Bank vault fingerprint access control system solution
[ad_1]
1. Overview of fingerprints:
1) What is a fingerprint
The uneven skin on the inner surface of our palms, fingers, feet, and toes will form a variety of patterns. The patterns, breakpoints, and different lines on the intersections of human fingers are fingerprints.
2) The basic characteristics of fingerprints: the immutability and uniqueness of fingerprints.
Immutability of fingerprints:
The fingerprint has a strong relative stability. At the 6th month of the fetus, the fingerprints are completely formed before the human body decays. Although the appearance of fingerprints and the thickness of the lines will change with the increase of age, new fine line features may appear between local lines. On the whole, there has been no significant change in the fingerprint line type and the overall layout of the detailed features of the same finger. Even if the finger skin is injured, as long as the dermis is not injured, the lines can still be restored after the injury; if the dermis is injured, scars will be formed after the injury, and the scars will destroy the lines, but the scars themselves add a new and stable effect to the fingerprints. feature.
Uniqueness of fingerprint:
Fingerprints have obvious specificity. According to fingerprint theory, the probability of two fingerprints matching 12 features is 10-50. So far, no two people with exactly the same fingerprints can be found. Even twin siblings who look alike have different fingerprints. Not only between people, but also between the ten fingers of the same person, there are obvious differences in fingerprints. This characteristic of fingerprints provides an objective basis for fingerprints to be used for identification.
2. Reliability of fingerprint identification:
When the computer processes the fingerprint, only some limited information of the fingerprint is involved, and the comparison algorithm is not an exact match, and the result cannot be guaranteed to be 100% accurate. An important indicator of a specific application of a fingerprint recognition system is the recognition rate. It is mainly composed of two parts, rejection rate (FRR) and false positive rate (FAR). We can adjust these two values according to different purposes. FRR and FAR are inversely proportional. Use 0-1.0 or a percentage to express this number. ROC (ReceiverOperatingCurve)-The curve gives the relationship between FAR and FRR. Although the fingerprint identification system has reliability problems, its security is much higher than that of the “user ID + password” scheme with the same reliability level. For example, a system that uses a four-digit password has a probability of insecurity of 0.01%. If compared with a fingerprint identification system that uses a false positive rate of 0.01%, since dishonest people can try all possible passwords within a period of time, the four-digit The password is not secure, but it is absolutely impossible for him to find a thousand people to try all the fingers (ten fingers) for him. Because of this, the authority believes that a misjudgment rate of 1% in the application is acceptable. FRR is actually an important indicator of system ease of use. Since FRR and FAR are contradictory to each other, this makes it necessary to weigh ease of use and safety in the design of application systems. An effective method is to compare two or more fingerprints, thereby greatly improving the security of the system without losing ease of use.
3. Application of fingerprint identification system
Application of fingerprint recognition technology: finance, insurance, securities industry: financial safe management, important system and department staff authorization management, fingerprint withdrawal business, credit card fingerprint authentication, securities transaction identity authentication, insurance beneficiary identity authentication. Information industry: computer application system identity confirmation (fingerprints instead of system passwords), Internet electronic transaction system identity confirmation,smart cardPassword exchange (fingerprints instead of passwords), identification of important communication network equipment administrators (switches, mobile communication networks, etc.). Security industry:Fingerprint access control, Fingerprint door locks, fingerprint car locks, building fingerprint door locks, fingerprint control for vaults, firearms, etc. human resource Management:Fingerprint Time Attendancemachine.
4. Networking engineering drawing: wide area network, local area network (LAN)
Current requirements for bank vault doors: After the front-end verifies the fingerprints of 2-5 people, the management center opens the door after fingerprint verification and authorization
620)this.style.width=620;” border=0>
Fingerprint access control solution for bank vaults
Five, Shen’an company vault fingerprintAccess controlUse process
620)this.style.width=620;” border=0>
Fingerprint access control solution for bank vaults
1. Fingerprint terminal combination verification fingerprint information (can be combined verification by 2-5 persons). Everyone can register 1-5 fingerprints, and everyone can use ID card + fingerprint verification method.
2. After all the fingerprints of the user group are verified, the fingerprint terminal does not output the door open signal, and the management center obtains a record of successful fingerprint verification. The management center displays personal information such as photos of each user in the group.
3. After all fingerprints are successfully verified, in the management center monitoring interface, the fingerprint terminal confirms that the button to open the door is valid.
4. Click the confirmation button of the fingerprint terminal to open the door, and the security personnel of the treasury press the fingerprint on the FDU02 fingerprint collector. The management center can use a combination of 2-5 people for verification, and each person can enter 1-5 fingerprints.
5. After the fingerprint verification of the security personnel group of the management center is successful, the management center sends an open library instruction to the terminal, and the terminal outputs an unlocking relay signal.
6. The management center records the terminal verification record and the management center confirms the door opening record.
7. Fingerprint verification can fix the user combination or each work group to person verification, the system is safer and more convenient to use.
8. The management center monitors the working status of fingerprint terminals, electric locks, and equipment abnormalities in real time. The management center outputs alarm information and saves the alarm information log.
[ad_2]