Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
86-0769-39020536
At the World Internet Conference that opened on November 16, the "face-swiping" technology was a hit. Every Internet conference puts security work at an important position. This year's Internet conference is different from the past in terms of entrance and exit management. Just brush your face here. When passing through the security check channel, the photos and information are displayed on the big screen, so that the security check personnel do not need to go through inquiries and go directly to the scene, which greatly increases the efficiency of customs clearance. It seems that biometrics has developed greatly in the field of access control.
The difference between RFID access control and biometric access controlNow access control has more advanced technologies and new application markets, and the technologies currently used in access control systems include: barcode, magnetic bar code, radio frequency identification, biometric identification, etc. Among them, radio frequency identification access control and biometric access control are two major trends in the development of access control.
The biggest difference between radio frequency identification access control and biometric access control is the different authentication media and methods. Radio frequency identification access control uses ID cards and IC smart cards as media. The authentication media is easy to lose and damage, and ID cards are easier to copy. Biometric access control currently has fingerprint, palm shape, face image, iris and other identification methods, the authentication medium will not be lost, and the security is better. RFID access control and biometric access control have been widely adopted in different requirements and applications. However, due to the bottleneck of technology development, the biometric authentication model still has certain problems and difficulties in practical application in terms of stability, application cost, and difficulty in system construction. Of course, with the continuous development of technology, some of these problems have been solved. In order to improve the security and applicability of the system, multiple authentication modes such as smart card multiple authentication, smart card + password authentication, and biometric + smart card authentication have been developed.
Application of biometrics in the field of access controlThe most widely used biometric access control systems include fingerprint recognition access control, face recognition access control, palmprint recognition access control and iris recognition access control.
Face recognition system
Face recognition access control is a face recognition access control and attendance product that can be run offline. It is positioned in the mid-to-high-end access control and attendance market, partially replacing the current swipe card and fingerprint access control attendance machines on the market.
The Internet conference is a time for companies to showcase their own technology. According to Baidu’s face-scanning access control, users only need to scan their ID card and enter a real-time photo when entering the park for the first time. It takes within 10 seconds. After that, you can "brush your face" to pass through the gates of Wuzhen Scenic Area. Baidu describes the application scenarios of this technology like this: "When the future cities apply the technology of face gates to life more, then people may no longer need keys to get in and go home, and even use their faces to realize air conditioning, washing machines, etc. The adjustment of household appliances."
In the internal letter, Baidu mentioned that the face recognition gate opportunity is based on the deep neural network machine learning algorithm to learn and recognize multiple facial feature points detected. The entire project runs through R&D, hardware, technical support, and deep learning laboratories. , AI platform department, process information management department and internal communication department. Baidu's face recognition system has an accuracy rate of 98%.
Fingerprint identification system
The fingerprint access control system replaces the traditional key with a finger. When using it, you only need to place your finger on the collection window of the fingerprint collector to complete the unlocking task. The operation is very simple and avoids other access control systems (passwords, identification cards, etc.). May be forged, misappropriated, forgotten, deciphered, etc.
The fingerprint recognition access control system uses fingerprint recognition technology to verify identity. Fingerprints are carried with you, everyone is different, and it is also the same for life. RFID cards may be borrowed, but fingerprints cannot be borrowed. The fingerprint recognition access control system is more secure and accurate, and the media used will not be forgotten or lost. At present, the cost of fingerprint identification access control system is equivalent to that of RFID card access control system, because fingerprints are free of cost.
Iris recognition access control
Iris recognition technology is the most accurate recognition method among the current biometrics. Compared with other identification technologies, iris recognition has the following characteristics:
accuracy
Entrusted by the British government, the British National Physical Laboratory (NPL) tested and compared seven technologies such as retina, iris, fingerprint, palm print, face, voice, and handwriting dynamics. According to the report, the accuracy of the iris and retina is the highest, and the face is "the least accurate." To improve the accuracy of fingerprints, it is necessary to collect fingerprints of ten fingers. In addition, the Japanese Automatic Identification Seminar (AIM) gave the false acceptance rate of different technologies. The iris is 1,200 times more accurate than fingerprints, 12,000 times more accurate than faces, and 40,000 times more accurate than voices. AIM believes that the least accurate of the seven technologies is voice recognition.
Anti-deception
NPL believes that the anti-spoofing iris and retina are the strongest, fingerprints and palm prints are easy to forge, signatures can be imitated, voices can be replaced with recordings, and faces are "the easiest to be deceived." For example: fingerprints will leave a printed film every time they are used, which can be easily obtained by others to make fake fingerprints.
Practicality
NPL believes that the retina is in the fundus, it is difficult to capture images, and the development prospects are the worst; dark iris is difficult to capture usable images (actually the captured images are difficult to identify correctly); sound requires a high-fidelity microphone; faces and palm prints require high-precision cameras ; Handwriting requires a special writing board and cannot use the existing configuration on the computer; fingerprint acquisition is easy, but it is a contact collection. The disadvantage of contact collection is that it easily contaminates equipment and affects accuracy. In addition, for fingerprint recognition, there are problems such as physical labor causing texture abrasion, and dry fingers of the elderly affecting use. The iris can be obtained with an ordinary camera, which is harmless and convenient to the human body.
Security Level
Compared with face recognition, voice recognition, fingerprint recognition and palmprint recognition in the field of pattern recognition, iris recognition has a higher security level, but the sensor signal collection has special requirements for the operation of the user, which is likely to cause the collected personnel Because of the nervousness, iris recognition is mostly used in fields and departments with a higher level of information security.
to sum up:The application of biometrics in access control systems is what many access control companies are currently doing. With the increase of users of biometrics products, users' acceptance of the use of biometrics products is also getting higher and higher. Different product applications will cause users to different levels of acceptance of biometric technology. Biometrics technology has begun to reach the level of large-scale applications, including product price, quality and technology are relatively mature.
March 08, 2024
November 29, 2023
इस आपूर्तिकर्ता को ईमेल
March 08, 2024
November 29, 2023
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
Fill in more information so that we can get in touch with you faster
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.