Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
86-0769-39020536
As technology advances, the cost of building access control systems becomes less expensive. Just as the current price of personal computers is only a fraction of the price of early computers, but the operating speed and functions are significantly improved, and the same cost, in the past may only be able to purchase access control systems that are backward and have a low security level, but now You can configure a secure, non-contact access control card system and make it a platform for numerous applications such as cashless vending and desktop login.
1. Development of Access Control Technology
In the past 15 to 20 years, the low-frequency proximity card is a standard product of the security industry. This card is simple and allows anyone with a card to pass through the door. In other words, no matter who or whatever channel - even if it is stolen from the legitimate card owner, if you get the card, you can enter the facilities that the access control system defends, whether it is the office, the production, Workshop or bank.
In this case, cards that added visual security identifiers such as photographs came into being, providing a basic means of authentication. For example, financial institutions require employees to carry ID cards/access cards with their own photos, and security personnel check the identity of employees at any time. However, these photo ID cards/access cards are currently challenged by card copy technology. The wrongdoer can make a copy card through some devices, so as to pass through the access control through the authentication. Unless you have a surveillance camera or if you have employees witnessing, you may not know that unauthorized personnel used to pass the access control.
Because of this problem, high-frequency cards have become the ideal choice for access control. High-frequency cards, often referred to as contactless smart cards. These cards have a multi-layered security element embedded in the chip that offers higher security than traditional ID cards. Contactless smart cards employ multiple keys and mutual authentication to prevent unauthorized personnel from using cards and readers; and to encrypt data stored on cards to further enhance the protection of information on cards. In addition, some vendors can also provide proprietary card formats (including card numbers that can be monitored) for large organizations to increase security.
Advances in technology are not limited to the interior of the card. New visual technologies that have emerged such as optically variable inks (OVI) and holograms have become the government’s technical tool for credential and currency protection.
From the perspective of application, high-security cards have become the pilot-specified card designated by the United States Transportation Security Administration because of its stringent security performance, and have become the standard configuration for high security requirements.
From a price point of view, the price of high-security cards is currently almost the same as the price of low-frequency solutions. This can be said to be the boon of institutions that have the intention of upgrading the access control system.
In addition, in order to smoothly transition to a high-security configuration, many modern card readers support multiple types of technologies, including legacy proximity cards, magnetic stripe cards, high-frequency cards, and radio frequency identification cards. This means that the user can implement a phased transition to a high-frequency access control system by providing a new card reader and gradually replace the ID card as needed.
The non-contact access control card can be integrated with physical and logical access control on a card, so that the user does not need to own two separate cards, and no additional equipment (such as an RSA dynamic cipher device) can perform all the functions on a single card.
Page 2: Contactless Access Cards
Another advantage of the contactless access control card is its versatility, that is, it can add a variety of applications to achieve various possibilities. Common extension applications that can be added to contactless access cards today include:
Biometrics, that is, biometric modules such as fingerprints, irises, palm geometry or vein patterns are safely and reliably stored on cards;
Building automation, that is, through the identification of the card, to grasp the staff time in the building, as a basis for turning on or off the lights or air conditioning systems;
Print rights management, that is, the document can be printed only when the employee presents the access control card to the printing device, thereby avoiding waste and managing the use of the printer;
Attendance management enables employees to quickly change classes and avoid wasting time caused by manual handover, thereby improving work efficiency.
2. Requirements and Applications of Access Control Systems by Domestic Financial Institutions
In addition to considering the safety and versatility of the system, domestic banks are paying more attention to the central monitoring function of the system when upgrading the access control system. At present, domestic banks generally adopt the mode of decentralized management of business outlets in different locations, and there is no unified, real-time, and effective network management mechanism that can integrate decentralized status and integrated management. This makes it impossible for the superiors of the bank’s superiors to immediately understand the specific trends of the employees of the branches under their jurisdiction and the actual operation of the various outlets, making it possible for the bank’s internal economic crimes to take place. The rapid development of China's financial services industry and the continuous increase in the number of employees have also caused banks to face severe challenges in personnel, entrance, and attendance management. Therefore, the bank has the following requirements when setting up the access control system:
Remote control and central management can be realized, that is, the access control system should be networked, can support remote real-time response, management and control, and view the access point through the electronic map in a place where there is a network; all access records of the access control system must be able to be real-time Upload to the Central Management Station for monitoring;
Supports system security and multi-level authority settings, ie, the access control system must support hierarchical privilege settings, which can restrict the entry and exit of employees in the core area, ensure the safe and reliable communication between the card and the reader, and identify the pseudo card. The bank's extremely high security requirements for office space, savings outlets, data centers, and treasuries, as well as the strict rules governing entrance and exit controls, authentication, and permission settings are determined;
Support multi-system linkage, that is, the access control system can integrate with other security subsystems, such as fire-fighting systems and alarm systems, and coordinate the linkage to better ensure safety;
It will help improve the efficiency of the company's integrated management. In addition to the company's security system, the access control system can also improve the company's management efficiency and maximize the use of resources through the integration of time and attendance systems, parking management systems, office automation systems, and consumer systems.
At present, some domestic banks have used non-contact smart cards, network access control, and even biometrics technologies to prevent illegal intrusion of external personnel of financial institutions and prevent internal personnel from collaborating in committing crimes. The following are some practical applications:
Hierarchical management and privilege setting, that is, setting the pass level and the time period allowed according to the position of the staff and the nature of the work, grading and controlling the passage of time in the designated area, and restricting the relevant personnel from randomly entering important places;
A variety of door opening modes, that is, according to the importance and function of the area, designing various door opening methods such as credit card, 'card + password', 'card + fingerprint', 'card + password + fingerprint', etc.; and approval through registration in the system Enter the fingerprints of two different managers in a certain area (such as a vault), and turn on the two-finger association function to ensure that only two administrators' fingerprints are legal at the same time before allowing related personnel to enter the relevant area;
Anti-coercion, that is, when a user is hijacked by a criminal, he can enter a predetermined duress code after reading the card, so that without the knowledge of the criminals, the management center can promptly receive coercion information and initiate an emergency handling mechanism to protect the user and the work area. Safety
Offline work and remote management, that is, the controller of the access control system can work offline. It can ensure that the door will not be affected when it loses contact with the management host. It can upload event information in real time after the communication is restored; the management personnel with the permission can pass it. The electronic map manages the access control at various locations and checks the status, so as to improve the security level of the system and improve the security work efficiency;
The accident signal collection, that is, the collection of fire alarms, police alarms and other accident signals, timely recording and alarm, at the same time through linkage output points and building automation, closed-circuit monitoring, anti-theft and fire alarm system coordination and linkage;
The internal card, which is compatible with internal dining, fitness, parking and other consumer applications, and can support attendance management, for example, set up attendance points at the entrance and exit, cooperate with attendance software to analyze, filter and count the card reader data, and automatically generate various personnel reports every month. Improve the efficiency of personnel management;
Visitor management, that is, through a visitor management system that integrates identity identification, card reading, image collection, and voucher printing, enables automatic reading of documents, visits and receipts, visit status check, visits to blacklist settings, and visits and statistics. Detailed and quick record of visitors' information, overcoming the shortcomings of traditional visit registration and dealing with false information, etc., effectively responded to the security risks posed by outsiders.
3、Conclusion
Security risk is the biggest risk factor facing financial institutions. Advanced access control technology enables financial institutions to migrate from the 20 years of physical access control to the latest non-contact access control technology platforms. These platforms not only provide greater security, but also enable additional applications from the building. Automation to the desktop login, everything. The key to successful migration of financial institutions' access control systems is to find cooperative suppliers that can provide innovative and flexible technologies for seamless migration. While satisfying the current needs for strengthening security assurance and applications, they will create a platform for future applications. Prepare for future needs.
March 08, 2024
November 29, 2023
อีเมล์ให้ผู้ขายนี้
March 08, 2024
November 29, 2023
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
Fill in more information so that we can get in touch with you faster
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.