Home  >  Article  >  Technology peripherals  >  Application and development of biometrics in the field of access control

Application and development of biometrics in the field of access control

WBOY
WBOYforward
2023-04-11 21:04:081883browse

Nowadays, access control has more advanced technologies and new application markets. The technologies currently used in access control systems include: barcode, magnetic barcode, radio frequency identification, biometric identification, etc. Among them, radio frequency identification access control and biometric access control are the two major trends in the development of access control.

The biggest difference between RFID access control and biometric access control is the authentication media and methods. RFID access control uses ID cards and IC smart cards as media. The authentication media is easy to lose and damage, and ID cards are also easier to copy. . Biometric access control currently includes fingerprint, palm shape, facial image, iris and other identification methods. The authentication medium will not be lost and the security is better. RFID access control and biometric access control have been widely adopted in different requirements and applications. However, due to the bottleneck of technological development, the biometric authentication model still has certain problems and difficulty in practical application in terms of stability, application cost and system construction difficulty. Of course, with the continuous development of technology, some of these problems have been solved. In order to improve system security and applicability, composite authentication modes such as smart card multi-factor authentication, smart card password authentication, and biometric smart card authentication have been developed.

Application and development of biometrics in the field of access control

The most widely used biometric access control systems include fingerprint recognition access control, face recognition access control, palmprint recognition access control and iris recognition access control.

Face recognition system

Face recognition access control is a face recognition access control and attendance product that can be run offline. It is positioned in the mid-to-high-end access control and attendance market, partially replacing the current products on the market. Card swiping, fingerprint access control and attendance machines.

The Internet Conference is a moment for companies to showcase their technology. Baidu’s face-scanning access control is based on the live video provided by Baidu. Users only need to scan their ID cards and enter a real-time photo when entering the park for the first time, which takes a long time. Within 10 seconds, users can then "swipe their faces" to pass through the turnstiles in Wuzhen Scenic Area. Baidu describes the application scenarios of this technology like this: "When cities in the future apply face gate technology more to daily life, people may no longer need keys to get in the car and go home, and even use faces to realize air conditioners, washing machines, etc. The adjustment of household appliances."

In the internal letter, Baidu mentioned that the face recognition gate will learn and identify the facial feature points of multiple detected faces based on the deep neural network machine learning algorithm. The entire project It runs through departments such as R&D, hardware, technical support, deep learning laboratory, AI platform department, process information management department, and internal communication department. Baidu's facial recognition system has an accuracy rate of 98%.

Fingerprint Identification System

The fingerprint access control system replaces the traditional key with your finger. When using it, you only need to place your finger flat on the collection window of the fingerprint collector to complete the unlocking task. The operation is very simple. , avoiding the disadvantages of other access control systems (passwords, identification cards, etc.) that may be forged, stolen, forgotten, and deciphered.

Fingerprint recognition access control system uses fingerprint recognition technology to verify identity. Fingerprints are carried with you, they are different for everyone, and they remain unchanged throughout life. RFID cards may be borrowed, but fingerprints cannot be borrowed. The fingerprint recognition access control system is more secure and accurate, and the media used will not be forgotten or lost. At present, the cost of fingerprint recognition access control systems is equivalent to that of RFID card access control systems, because fingerprints are free of charge.

Iris recognition access control

Iris recognition technology is the most accurate identification method among current biometric identification methods. Compared with other identity recognition technologies, iris recognition has the following characteristics:

Accuracy

Commissioned by the British government, the British National Physical Laboratory (NPL) tested and compared seven technologies including retina, iris, fingerprint, palm print, face, voice, and handwriting dynamics. The report believes that the iris and retina are the most accurate, and the face "is the least accurate." To improve the accuracy of fingerprints, fingerprints from ten fingers must be collected. In addition, the Japanese Automatic Identification Symposium (AIM) gave the error acceptance rate of different technologies. Irises are 1,200 times more accurate than fingerprints, 12,000 times more accurate than faces, and 40,000 times more accurate than voices. AIM believes that the least accurate of the seven technologies is voice recognition.

Anti-deception

NPL believes that the iris and retina are the most resistant to deception, fingerprints and palmprints are easy to forge, signatures can be imitated, voices can be replaced by recordings, and the face is "the most vulnerable to being deceived." cheating". For example, fingerprints leave imprints every time they are used, which can easily be obtained by others and used to create fake fingerprints.

Practicality

NPL believes that the retina is in the fundus of the eye, making it difficult to capture images and has the worst development prospects; dark iris makes it difficult to collect usable images (actually the captured images are difficult to correctly identify); the sound requires high fidelity microphone; face and palm prints require a high-precision camera; handwriting requires a special writing pad, and the existing configuration on the computer cannot be used; fingerprint imaging is easy, but it is a contact collection. The disadvantage of contact collection is that it easily contaminates the equipment and affects accuracy. In addition, for fingerprint recognition, there are also problems such as physical labor causing the texture to wear out, and the elderly’s fingers being dry and affecting its use. The iris can be obtained using an ordinary camera, which is harmless to the human body and convenient.

Security Level

Compared with face recognition, voice recognition, fingerprint recognition, palmprint recognition, etc. in the field of pattern recognition, iris recognition has a higher security level, but when collecting sensor signals There are special requirements for the operation of the users, which can easily cause the nervousness of the people being collected. Therefore, iris recognition is currently mostly used in fields and departments with higher information security levels.

Summary:

Applying biometrics in access control systems is already something that many access control companies are currently doing. With the increase in the number of users of biometric products, , users are becoming more and more accepting of the use of biometric products. Different product applications will cause users to have different acceptance levels of biometric technology. Biometric technology has begun to reach large-scale application levels, including product price, quality and technology, which have become relatively mature.

The above is the detailed content of Application and development of biometrics in the field of access control. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:51cto.com. If there is any infringement, please contact admin@php.cn delete