Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
86-0769-39020536
Third, the development trend of access control system
At present, due to the continuous development and changes in the domestic market, the access control market and technology development have shown a trend of diversification and integration. The application of the access control function is no longer limited to the needs of a single access control application. From 2007 to 2008, AMB At the meeting, it can be seen that the development of access control technology has emerged as the development of two main lines. One is the comprehensive access control set of security control led by foreign access manufacturers with technology leadership, and the other is a card based on domestic card technology applications. The development path of the platform model combines the characteristics of applications that meet the needs of Chinese domestic users, integrates access control management into the overall system management system of the single card, and implements access control, patrol, elevator, attendance, consumption, parking, and attendance at meetings, etc. Application platform.
In 2008, if the application of the banned card expansion platform and the demand for the smart card market industrial chain were taken into consideration, the entire industry chain market for the domestic access control card market would have great prospects. As the front-end application of the smart card recognition system for access control, at present, the access control systems developed and used at home and abroad are mainly concentrated on sensor access control systems and biometric access control systems; according to the mainstream market, they are further divided into non-contact IC card master industrial chains. The auxiliary industrial chain with fingerprint access control is the mainstay; both provide services with complete access control card application solutions.
In the individual industrial chain of the biometric access control system, the application of biometrics technology is mainly limited to access control and attendance. Fingerprint identification products still occupy a dominant position. Others such as face recognition, iris recognition, palm recognition, voiceprint recognition and the latest DNA identification is still in the promotion stage, and the application of fingerprint identification access control system has become the first choice in the bio-access control market. Due to the problem of the number of times (life) of the fingerprint reader used in the core parts of the fingerprint access control product, its marketing promotion factors have been greatly hindered. Simple calculation: A fingerprint attendance access control machine If a company with a size of 500 individuals per day enters and leaves the gate at least 4 times per day, there are 1,000 to 2,000 times per day, and there are 30,000 to 60,000 times per month. There are nearly 360,000 to 720,000 times, and such a high frequency of use is done on a surface that is less than 4 square centimeters. If the part is not made of special or special materials, it cannot reach tens of millions of times. It is difficult to meet the long-term application of the enterprise, and the read-only characteristics of RFID access control products can reach almost unlimited (reading and writing to 100,000), the market promotion of the two can not be compared, plus fingerprint production materials and processes Differently, even if the hardware development is very mature, the difficulty of product promotion is not only hardness, but also the quality of the fingerprint access control material, the clarity of the optical fingerprint collection in the process, and the direct influence on the use composition.
With the evolution of the security equipment network, the access control system will be further integrated with video surveillance and burglar alarm functions. Its integrated access control system solution integrates burglar alarm equipment and CCTV monitoring system, and linkage air-conditioning lighting control, and will become The future development trend of access control market.
IV. The Impact of IC Card Security Crisis on Access Control Applications
Since the Mifare card key cracking incident was widely publicized by social media in February 2009, the issue of the security of contactless IC cards has become one of the hottest topics in the various media of the smart card industry in the past three months; the Ministry of Industry and Information Technology of the People's Republic of China At the same time, it also issued a "Notice on Resolving Serious Security Vulnerabilities in Some IC Cards" in response to this incident and asked all localities to carry out investigations and responses to the use of IC cards. As the most important part of identity authentication in the access control system, at present, 80% of the domestic access control products use the ID number of the original IC card or the ID number of the ID card as the access control card, and do not perform encryption authentication or develop a dedicated key at all. The security risks have far surpassed the Mifare card's crack crisis; and the security risks of all the domestic and foreign access control products sold in China have not been paid attention to so far, and the most simple technical means can be used by those who illegally break it. The cracking process (most domestic card factories have the ID number copying production technology using ID cards, and the copying equipment on the market only needs 300 pieces), and the documents of the relevant state departments simply put forward a very vague request that chips that do not use foreign algorithms. And so on, while the Mifare card products of domestic domestic chips are completely based on foreign algorithm based replicas. To solve this biggest loophole in the history of security, we should, in essence, establish the China's independent knowledge security standards and use the independent national accreditation key system to perfect the entire security access control system market. Rather than simply telling you that you don't use chips from foreign algorithms, you can use chips with domestically compatible algorithms.
Therefore, if you do not fully realize this essential problem, the security crisis of IC card access control systems in the future will continue to exist for a long time for the application of the access control. To solve this security problem, you must design the smart card and the equipment during product design. As a read-write key encryption mode, it is entirely possible to design an independent, more secure key algorithm on the basis of its original key, or to completely replace the CPU card technology. In the immature stage of the current CPU card market, consider adopting a brand new key system that completely establishes a new distributed key storage method. For example, reference is made to using the "One Card One Secret" algorithm technology of Dusit Corporation to introduce encryption and read-write technology. To the traditional access control theory, to make up for the biggest flaw in the access control system.
Therefore, the main problem encountered in the Mifare key crisis is not only the problem of the algorithm being cracked, but also the key security and security decision in the system technology adopted by the security company for the relevant secondary development. The design and algorithm cannot rely on the original technology, more is to establish their own knowledge product standards.
Fifth, the application of access control technology
With domestic users' demand for access control systems becoming more mature, users are gradually showing different requirements for access control products. Some customers use purely low-price procurement as their sole purpose. They have spawned a large number of small-scale access control companies, while others have considerable purchasing power. They hope that they can purchase foreign products with stability and have multiple application functions. The access control function of access control products with relatively low performance and relatively low price, from a single control to the development of a complete management platform, has become a development model that integrates the traditional RFID identification technology and various subsystems of the security system organically. Simple R&D, production upgrade to OEM production, until brand marketing. With the trend of China becoming a manufacturing factory in the world, some powerful products in Shenzhen will further expand into the international market and become the procurement base for foreign distributors.
In addition, the market will eventually undergo a “shuffle” process, and a considerable number of small-scale enterprises that do not have R&D capabilities or technical strength will therefore be more difficult to survive, and the real manufacturers with R&D strength and technology reserves will be in their respective market segments. Create a higher market share. The further the polarization distance is. The market that forms the well-known Chinese access control brand will become more and more mature. It is being upgraded from simple R&D and production to OEM production and brand marketing. With the trend of China becoming a manufacturing factory in the world, some small and medium-sized access companies in Shenzhen have begun to become international sourcing bases.
Finally, the access control card system author believes that the combination of integrated smart camera technology with IC card read and write authentication, analysis of the captured video stream, smart pen or artificial pen to determine the way. It can effectively solve the incident of imprisonment and substitution. The access control system platform sends alarm signals through various auxiliary methods such as mobile phone short messages, EMAIL, etc.; in smart community access control applications, it integrates smart home controllers and building intercom systems to control household appliances through the network (lights, air conditioners, televisions, stereos) , refrigerator, etc.) Then use the intelligent access control card system, combined with anti-theft alarm to achieve alarm equipment disarm and management, CCTV linkage control intelligent identification applications, to achieve a highly integrated intelligent security management solutions. Increased traditional access control management capabilities to integrated security access control integrated management (including access control, alarm, patrol, parking lot, elevator, CCTV linkage, DVR integration, biometric device integration, OPC service, card design and printing, multi-company Management, dual bus and other serial functions) and access control card management will certainly give birth to a brand new access control market.
March 08, 2024
November 29, 2023
Email ke pemasok ini
March 08, 2024
November 29, 2023
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.
Fill in more information so that we can get in touch with you faster
Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.