Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

होम> ब्लॉग> Application of Access Control Alarm System in Bank Security

Application of Access Control Alarm System in Bank Security

October 25, 2022
The financial industry has a direct impact on social security and stability due to the specificity and sensitivity of its functions, from currency manufacturing to circulation distribution, from financial transactions to data processing, from business process control to the security of traders, and there is a high level of work for each link. Hidden risks require key protection. On the other hand, almost all people have frequent and close business dealings with financial institutions; making the business of the financial industry very large, which is a tough challenge for the safe operation of the financial industry. Because of this, compared with other industries, The financial industry has a clear and rigid demand for safety precautions.

In fact, the banking industry, which is closely related to the general public, has always been a pioneering practitioner of security technology, from the initial installation of the alarm system in the banking industry to the deployment of hard disk video recorders (DVRs) in large areas of ATMs and ATMs, from isolated digital video surveillance to digital video surveillance. The gradual application of the streaming media monitoring platform and the practical application of banking security witnessed the progress of security technology over more than a decade. Currently, with the network alarm. With the emergence of intelligent access control and streaming media integration platforms, the banking security system has entered a new era of greater wisdom.

First, the bank's security needs have been raised

The business areas that banks need to focus on are generally self-service banking (equipment), business outlets, treasury and headquarters buildings. The security needs surrounding these banking areas have been comprehensively improved in recent years. In the past, the security protection of self-service banks was limited to the collection and preservation of DVR images due to the limitation of technical conditions. Although it played a good role in the reverse detection and forensics afterwards, it had limited assistance in the instant alarm and disposal of self-service banking crimes. In order to prevent violent destruction of self-service equipment, prevent criminal activities that use ATM machines to attach other smart machines to steal depositor data, steal passwords of depositors, and immediately prevent criminal robberies next to ATM machines, the bank hopes to obtain a solution for self-service banking as a whole. It is hoped that with the help of conventional alarm technology, sound intensity alarm technology, vibration alarm technology, and ATM attachment warning technology, combined with video surveillance, target capture, and integration platform integration, various crimes of self-service banks can be discovered and disposed of in a timely manner. In the same way, monitoring requirements are distributed to numerous business locations across the province, from the original business area without blind spot monitoring and emergency alarms, to high-definition surveillance and high-definition storage. The vault access control also requires the self-definition of the access control process due to the stricter warehousing process. Branch headquarters’ monitoring of all work areas also requires full integration based on a streaming media integration platform. The new requirements of the banking industry for the construction of the security system are changing the traditional design and implementation of bank security projects, and the banking industry is facing security products. The inspection of the security system is also more rational, more professional, and even looks forward to standing on the discipline level to evaluate the scientific nature of the security system. Availability.

II. Analysis of bank security streaming media integration platform model

The comprehensive improvement of the banking industry's need for security protection requires the use of new security technologies to build a monitoring system. The concepts and methods of modern security engineering will play an important role in the process of perfecting the banking monitoring system. With the application of network technology and streaming media technology, the security industry has also entered the digital era. As far as the bank security system is concerned, modern security engineering emphasizes the integrity of the security system, highlights the characteristics of security system digitalization, networking, systematization, automation, and on-the-spot, and guides the establishment of a banking system with modern security engineering methods. Make the bank security system the most effective. Digitization and networking technologies have solved the professional coding and compression of surveillance images and sounds, and rely on the Internet for transmission, storage, and reconstruction in streaming media. Among them, the software that manages and controls streaming media operations is commonly known as a streaming media monitoring platform. Functionally speaking, such a platform is basically a parallel network form with a classical analog matrix system, which is what the industry calls an IP matrix system. The current streaming media software used by most banks is such platform software. Different from the monitoring platform, the streaming media integration platform not only has all the functions of the IP matrix, but also highlights the systemization, automation, and presence of the system.

Systematization refers to the general integration capabilities of the platform and the conceptual model of such a streaming media integration platform applicable to banks. Relying on this conceptual model, the first layer (bottom layer) of the streaming media integration platform can be easily integrated with access control, alarm, firefighting, and other equipment and systems that the bank wishes to operate jointly. The conceptual model endowed the platform with openness, so that the integration process can even be completed on the spot by the bank security department. This is the platform's general integration capability pursued by the integrated platform system design. At the second level of this platform, a number of different heterogeneous systems have interconnected and interconnected, and they have a full range of operating modes and command methods, forming a unified security system. Based on this, the engineering platform can be used to establish a control platform for bank security services, that is, the third layer of the model. At the third level of the platform, a general logic engine is provided to perform monitoring plans that meet the bank's management architecture and business processes. We know that the bank that regulates management has established an action plan for responding to emergencies. When an emergency occurs, related personnel initiate and execute these plans and do their best to control the event effectively. For example, if you suddenly receive the alarm from the intrusion detector and the control panel at the crime scene, the monitoring personnel will set up the scene monitoring scene on the big screen according to the established plan. If the screen selected for the scene is missing, it will switch to the standby plan and use the nearest machine. Bit image alternatives. Scenario construction requires manual execution of multiple keyboard operations to complete, and the shift to alternate scenarios is due to changes in the scene. In the past, these can only rely on human operations and human judgment. Now all can be done with the help of the free plan function provided by the platform. In other words, the streaming media integration platform can reconstruct the document-based planning process in the machine to replace the mechanical thinking process of the human brain, which largely replaces the work that could only be done by human beings. This will win time for the control of the emergency scene. It is the automation of the so-called monitoring process. In addition, a good streaming media integration platform is focused on creating a real-time command and monitoring environment. The simplest approach is to provide a split-screen display function window on the client, such as multi-segment screens for real-time video surveillance and event management screens. For scenario creation and alarm event management, the graphic control screen is used for commanding and scheduling. Such a terminal provides a virtual on-the-spot working environment and enhances the effectiveness of command and control.

Third, bank flow media integration platform architecture module and technology application analysis

From the perspective of engineering theory, modern security engineering emphasizes the openness of security products and security systems, highlights the modularization and structural characteristics of the system, and implements measures for complex systems with the help of the system's minimum topology. The hardware system of a type of streaming media integration platform can be reduced from the minimum system to the high allocation system and other node systems in accordance with the application requirements of the banking industry to adapt to the deployment of head offices, branches and sub-branches. The platform is used for the organizational structure of the provincial security system of a bank's provincial branch. In this system architecture, the streaming media integration platform relies on the bank's intranet and integrates an alarm system and an access control system.

1. Bank Alarm System Application Analysis

Here, the alarm system is still an important subsystem of the bank's security system. The network organizes alarm products. Numerous alarm hosts are deployed in the province's large and small outlets, self-service banks, and vaults. The compliance management architecture is logically divided into three. Level: The ground floor is an on-site alarm system throughout the province's grass-roots business establishments. It is responsible for immediate alarms and immediate disposal. The second-level branch control and alarm centers are responsible for the management of the on-site alarm system and the command of the incoming police; the branch's total control and alarm center. It is responsible for the supervision and remote command tasks of the secondary branch line control alarm system. The network alarm system opens a third-party interface to the streaming media integration platform, which not only opens the state protocol of the alarm host and the alarm detector, but also opens the general operation protocol of the alarm host. Therefore, the depth of integration of the alarm integration system by the streaming media integration platform is an integrated operation. The integrated operation accepts alarm events sent from a third-party system (alarm system) and performs deep-seated processing. The prepared emergency plan accepts alarm events, activates and drives the implementation of the plan, such as video linkage, SMS alarm, and reverse operation alarm system. Turn on lights, close or open gates and other operations. The implementation process of the plan satisfies the emergency process; even the change of the on-site status can be automatically transferred to the standby plan. The alarm system has many years of experience in the banking industry. With the integration of the streaming media integration platform, the alarm and handling process has been automated.

2. Analysis of Bank Access Control System Application

If the integrated platform integrates the alarm system into the integration of the classic security system, the integration of the vault access control system is the integration of the advanced security system. Ladder Diagram Access Control System is a special access control system designed for the operation of bank vaults. It can freely fit complex bank-related processes of different banks and different vaults. The traditional access control system has its access control rules based on roles and based on the design. Role identification refers to the authority granted to those channels whose functions are allowed in and out, and the way is to define the rules and time periods of their access routes, such as dual card verification and embargo transmission. The role-based and mode-based access control systems are general rules that are summarized according to most application requirements and are fixed in access control products. In other words, you can only select options that are suitable for use in a defined set of roles and styles. You cannot exceed the population rules that are provided by the access control product designer based on experience. Figure 5 shows the actual warehousing process of a bank's vault, which consists of the complex flow of library management logic, privileged logic, and emergency logic mu tails. It also contains general logic operation rules such as combinatorial logic and sequential logic. To include the interactive operation of network remote authorization.

Obviously, access control procedures cannot be achieved with conventional access control systems. The trapezoidal access control system mentioned here not only has the traditional access control function, but also really means the access control system that allows free creation of entrance and exit rules. Ladder Diagram Access Control System is a language-based advanced access control system. It is a new type of access control system that is formed by transplanting the extremely mature ladder language in the field of industrial control. It is particularly suitable for the application of complex channel processes such as vaults. On the one hand, because the ladder diagram language is designed specifically for combinatorial logic and sequential logic operations, not only can the logic flow be solved, but even more complex channel rules can be competent. On the other hand, the programming process of the ladder diagram language is concise and easy to learn, and the promotion and application of the ladder diagram access control system is not barrier-free. Compared with the conventional ladder diagram in the field of industrial control, the access ladder diagram not only provides the trapezoidal expression of the AND, OR, and non-basic calculation functions, but also adds some parameter variables specific to the access control function, such as cardholder variables, time period variables, and network operations. Variables, etc., to suit the general application of entrance and exit control.

The third-party interface opened by the Ladder Access Control System provides status protocols and operating protocols. In addition to integrated video linkage, the streaming media integration platform also participates in the remote interaction operations of the vault database, including the image confirmation of the library personnel. Talk about the confirmation, as well as the intervention of open logic under ladder control.

IV. Conclusion

The promotion of professional-level security solutions in the banking industry not only regulates the implementation of such projects, but also serves as the best way to improve the overall security requirements of banks. Over the past few years, through the practice of bank projects, the key points for the implementation of modern security engineering methods in bank projects have been summarized, laying a solid foundation for the further integration of integrated media access platforms in the banking industry, such as access control systems and alarm systems.
संपर्क करें

Author:

Ms. Yanjun Chen

ईमेल:

quentin@zecheng.com.cn

Phone/WhatsApp:

+8613602572892

लोकप्रिय उत्पाद
You may also like
Related Categories

इस आपूर्तिकर्ता को ईमेल

विषय:
ईमेल:
संदेश:

Your message must be betwwen 20-8000 characters

होम

Product

Phone

हमारे बारे में

जांच

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

भेजें