people were arrested. Fortunately, besides cheering, people began to think about how this happened? Why can the fugitive escape? Especially after the escape incident, it was very irritating to the heavy personnel in the prison. Anyone who could escape would want to escape. How to further improve the prison’s management and security control capabilities has become a key concern of the Prison Bureau of the Ministry of Justice.
Fujitsu palm vein recognition technology is currently the world’s top biometric technology. It uses the characteristics of human hemoglobin to absorb near-infrared light when it passes through the veins to collect images of the veins under the palm of the skin and extract them as biological characteristics. Compared with other biometric technologies such as fingerprints, eye iris or hand shape, palm veins are extremely difficult to copy and forge. The biggest reason is that such biological characteristics are under the palm of the skin and cannot be seen by the naked eye. In addition, since the palm vein is used in a non-contact type, it is more hygienic and suitable for use in public places. At the same time, the palm of the hand is more natural, making it easier for users to accept. The false recognition rate and rejection rate of palm veins are also lower than other biometric technologies. At the same time, the requirement must be a live palm vein to be effective. The reason why the felons in Hohhot can escape is because the prison access control system uses a fingerprint system. Nowadays, the emergence of imitation fingerprint film has completely eliminated fingerprint recognition. The identification is not required to be a living organism, so there is an escape event where the finger that cuts off the warning can still open the door.
Palm vein recognition technology was first applied in Fujitsu, Japan in 2004, and has since been promoted to all parts of the world, and has been widely used in Europe and the United States. Clients include financial industry banks, institutions of higher learning, government agencies and public hospitals. This technology won the Wall Street Times Best Technology Innovation Award in 2005, and also won the Innovation Award at the International Appliance Show (CES) held in Germany in 2006. In 2007, this technology began to be introduced to mainland China.
Fujitsu palm vein recognition technology can achieve a high degree of unification of electronic and physical identity, which can strongly support the use of modern computer technology to realize all-round digital management of prisons. Palm vein biometric technology can be applied to all aspects of prison management, such as access control for key entrances and exits, prison gate control, regular prison counts, and cashless consumption, thus truly helping prisons realize intelligent management. 1. The intelligent access control system for key entrances and exits utilizes the palm vein recognition technology developed by Fujitsu, which is based on palm vein recognition technology, to achieve strict control and management of the various iron gates of the prison. Use the TCP double-door two-way controller of OP Industrial Company to support the Fujitsu palm vein recognition device to realize the double-door interlocking management.
TPC four-door two-way access controller
Fujitsu Palm Vein Recognition System provides standard Wiegand or 485 signals, which can be easily integrated with the existing OP Corporation’s TCP or 485 access control controllers, enabling prisons with low security access control systems such as traditional radio frequency cards or fingerprints to develop technology The cost of upgrading is reduced to a minimum. The TCP four-door two-way access controller provides a low-cost two-way authentication mechanism for entry and exit. Identity authentication is required for entry and exit to open the door. Different from the traditional access control system that requires product technical data to install a set of access control equipment inside and outside of a door at the same time, palm vein communication or smart access control system supports one access control device to connect to multiple identification sensors, and the USB interface is used to connect To enter the sensor module, install an access control device on the outside (or inside) of a door, and install a sensor module inside (or outside) to quickly realize the two-way authentication of the door.
Opportunity access control controller supports coercion to open the door and alarm. Both the left and right palm veins of police officers can be used for identification and open the door. According to the habit of each person’s hand, one hand (usually used hand, such as the right hand) can be set to authenticate and open the door normally. Another one-hand (left-hand) authentication can also open the door, but at the same time a duress alarm signal will be issued. The palm vein authentication system is adopted. Based on the characteristics of palm vein biometric technology that cannot be forged and in-vivo identification, there will be no situations where fingerprint recognition technology can forge fingerprints or cut off fingers to identify open door and jailbreak. Even if the door is opened by coercion, an alarm signal can be issued unknowingly in advance, so that the prison security can identify the risk of escape in time and quickly carry out the rescue of the coerced person.
(1) The basic functions of the prison palm vein authentication access control system l Through the access controller, various electric locks can be controlled.
Different access rights can be set for different people through the access control software.
Sixteen time periods can be set in a day, which can strictly control the entry and exit of personnel in each period.
It is possible to set whether the permitted time period is valid on holidays and weekends.
Forcibly open the door, and automatically alarm if the door is not closed over time.
A variety of information records: each time the door is opened, the door card, number, alarm reason, and location.
The door opening delay is adjustable.
Can be used offline or online.
Multi-level watchdog circuit design prevents crashes.
Using American original built-in battery chip, data and clock will never be lost.
(2) Fire alarm linkage function l Security linkage: When the door is opened (including illegal intrusion, door lock is broken), the linkage monitoring system will be activated to send out real-time alarm information. l Lighting and other linkage: When the card is valid, the corresponding area lights, etc. are automatically turned on. l Fire linkage: When a fire alarm occurs, the corresponding area channel is automatically opened
(3) There are three ways to realize the fire-fighting linkage function: 1. The fire-fighting linkage signal in a certain area corresponds to the access control host connected to a certain door. When a fire occurs, the access control host automatically opens the door after receiving the fire alarm signal. 2. The fire protection system provides an alarm signal in the form of agreement to the access control management computer or access control system to collect fire alarm information, and then the access control software controls all doors in the corresponding alarm area through instructions to open. This method requires the access control software to always monitor and run. 3. The linkage is realized manually, that is, when a fire alarm occurs in a certain area, the personnel on duty can operate the corresponding door or open all the doors through the access control software.
(4) The access control centralized control management center uniformly sets, changes, cancels, and restores personnel access rights. l The management center can remotely control the temporary door opening. l The management center can force the normally closed door to be locked. At this time, the host card swiping is invalid until the center releases the normally closed. l The management center can monitor the status of each door and the entry and exit of personnel in real time. l Can centrally query, print, etc.
(5) Offline operation
The access control host itself has storage and calculation functions, which is equivalent to a microcomputer. The management center downloads the authority information of this door to the access control host through software, and the access control host can save this information, that is, the PC that does not depend on the management center can automatically To identify, judge, read and write, and record the information of personnel entering and exiting, the PC can send instructions to the access control machine at any time, change personnel permissions or read entry and exit records, etc., and store 60,000 records of credit card;
(6) Video surveillance punching and snapping function
Aopu Industrial Access Control System has newly added dynamic video monitoring and punch-in capture functions. The entrance and exit of the access control are equipped with a network camera. All people passing through each entrance and exit can perform picture capture and archive records as long as they pass through the palm vein recognition. To ensure the accuracy of control, it can also monitor the entry and exit of each channel and the intensity of personnel in real time.
2. Prison warehouse access control and prison time counting system
The prison cell is a high-level security occasion for the detention of criminals. Advanced high-tech prevention technology is used to carry out the daily operation of the prison and scientific and efficient management, which not only fundamentally ensures that the personal safety of prison staff will not be violently attacked. , And technically fully realize the legal management of detainees and the protection of their lives. Prison warehouses need to be closely monitored 24 hours a day, 365 days a year. Therefore, the establishment of an advanced multi-functional security system will greatly improve work efficiency, protect the life safety of all internal personnel, and ensure the safety of all internal personnel through technical means in the form of a system. The occurrence of any illegal behavior or abnormal event will inevitably produce powerful economic benefits and good social benefits.
The traditional key management and inductive access control management such as swiping cards and fingerprints in prison prisons have many hidden safety hazards. In addition to the management problems of a large number of keys and radio frequency cards (lost, copied, failure to return in time, etc.), there are also installation companies that may also Configure the key andsmart cardThe situation caused not only low work efficiency, but also a large number of hidden dangers of insecurity. If the Fujitsu palm vein authentication system can be used in all prisons, in addition to effectively solving the problems of traditional management, it can also use the built-in attendance function of the access control system of Aupu Industry to realize the timing inventory of prisoners in the prisons. Within 10 minutes after returning to the prison in the specified time, such as exposing, labor, group activities, etc., all prisoners in each prison only need to stretch out their palms in front of the palm-passing device to complete the identification of prisoners, not only the quantity The inventory can also absolutely guarantee that each prisoner appears at the specified place at the specified time, and any behavior that does not meet the requirements of the “double regulations” will immediately send an alarm message through the system, and accurately locate where and what personnel have problems.
Through the use of high-tech information technology, the efficiency of prison guards’ patrolling of prison warehouses can be greatly improved, and it is also possible to prevent personnel missed inspections due to human factors such as smart card punching in and guarding by prison guards. 3. Cashless consumption system Prisons also have daily necessities consumption needs, but prisoners cannot carry cash with them, and there are many hidden dangers in using traditional passwords or smart card consumption methods, such as the possibility of being taken over by cell bosses to obtain passwords After that, then pretend to be consumption.
Using Fujitsu’s palm vein recognition and authentication technology, it is possible to quickly build a cashless consumption system that directly credits the living expenses paid by the prisoner’s family or the prisoner’s personal labor income into the personal account. All consumption behaviors must be confirmed by palm vein recognition. Prisoners can confirm their consumption as long as they reach out their hands, and the money in their personal accounts can never be fraudulently used by others. It is impossible to achieve deductions for consumption if I am not present.
Company website: www.aopu.cc
Phone: 0755-82813105-808
[ad_2]