伊人免费视频-伊人免费视频二-伊人免费视频网-伊人免费在线观看高清版-伊人欧美

-Language-
What are the Applications of Biometrics in the Field of Access Control? What is the Difference Between Radio Frequency Identification and Biometric Identification?
2018-08-16 09:52

At the World Internet Conference last year, the "face-swiping" technology was a hit. Every Internet conference puts security work at an important position, this year's Internet conference is different from the past in terms of entrance and exit management, just swipe your face here. When passing through the security check channel, the photos and information are displayed on the big screen, so that the security check personnel do not need to go through the inquiry and go directly to the scene, which greatly increases the efficiency of customs clearance. It seems that biometrics has developed greatly in the field of access control.


The difference between RFID access control and biometric access control

Now access control has more advanced technologies and new application markets, and the technologies currently applied to access control systems include: barcode, magnetic barcode, radio frequency identification, biometric identification, etc. Among them, radio frequency identification access control and biometric access control are two major trends in the development of access control.

The biggest difference between radio frequency identification access control and biometric access control is the different authentication media and methods, radio frequency identification access control uses ID cards and Mifare cards as media, the authentication media is easy to lose and damage, and ID cards are easier to copy. Biometric access control currently has fingerprint, palm shape, face image, iris and other identification methods, the authentication medium will not be lost, and the security is better. Radio frequency identification access control and biometric access control have been widely adopted in different requirements and applications. However, due to the bottleneck of technological development, the biometric authentication model still has certain problems and difficulties in practical application in terms of stability, application cost, and difficulty in system construction. Of course, with the continuous development of technology, some of these problems have been solved. In order to improve the security and applicability of the system, multiple authentication modes such as smart card multiple authentication, smart card + password authentication, and biometric + smart card authentication have been developed.

Application of biometrics in the field of access control

The most widely used biometric access control systems include fingerprint recognition access control, face recognition access control, palmprint recognition access control and iris recognition access control.

Face recognition system

Face recognition access control is a face recognition access control and attendance product that can be run offline, it is positioned in the mid-to-high-end access control and attendance market, partially replacing the current swipe card and fingerprint access control attendance machines on the market.

The Internet conference is a time for companies to show their own technology, according to Baidu’s face-scanning access control, users only need to scan their Identification card and enter a real-time photo when entering the park for the first time, it takes within 10 seconds, after that, you can "swipe your face" to pass through the gates of Wuzhen Scenic Area. Baidu describes the application scenarios of this technology like this: "When the future cities apply the technology of face gates more to life, people may no longer need keys to get in the car and go home, and they may even use their faces to adjust household appliances such as air conditioners and washing machines.

In the internal letter, Baidu mentioned that the face recognition gate opportunity is based on the deep neural network machine learning algorithm to learn and recognize multiple facial feature points detected, the entire project runs through R&D, hardware, technical support, and deep learning laboratories, AI platform department, process information management department and internal communication department. Baidu's face recognition system has an accuracy rate of 98%.

Fingerprint recognition system

The fingerprint access control system replaces the traditional key with a finger, when using it, you only need to place your finger on the collection window of the fingerprint collector to complete the unlocking task, the operation is very simple and avoids other access control systems (passwords, identification cards, etc.). May be forged, misappropriated, forgotten, deciphered, etc.

The fingerprint recognition access control system uses fingerprint recognition technology to verify identity. Fingerprints are carried with you, everyone is different, and they will remain the same for life. RFID cards may be borrowed, but fingerprints cannot be borrowed. The fingerprint recognition access control system is more secure and accurate, and the media used will not be forgotten or lost. At present, the cost of fingerprint recognition access control system is equivalent to that of RFID card access control system, because fingerprints are free of cost.

Iris recognition access control

Iris recognition technology is currently the most accurate method of identification in biometrics, compared with other identification technologies, iris recognition has the following characteristics:

1.Accuracy: Commissioned by the British government, the National Physical Laboratory (NPL) tested and compared seven technologies including retina, iris, fingerprint, palm print, face, voice, and handwriting dynamics. According to the report, the accuracy of the iris and retina is the highest, and the face is "the least accurate." to improve the accuracy of fingerprints, ten fingerprints must be collected. In addition, the Japanese Automatic Identification Seminar (AIM) gave the false acceptance rate of different technologies, the iris is 1,200 times more accurate than fingerprints, 12,000 times more accurate than faces, and 40,000 times more accurate than voices. AIM believes that the least accurate of the seven technologies is voice recognition.

2.Anti-deception: NPL believes that the anti-spoofing iris and retina are the strongest, fingerprints and palm prints are easy to forge, signatures can be imitated, voices can be replaced by recordings, and faces are "the easiest to be deceived." For example, fingerprints will leave a printed film every time they are used, which can be easily obtained by others to make fake fingerprints.

3.Practicality: NPL believes that the retina is in the fundus, it is difficult to obtain images, and the development prospect is the worst. Dark iris is difficult to collect usable images (in fact, the collected images are difficult to correctly recognize). The sound requires a high-fidelity microphone. High-precision cameras are required for face and palm prints. Handwriting requires a special writing board, and cannot use the existing configuration on the computer. Fingerprint acquisition is easy, but it belongs to contact collection. The disadvantage of contact collection is that it easily contaminates devices and affects accuracy. In addition, for fingerprint recognition, there are problems such as physical labor causing texture wear, and dry fingers of the elderly that affect use. The iris can be obtained with a normal camera, which is harmless and convenient to the human body.

4.Security Level: Compared with face recognition, voice recognition, fingerprint recognition and palmprint recognition in the field of pattern recognition, iris recognition has a higher security level, but the sensor signal collection has special requirements for the operation of the user, which may easily cause damage, collectors are nervous and uneasy, so iris recognition is currently mostly used in fields and departments with higher levels of information security.


The application of biometrics in the access control system is already what many access control companies are currently doing, with the increase of users of biometrics products, users' acceptance of the use of biometrics products is also increasing. Different product applications will cause users to different levels of acceptance of biometric technology. Biometrics technology has begun to reach the level of large-scale application, including product price, quality and technology are relatively mature.

Stephanie Stephanie Stephanie Ellie Ellie Ellie Victoria Victoria Victoria Olivia Olivia Olivia Isabella Isabella Isabella Jayden Jayden Jayden Lucas Lucas Lucas Dylan Dylan Dylan Ryan Ryan Ryan Noah Noah Noah

Sweep the concern Yingze electronic official WeChat

x
Sample Apply
※ Please fill in your information, our company will deal with your problem as soon as possible.
主站蜘蛛池模板: 免费看黄在线看| 日韩国产欧美在线观看| 国产亚洲精品xxx| 黄色精品| 国产丰满美女做爰| 欧美精品一区视频| 亚洲精品欧洲一区二区三区| 一道本色| 日本一级毛片片在线播放| 在线欧美成人| 免费高清国产| 国产一及片| 国产高清在线不卡| 黄毛片在线观看| 91你懂得| 国产成人精品aaaa视频一区| 久久精品亚洲热综合一本奇米| 亚洲成年人影院| 亚洲制服一区| 91精彩视频在线观看| 久久99精品久久久久久野外| 日韩欧美国产一区二区三区四区| 在线一区播放| 伦理片一级 | 久久久久亚洲| 日本黄色影片在线观看| 亚洲精品一区二区久久这里| 91真人毛片一级在线播放| 一级黄录像| 久久大香萑太香蕉综合网| 日本高清中文字幕视频在线| 亚洲一二区视频| 亚洲国产一区视频| 在线免费黄色网址| 成人免费无毒在线观看网站| 伊人久久伊人| 免费一级美国片在线观看| 欧美一级做a爰片久毛片潮| 国内嫩模私拍精品视频| 国产人成精品香港三级在| 国产成人影视|