Guangdong Zecheng Intelligent Technology Co., Ltd

quentin@zecheng.com.cn

86-0769-39020536

Rumah> Blog> Near Spring Festival Community Access Control System Security Hidden Trouble

Near Spring Festival Community Access Control System Security Hidden Trouble

September 03, 2022
The community access that should have given the occupants more security has often become a “chicken rib”—no need to worry about access control and use the access control.

Recently, the author found out that in Beijing, the access control of many communities did not play the role of the “first door”. Some of them blocked out the residents who were supposed to come in, and some of them did not belong to this community. Households open their doors. This in the end is why?

The opening cannot be closed at the 310th floor of No. 3 Yard, South Hunan Road, Chaoyang District, Beijing. I found that the door with the access control system has been pushed open and a large brick is used as a door stop. Mr. Li, a resident of the building, told the reporter that he had been moving into the community for more than two years. The situation has always been the gate. “We don’t know what the access control is.”

The author then asked Ms. Liu of the residential property. She said that the issue was frequently occurred shortly after the installation of the access control, and the complaints from the residents grew. It was also very troublesome for the property owner to find repairs. Afterwards, when everyone talked about it, they simply opened the door directly. "Anyway, we have a lot of units in this building. Yes, they both know each other and have not had anything to do with each other."

In District 16 of Jinxing Road, Chaoyang District, Beijing, the author saw that from time to time some people did not reset the gate with the access control, which made the access control useless. Mr. Yang, who lives on the 8th floor of the building, said: “Some people do not bring a card. In order to facilitate entry and exit, the door is completely opened. Therefore, there is no access control.” The residential property tells the author that such a situation does exist, and it is not less. However, the property is usually very busy, can only be closed when you see the door, if you do not see it can only let the door so open. He told reporters that when the access control was just used, if the door was not closed for a long time, there would be an alarm sound. "I don't know why I can't hear it now."

In fact, not only did Beijing's residential access control have a variety of flaws, but other cities also had this problem. According to the “Yangzhou Times” report, after the Chongwenyuan Community in Yangzhou was fully delivered and used for a period of time, the electronic access control of 13 residential buildings was one after another. The problems were mainly caused by the insensitivity of the instrument and the “blindness” of the video. The anti-theft function of the intercom door was virtually empty. .

According to reports from Shandong media, Mr. He, a member of a community in Jinan, discovered that the password for the security door of his unit was “known to all people on earth.” The people who send milk, send newspapers, and even collect waste products do not have to open the door at all. You can come in. "In case of ill intentions, isn't it dangerous?"

In addition to its own failures and usage habits, the access control card is also one of the reasons for the access control encounter. According to the survey, the current households generally go to the residential property office to handle the access control card, the price ranging from 20 yuan to 50 yuan a. On the Internet, the price of copying access control cards has dropped to about 5 yuan. A professional card store shop owner told the author that copying the access control card is very simple, and the cost of the card itself is also very low. “A 10 yuan or more is even a huge profit.” In addition to the uneven price, the quality of the card is also In varying degrees, many access control cards are used for only a few months due to degaussing or folding.

The method of burying a hidden hazard access control system is a common name for the entrance and exit control system. It is an electronic system or network that uses the custom identification or pattern recognition technology to identify the entrance and exit targets and controls the opening and closing of the entrance and exit actuators. The most important feature of the access control system is that passive surveillance is actively controlled. It can realize bidirectional control of access time, direction, and authority, greatly reducing the pressure on security personnel and saving human resources in the case of improving security. Effect.

Ningbo Haishu Jiesi Electronic Technology Co., Ltd. Marketing Department Mr. He told the author, the current community access control is divided into several types, one is a separate type of simple access control system, which is what we usually see just enter the password or swipe to open the door The access control system is a networked access control system featuring intercom and visual features. Apart from the former function, this system can also realize independent switch of each household; one is the most advanced biometric access control system. , Has fingerprint recognition, face recognition, iris recognition and other functions.

It is reported that the most commonly used non-contact IC card access control system is composed of a reading section, a transmission section, a management/control section and an execution section, and corresponding system software. The working principle is: When the user swipes the card, the card reader sends the digital code of the built-in card to the host. After the host judges the password is correct, it sends a command to the controller. The controller sends the command to execute the command to the transmission. Responsible for directing the motor to open the electronic lock and realize the opening of the door. The sensor is responsible for sensing the passage of the person. If a trailing or abnormal intrusion behavior is found, the alarm system will be activated immediately.

If you think that the access control and the door are "birth pair," then you are wrong. The author understands that most of the access control systems are independent, that is, the access control system is installed after the door is installed. Once the access control system is removed, the gate can still be used.

In general, the most likely cause of the failure of the access control system is the controller error. The reasons include: poor contact, unstable voltage, program error, and so on. The common problems of not reading the card, opening the door, not closing the door for a long time, not alarming, etc., in addition to the controller, there may be a failure of the reader, the electronic lock and the sensor.

Mr. He told the author that the important reason for the low quality of access to the community is that many residential access control units are bought and installed by developers, but maintenance and maintenance are done by the property company. As a result, developers often purchase low-priced products in order to save costs. At the same time, due to the lack of binding of the property to the access control company, the failed access control cannot be repaired in time. "If the access control can be purchased by the property or the owners' committee, the quality may be more secure."

Many standards were not implemented properly. The author learned from the National Security and Alarm System Standardization Technical Committee that there are a large number of products and design standards concerning access control systems, including “Technical Specifications for Safety Precautions”, “Design Guidelines for Entry and Exit Control System Engineering,” and “ "Electronic anti-theft lock", "black and white video intercom system", "access control system technical requirements", "building intercom system and electronic control anti-theft door general technical conditions", "electronic patrol system technical requirements", "fingerprint anti-theft lock universal Technical Conditions, Technical Requirements for Networked Video Intercom Systems, etc.

The author saw in the "Technical Requirements for Access Control Systems" that this standard has corresponding technical requirements for all components of the access control system. Taking the reading part as an example, the standard requires that the reading part should be able to acquire the operation and key information and identify the target by reading the field device. It should be able to pass the information to the management/control part and also to accept the management/control part. The system shall have indicators such as “recognition rate”/“false recognition rate”, “rejection rate”, “reading response time”, etc., and be listed in the product specification; various operations for reading the field device and The corresponding instruction signals should be given to the instructions of the management/control part, etc. The identification method and method used should be simple and reliable.

In addition, for the reliability of the access control system, the standard also has clear requirements: the equipment used in the system, the average time between failures (MTBF) should not be less than 10000h; the first failure after the system acceptance should be greater than 3 months .

The "Black and White Video Intercom System" standard clearly stipulates that: After the main unit and the extension are connected via a button, the two parties can call each other. The voice quality is clear and the ringing phenomenon should not occur. After the main unit and the extension are connected via a button, The extension monitor can view the image signal captured by the host to facilitate the identification of visitors.

"Electronic anti-theft lock" standard for the quality of the access control card (information identification card) also put forward requirements: After 1000 bending test, the function of the card after the test should be intact, and should not have any rupture; After 1000 twist test (twist The degree is 15°±1°), the function of the card after the test should be intact, and there should not be any breakage; the key should have the ability of waterproof and anti-pollution; apply 1500V electrostatic voltage between any point on the key and the ground, the key Performance should not be affected; keys should have the ability to prevent copying.

By consulting relevant standards, the author found that according to the requirements of these standards, some problems that often arise in the actual use of access control systems are obviously not in conformity with the standards. For example, the first failure time of the access control system, the ability of the access control card to resist folding, and so on. Why do you have standards that are not implemented? In this regard, the National Security and Alarm System Standardization Technical Committee said that this is mainly due to the fact that most of the products related to the access control series belong to industry recommendation standards, and lack of binding on enterprises and products. Currently, most companies still implement the enterprise itself. standard.

In addition, the author understands that although China began implementing mandatory product certifications for security products in 2003, the current certification list does not include access control systems and related products.

What is the development of the industry? With the gradual popularization of intelligent communities, the demand for access control systems for residential projects is also increasing day by day. Therefore, the degree of competition in the access control industry can be imagined.

According to statistics from China Security Network, in accordance with an average annual growth rate of around 25%, the market size of domestic access control systems is expected to reach more than RMB 5 billion in 2010, becoming a “three pillars” for security systems that stand side by side with burglar alarm systems and video surveillance systems. . Specifically, in the 20 or less small projects, domestic manufacturers occupy the absolute main force, and in the 100 or more large projects, Chinese enterprises can only share about 1/4 of the market.

Zheng Ping, Technical Manager of Shenzhen Lize Intelligent Technology Co., Ltd. told the author that foreign companies valued the R&D and innovation of access control system technology, while local companies focused on marketing, and could follow up quickly according to market demand, but technically Still lags behind people. For example, the main product of many domestic enterprises is the "one card" access control system. Its advantages are low price and convenient installation. However, due to the lack of product standards and industry standards, there are more and more problems such as poor stability and low price dumping. He believes that the future of China's access control industry lies in the technology, otherwise it can only be "can eat, eat well."

As the biometric technology continues to mature, the market for biometric access control systems is gradually heating up. Taking the most mature and rapid fingerprint identification access control system as an example, the core component is the fingerprint identification chip. According to statistics, the global fingerprint sensor market will increase from 2.34 billion U.S. dollars in 2004 to 4.38 billion U.S. dollars in 2011. The transnational giant SAGEM has an absolute advantage, and Chinese domestic manufacturers such as ADEL and Core Micro have also successfully developed fingerprint identification chips, which are expected to gain a share in this emerging market.

Insiders pointed out that in the future there will be more intelligent identification technology, alarm technology and shortcut operation will be applied to the access control system. Access control suppliers will work more and more diversifiedly with contractors, software developers, security companies, and properties to bring more security to users.
Hubungi kami

Author:

Ms. Yanjun Chen

Phone/WhatsApp:

+8613602572892

Produk populer
You may also like
Related Categories

Email ke pemasok ini

Subjek:
Email:
Pesan:

Your message must be betwwen 20-8000 characters

Rumah

Product

Phone

Tentang kami

Permintaan

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Kirim