History of Access Control: Safer, Smarter, More Efficient
In Chinese mythology, the Tiangong has the Nantianmen guarded by the four heavenly kings. This is a presentation form of the most primitive and traditional access control, that is, manual inspection, monitoring and release. However, the shortcomings of traditional manual access control are obvious: the slow registration speed is easy to cause crowds to push and crowd, which affects the company’s commuting efficiency, and also leaves a bad corporate access control image for visitors. The accuracy of the data cannot be guaranteed, and it is easy for others to embezzle the information and mix it with security risks. The access control registration information standard is not standardized, and the registration information cannot be effectively verified.
Until the emergence of intelligent access control, people with access rights only need to hold relevant credentials to enter and exit the unguarded access control. Therefore, the intelligentization of access control is to replace labor with machines through related technologies, and machines can realize all artificial work, such as Read the visitor’s information, compare permissions, unlock and other work; therefore, it is the “key” of technological innovation that opens the era of intelligent access control.
1st Generation Smart Access Control: Password Access Control
Password access control emerged in 1960. At that time, electronic information technology was not very developed, and it was only more than ten years since the invention of the world’s first computer (1946). Under such a historical background, the security level of password access control has been very It is frequently used in fields with strict security requirements such as military and finance.
With the development of technology, password access control has gradually revealed its drawbacks, that is, the password is easy to leak. If you are afraid of leakage, you need to change the password frequently, which will often lead to the embarrassment of forgetting the password. Therefore, in order to solve these problems, after more than 10 years, we have entered the next era of intelligent access control.
2nd generation smart access control: card access control
After 1970, card access control has become a trend, and we can see it up to now; its principle is that when the card is close to the reader, the coil inside the card will generate electromagnetic induction, which will generate a weak current and transmit the card number to the controller. , After checking by the controller, it controls the electronic lock to open and close the door.
At that time, the card was an ID card with a frequency of 125K Hz, but the access control card mentioned by the security circle is already an IC card with a frequency of 13.56K Hz; the higher the frequency, the better the signal strength, the more sensitive the response, and the longer the receiving distance.
The card access control has the characteristics of fast and stable opening, and the virtual ID is also easy to control; but the disadvantage is also obvious, that is, you must carry the card, like a metal key, you cannot open the door if you forget it. If you lose it, you can copy it at will. , the security is not high.
3th Generation Smart Access Control: Biometric Access Control
The emergence of biometric access control in 2000 completely subverted people’s cognition. The door opening function can be realized through face recognition and scanning fingerprints. This looks very high-end, so it has always been sought after by people.
However, there is a problem of confidence in biometric technology, that is to say, the feature values of several photos collected by the same person in the same second are almost not 100% the same. The same person identifies the results with 80% or 76% confidence.
Therefore, many manufacturers say that their face recognition accuracy rate can reach 99.9%. In fact, apart from the premise of confidence, this accuracy rate is completely meaningless. In other words, the accuracy of face recognition cannot be guaranteed, and it needs a certain amount of recognition. At the same time, it is very easy to be affected by light, which determines that it is not very efficient. In order to solve this problem, we came to the fourth generation of intelligent access control.
4th Generation Smart Access Control: Mobile Access Control
In 2014, the era of mobile access control began. As a mobile terminal, smartphones are inseparable from us. The combination of access control and mobile phones is a historical necessity, and its convenience is self-evident.
At the same time, because the mobile phone is highly intelligent, the access control can realize many personalized functions through the mobile phone. The mobile phone can not only use the QR code as the entry and exit certificate, but also realize the remote opening and reservation through the APP, public account, and small program. At the same time, for managers, users can enter, delete, authorize, and query access records through their mobile phone numbers, which greatly reduces management costs.
Therefore, after 2014, we can see more and more buildings, business offices and public service agencies use Macrosafe tripod turnstile gates combined with QR code access control systems for internal staff and visitor management. The aesthetic design and ultra-high traffic volume of Turnstile gates can effectively guide and dredge the flow of people, and avoid long queues caused by congestion.
The QR code is a special picture. There are only 0 and 1 computer language information on the picture. It can ensure 100% correct rate during recognition. At the same time, using the live code technology, it has the advantages of good security, high intelligence and high traffic. Efficiency characteristics. However, due to the complexity of mobile phone models on the market, mobile phone access control cannot be 100% compatible.
Fifth Generation Smart Access Control: Fusion Access Control
After 2018, it is more common to use multi-type integrated access control methods, that is, the integration of card swiping, face recognition, and mobile phone access control. Users can use multiple methods to open the door. Since then, the access control has paid more attention to the continuous upgrading of the system, focusing on how the system can be better compatible with the traditional access control and achieve the maximum function with the minimum cost.
Intelligent turnstile gates can integrate various access control systems and are highly compatible, making it able to meet the various needs of different scenarios and different groups of people.
At the same time, the compatible linkage of access control, fire protection, office, and elevator control systems will create a comprehensive access control system. In the future, intelligent access control will definitely exist in the form of multi-system integration. The future of access control is promising.