Home > News > Industry News > Talking about the Development of Access Control System under the Background of Internet Plus
News
Industry News
Company News
Certifications
Latest News

The difference between the scope and application of UPS and EPS power

The difference between the scope and application of UPS and EPS power UPS working principle and classification UPS working principle is to use the...

What is an infrared sensor

What is an infrared sensor Infrared sensing system is used for the infrared measurement system for the medium, according to the function can be divi...

How the Magnetic contact sensor works

How the Magnetic contact sensor works? Magnetic contacts are the most common sensing devices for sensing opening and closing of doors and windows. The...

Active infrared and passive infrared alarm features, differences and application

Active infrared and passive infrared alarm features, differences and application Works for the infrared emission of infrared emission tube infrared...

Security in the GSM system

Security in the GSM system As a result of recent mainstream controversy involving David Beckham’s alleged text messages, some articles have been publ...

Emergency resettable alarm button

Emergency resettable alarm button       Emergency resettable alarm button,it can be installed in the fire hydrant box as...

How to buy a home burglar alarm products

[Abstract] home burglar alarm product is the use of various types of peripheralfunctions detectors, space, environment and people's overall housing te...

How to choose Standalone control Keypad

  Quality and performance advantages anddisadvantages of Standalone Access control keypaddirectly affects the stability of the accesscontrol system,...

How to install the access control system?

     How to install the access control system? There are a number of responsibilities which come with the owning and operating of a business. Wit...

SMQT's Access Control Products Passed ISO Certification

SMQT's Access Control Products Passed ISO Certification On March 27th, 2018, SMQT passed the strict inspection, test and evaluation of the company...
Contact Us
Address:Room 211, 2nd Floor, Zhongzhi NEXone,  Qingquan Road and, Longhua District, Shenzhen, China
Postal Code: 518109
Phone: 86-755-82838361 / 62/63
Email: sales@eiseis.com
       sales@2eiseis.com<
Contact Now
Share

Talking about the Development of Access Control System under the Background of Internet Plus

Talking about the Development of Access Control System under the Background of Internet Plus

Snoppy Network 2016-10-10 10:48:42
Talking about the Development of Access Control System under the Background of Internet Plus 
       With the large-scale development of commercial buildings and intelligent communities, more and more import and export control sites choose to deploy intelligent access control management system, in order to achieve high-efficiency, high-security access rights management. But the personnel coming and going, not only includes a large number of internal owners, internal staff, merchants, etc., but also includes many customers, visitors, etc., so that the entrance control management work presents a high management dimension, management objects, security risks, Management staff workload, higher technical quality requirements of more new features.

       With the large-scale development of commercial buildings and intelligent communities, more and more import and export control sites choose to deploy intelligent access control management system, in order to achieve high-efficiency, high-security access rights management. But the personnel coming and going, not only includes a large number of internal owners, internal staff, merchants, etc., but also includes many customers, visitors, etc., so that the entrance control management work presents a high management dimension, management objects, security risks, Management staff workload, higher technical quality requirements of more new features.
China's access control management product development and technology development later, the main product system architecture from the foreign brand introduced since the 90s of last century, and experienced a long period of localization development. Learning from the early imitation, the domestic brand after 20 years of development, has now begun to occupy the industry mainstream position.
      Unfortunately, the traditional Chinese access control brand products for a long time to follow foreign RF IC card as an information carrier approach, or the development of front-end biometric technology, in technical innovation appears weak.
The existing traditional access control management system can not cater to the new features and demands of the mobile Internet era, especially in the face of open community, visitor management, personnel identification, intelligent community and other application scenarios, technology development is slow. 
The shortcomings are as follows:
  ① RF IC card carrying difficulties, users often need to hold more than one IC card, causing inconvenience;
  ② multiple IC cards are usually the same frequency, there is interference with each other;
  ③ RF IC card registration authorization, lost card loss report, blacklist and other complex management links;
  ④ the lack of the overall linkage of visitor management, user experience good hardware and software mechanisms, and then become a door control control system, a weak link;
  ⑤ visitors to the manual registration is usually used to check the way, inefficient work and violations of user privacy;
  ⑥ existing access control and security departments and users can only face to face through the work of communication, inefficiency and the relationship between tension;
  ⑦ existing biometric identification technology using front-end local recognition, recognition and slow operation of the user's high requirements.
       With the continuous wave of innovation in China's mobile Internet technology, the traditional sense of belonging to partial hardware, heavy application of access control management industry has begun to attract a large number of new mobile Internet brand entry, cross-industry technology continues to emerge, is set off a wave of innovation .
Smart phones as the core carrier, Bluetooth 4.0, two-dimensional code, video stream face recognition, APP, WeChat and other innovative technology industry mature, "Internet +" access control environment management industry, showing a vigorous development trend , Also attracted a large number of entrepreneurs, venture capitalists interest.
      This article will be from the technical application level, the characteristics of the innovative technology and access control management in the field of development prospects.
1. iBeacon Bluetooth 4.0
      (1) technical characteristics
      Bluetooth 4.0 technology is a low-power, high-speed, reliable and stable communications technology, due to Apple's iBeacon solution to further promote, not only in the field of identification, but also in indoor positioning, electronic information marketing is developing rapidly.
Adopt iBeacon Bluetooth 4.0 technology access control management system using smart phones APP and Bluetooth access card reader with, mainly for the convenience of internal staff. Its main technical characteristics and advantages are reflected in:
  ① using smart phone platform APP, without cards or other media, effectively reduce the user's carrying difficulties, enhance the user experience;
  ② Bluetooth mobile phone to open, without network support;
  ③ support to trigger the door or close to open the door;
  ④ mobile phone APP compatible with Android and iOS platform;
  ⑤ high security key management by the management side, the management side without worrying about security risks;
  ⑥ system can be issued key, cancel management, users can back up their own or add activation;
  ⑦ support in the long-range identification to open the door quickly, compatible with access doors, speed through doors, electric sliding doors, parking and other applications;
  ⑧ system compatible with IC card and biometric front-end access equipment.
      (2) Evaluation index
      To evaluate whether a Bluetooth 4.0 access control system is excellent, the following factors should be examined:
  ① must be compatible with Andrews and Apple mobile phones;
  ② recognition time is less than 0.5 seconds, which is similar to the card recognition speed;
  ③ APP must be open to meet the background and open the door to screen off the screen;
  ④ should have the account password protection and security mechanisms;
  ⑤ should have a remote key update, traffic records and other functions;
  ⑥ Bluetooth key should be unified management and access management platform;
  ⑦ products should be compatible with the ability to quickly and economically and easily transform the deployment of existing projects.
      (3) development prospects
       As the need to install APP, Bluetooth 4.0 technology is mainly biased in favor of the authority of the internal control applications. High-end business, intelligent community, etc. In addition, the technical characteristics of the project is very fit with decentralized project requirements, such as the tower has been in the base station access control, power company's substation access control Management and other occasions widely used.
2. Two-dimensional code
      (1) technical characteristics
       Two-dimensional code scanning code recognition is the recognition and control technology which is gradually active in recent years with the development of smart phone. Because it can use smart phones, tablet PCs and other intelligent terminals for convenient operation, the application can be closely related to the public with the WeChat, smart APP, etc., the application of two-dimensional code scanning access control management system to meet the internal staff, , Is gradually recognized by the market and attention.
Two-dimensional Code Sweep Code Entry and Exit Control There are two different application directions, active sweep and passive sweep.
The principle of active scrambling open door is to set the fixed two-dimensional code in the entrance and exit control area. After the user uses the smart phone to scan the code, the system decodes the data through the mobile data network Or Wifi), by the smart phone's WeChat public number or APP to open the door to give access controller access control.
Passive scanning code to open the door of the principle is: in the import and export control area set up two-dimensional code reader, the system in the user's smart phone micro-public number or APP deployment applications, users click to open two-dimensional code, or by printing two-dimensional code ticket , Placed in front of the two-dimensional code reader identification, two-dimensional code reader and the gateway controller to decode the data, determine the permissions and open the door.
Active sweep code is actually equivalent to remote control to open the door, relative, passive scanning more secure, more in line with the needs of security mechanisms.
In this case,
      (2) Evaluation index
      To evaluate a two-dimensional code access control system is excellent should consider the following factors:
  ① must have high-intensity algorithm encryption, to prevent the two-dimensional code is forged;
  ② If it is used by internal users, it must have encryption anti-copy and anti-screen forwarding mechanism to avoid security holes.
  ③ If you use for visitors, you must consider the time limit, limit the number of applications;
  ④ recognition time is less than 0.5 seconds, which is similar to the card recognition speed;
  ⑤ must be close with the WeChat or wisdom APP;
  ⑥ background management and access management platform should be unified management;
  ⑦ products should be compatible with the ability to quickly and economically, easy to transform the deployment of existing projects.
     (3) development prospects
       Two-dimensional code has a good ability to spread, especially for visitors or short-term access control access management applications. Passive scanning mode of the two-dimensional code reader and access control management system, with recognition speed, the ability to upgrade and replace the strong characteristics of the community has been widely used in wisdom, commercial building projects. At the same time, because of its convenient management model, is to meet the clock hotel, public space, short rent office, intelligent apartment application characteristics, has been adopted by a large number of O2O business model will usher in the "blowout" applications.
3. Video stream face recognition
    (1) technical characteristics
      The traditional face recognition usually requires high-definition photo collection, limit the attitude, limit the glasses, limit the expression, recognition must be adjusted with the recognition rate of 1 to 2 seconds, 90% accuracy. More difficult, due to the limitations of the algorithm architecture, traditional face recognition can not increase computing resources to improve performance.
Since 2013, the depth of learning algorithm research in the field of face recognition technology breakthroughs, the use of depth learning video stream face recognition technology, began to enter the field of access control management.
      Depth learning, deep structure, global features, context association, joint learning and other traditional recognition methods can not match the technical advantages, you can achieve a comprehensive liberation of user posture, support the cloud architecture, fully meet the mobile applications And intelligent analysis of the application requirements.
     (2) Evaluation index
       To evaluate whether a video stream face recognition access control management system is excellent should consider the following factors:
   ① must have no need to adjust the attitude of the face accurate recognition;
   ② identification speed of 0.8 to 1 second or less, that is slightly slower than the speed of credit card;
   ③ recognition rate of less than 5000 people should not be less than 99%;
   ④ high-security projects must have the local template control capabilities;
   ⑤ mobile applications should meet the access such as visitor remote face registration, VIP identification;
   ⑥ should take full account of face attendance, channel access, access control of the different characteristics, with different trigger mode, different recognition distance control and other regulatory mechanisms;
   ⑦ background management and access management platform should be unified management;
   ⑧ products should be compatible with the ability to quickly and economically, easily modified to deploy existing projects.
    (3) development prospects
      Video streaming face recognition access control management system is actually a cloud computing architecture depth learning technology floor products, has broad application prospects, its full liberating the user posture, high accuracy rate recognition effect, can "spike" the current mainstream tradition Face recognition instrument.
Although the relatively low-end face recognition instrument, the video flow face recognition equipment cost is higher, but with the progress of production technology and market development, prices will be gradually reduced, large-scale industry replacement upgrade in close proximity. At present, the video stream face recognition access control management system, mainly used in the organs and units, high-end commercial body, etc .; at the same time a large number of people identification applications in the hotel registration, transportation hub, public places began to deploy.
4. WeChat and APP
      At present, China's mobile Internet industry into the depth of development stage, a large number of O2O start-up companies to business model innovation, technological innovation as the core competitiveness, large-scale access to all traditional industries. Access control and management system is closely related to the vehicle entrance control industry, has emerged a large number of newcomer rising star. At the same time, some visionary traditional access control management companies are also planning new product technology direction, in order to promote innovation and development.
     The O2O start-up companies or traditional access control enterprises, usually follow the mobile Internet industry, a typical development model: by creating APP, with marketing, access to a large number of active users, the construction of data flow entry, and then win the favor of the capital market and long-term development. In contrast, WeChat public number is usually not taken seriously.
     But I believe that in the low-frequency access control management applications, WeChat public platform technology, convenience, user experience win APP.
    (1) technical ecological contrast
     WeChat public number actually make full use of Tencent's WeChat to build the ecological, cross-platform operation, business operations, information dissemination, access to users, and so has significant advantages. Access control, visitors, parking and other import and export control areas, users are not frequently used, but closely related applications. As long as the use of optimized and reasonable solutions, with the identification of fast and stable performance of the front-end equipment, establish a sound information processing mechanism, WeChat public number fully meet the application requirements.
     WeChat in China occupies most of the user's mobile phone use time, the user stickiness is very strong. Based on the micro-public number of access control, visitors, parking applications, can be unified planning into a "smart car" management, users only need to focus on activation can get services, without downloading the program, without installation, user experience excellent.
The development of a mature WeChat public number car smart products, its R & D center is the logic of each business process, data flow, data security, user interaction, without spending time planning cross-platform compatibility, without considering the promotion, installation and other issues .
In contrast, APP is mainly for complex processes, frequent user interaction scenarios. To develop a stable and reliable APP, not only need to solve the Android and iOS platform compatibility issues, but also consider the APP promotion, security vulnerabilities and many other difficulties, the R & D personnel investment, time costs, maintenance costs are much higher than micro letter public number. In addition, in the current large number of mature social APP, video entertainment APP has occupied the user smartphone use time, space, requires a low frequency application access APP to get a large number of users, the final master data entry, is difficult and inefficient .
   (2) Comparison of development prospects
     The current technical limitations are mainly reflected in the lack of some equipment, sensor call interface, for example: the current WeChat public number can not be a good call to Bluetooth interface, making the Bluetooth 4.0 technology for the time being only to APP applications exist.
However, with the continuous development of the WeChat platform, such as the recent launch of the "small program" service, WeChat car wisdom will be more powerful features and better user experience. On the direction of product development, focusing on identification technology, the user experience of the solution in the WeChat public on the successful application of verification, then transferred to the APP, step by step development is safe and feasible.
     Unless the user's special requirements, or favor the professional application of regulatory class, or APP in the access control management of the application prospects are very limited.
5. Summary
     In summary, the "Internet +" environment, the emergence of a large number of innovative technologies, large-scale changes in the current China's access control management industry, the competitive landscape, both new competitors or traditional vendors, integrators, are facing enormous Opportunities and Challenges.
At the intersection of science and technology and humanities, we must strengthen the spirit of artisans, strengthen the stability and reliability of products at the same time, fully meet the changing times, respond to user needs, concern the user experience, can only win the market and the future.