Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

บ้าน> บล็อก> From the stolen bank of the Agricultural Bank of China, the application of bank fingerprint access control

From the stolen bank of the Agricultural Bank of China, the application of bank fingerprint access control

June 21, 2022
As a high-end application customer of cutting-edge security technology, financial institutions are increasingly concerned about the application of biometrics, especially fingerprint recognition, in bank vaults.

Case playback

At 2 pm on April 14, 2007, the cash of 51 million yuan was stolen from the Agricultural Bank of Hebei Agricultural Bank, and the country was shocked. The central leadership has issued instructions to the public security organs to mobilize the police. The huge amount of the 51 million yuan treasury was stolen, and the Agricultural Bank of China Branch had an unshirkable responsibility. Six days later, two suspects were arrested, and the Agricultural Bank’s head office notified the decision on the handling of the theft of the Agricultural Bank of China.

The case of the stolen bank of the Agricultural Bank of China should be an alarm for all banks. How to make the security of the vault? Informed persons of the Agricultural Bank of China believe that there are three fatal details in the supervision of the Agricultural Bank: First, according to the normal procedure, the door lock for opening the vault requires three people: the main key, the sub-key and the password, but the password is leaked; second, the library does not Timely, not serious; third, the omission of the treasury management and security escorts.

The problem of the treasury access control

From the perspective of modern access control security management, the above three problems have existed more or less in the current bank vault management system in China.

Using the main and sub-keys and passwords to open the vault, this traditional access control system itself has loopholes:

First, the main and secondary keys are mechanical, and there is a possibility of copying. If the person with the password obtains these two keys, the vault door can be opened at any time;
Second, the password is easy to disclose, and it has security risks. The password holder will intentionally or unintentionally pass the password to a third party, and the manager will also think that there are two keys to the main and deputy to relax the management of the password;
Thirdly, when the password is opened, it is easy for others to see it intentionally or unintentionally, so that the password cannot be absolutely safe (in the terminology of access control, this is the insecurity caused by the uncertainty of identity).
Fourth, open the vault without entry and exit records. Two keys and a secure password (no matter how many people), as long as the three physically exist, you can open the vault without leaving any traces. And no need to apply, let alone time zone control (in the terminology of access control, no personnel in and out of the record, resulting in no evidence to check).
Fifth, the traditional vault management system allows vault managers and security escorts to believe more about people and relax the strict implementation of the vault management system. They will naively think that as long as they are acquaintances, there will probably be no problem, and they must know that "the house thief is difficult to prevent."

Advantages of fingerprint recognition

The two basic characteristics of fingerprints, "fingerprints are unchanged for life" and "fingerprints are different" are the unique characteristics of fingerprints. "Fingerprint lifetime invariance" was proposed by anthropologist Welker in 1856. “Fingers are different” was proposed by the Englishman Henry Fulds during his mission in Japan. Later, it was proved by the professor of the University of Paris, Botai Chai, using mathematical methods. The feature of fingerprint is the cornerstone of the whole fingerprint identification technology, and it is also one of the effective hand-breaking methods for identifying the uniqueness of human identity. Therefore, many manufacturers have been continuously launching fingerprint series products with different shapes, performances and uses according to this principle. Widely used in: locks attendance machine with fingerprint module as the core of application, access control, lock security, anti-theft market, fingerprint digital, storage products and banking internal control, driving school training, social security medical and other industries.
ติดต่อเรา

Author:

Ms. Yanjun Chen

อีเมล:

quentin@zecheng.com.cn

Phone/WhatsApp:

+8613602572892

ผลิตภัณฑ์ยอดนิยม
You may also like
Related Categories

อีเมล์ให้ผู้ขายนี้

ชื่อเรื่อง:
อีเมล:
ข้อความ:

Your message must be betwwen 20-8000 characters

บ้าน

Product

Phone

เกี่ยวกับเรา

สอบถาม

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

ส่ง