fingerprint identification technology is the most convenient, reliable, non-invasive and inexpensive solution for the identification of many biometric technologies used in authentication . .
Fingerprints are unique features of the human body, with the characteristics of being portable, unique, non-replicable, absolute confidentiality, and their complexity is sufficient to provide sufficient characteristics for identification; if we want to increase reliability, we just need to register more fingerprints and identify more fingers. Ideal developed a fingerprint module performance excellence, scanning fingerprint speed, the use of very convenient; When you read a fingerprint, the user only needs to contact the finger with the fingerprint, and contact with the fingerprint head directly is the most reliable way to read the human biological characteristics.
Second, Access lock
In daily life, people everywhere must use a variety of access locks. From the control mode of access lock, there are key, password, magnetic card and IC card.
With the improvement of people's living standard, the indispensable equipment of access lock has brought a lot of troubles to life. Everyone has a lost key (or forget) experience, every day to remind themselves to put the key to the brain, a large set of keys for people who want to light is undoubtedly a painful thing ...
And from the current control mode of access locks, there is a certain security risks, keys, passwords and magnetic cards are easy to copy, steal; IC card
The whole sex is higher, but it is also easy to lose. Therefore, now people in the mind of the door lock must have a convenient, safe, beautiful and so on.
Three, fingerprint access control system overview
Access control system is based on modern electronic and information technology, in the building inside and outside the entrance to install smart card Electronic automatic recognition system, through the holding of non-contact cards to the people (or things) in and out of the implementation of the operation of release, rejection, record and other operations of intelligent management system for the door access controls, attendance management, intelligent building Systems, High-security entry and exit management, securities trading management safe and convenient access control, the purpose is to effectively control the entry and exit of personnel (items), and record all the details of access, to achieve the safety management of the entrance and exit.
In the access control system to register a person who has access to the fingerprint of the channel, only fingerprint verification through into, only to enter, the confidential department of access to strict control, to ensure the safety of materials and property. In the backstage access control software to assign the user fingerprint data to the corresponding access control machine, also can upload the access record in real-time, generate access control report, provide the basis for the accident tracing.
Four, fingerprint access control system architecture
4.1 Fingerprint access control system composition
From the core products, fingerprint access control system is composed of ideal fingerprint processing module, user's original controller module, door opener and power supply system.
4.2 Ideal Fingerprint Processing module description
The ideal fingerprint module consists of high-performance digital signal processor DSP, high-capacity flash and 300,000-megapixel color CMOS. Fingerprint terminal product manufacturers do not need to understand the specific principles of fingerprint processing and recognition, only need to directly use the ideal fingerprint module, MCU through the communication interface to send instructions, fingerprint module can complete the corresponding fingerprint input, fingerprint processing, finger spinning verification and fingerprint matching function.
Fingerprint access control system only the original access control system password or IC card verification method to the current fashion fingerprint verification method. Let the user in the case of low investment, do not change any function of their products and improve their performance, greatly improving the cost-effective products.
4.2.1 Fingerprint acquisition Head
The fingerprint acquisition head utilizes the principle of total reflection of miniature prism, and the light source is reflected from the prism to the optical sensor. When a person's fingers are pressed on the surface of the glass, the surface of the miniature prism is changed by the pressure of the ridges and valleys of the fingerprint, and the reflected light is obtained by the miniature prism, and the amount of reflected light depends on the depth of the ridges and valleys pressed on the surface of the glass and the grease between the skin and the glass. The fingerprint image is formed by image preprocessing, digitizing, grayscale processing and image enhancement.
The corresponding technical indicators of the sensor:
① Surface hard Coated glass
② 300,000 megapixel color CMOS
③ sensor resolution 500DPI;
④ sensor surface Anti-impact and anti-destructive ability: 4H pencil in the 20cm range of continuous impact 1000 times without damage.
4.2.2 DSP Board
Communication between 4.2.3 pc and ideal fingerprint processing module
Five, fingerprint access control system features
5.1 Security
The invariance and uniqueness of fingerprints determines that fingerprints are the cheapest and most reliable form of identification , so it is safer to use fingerprints to open doors.
5.2 Accuracy
Users simply tap their fingers to open the door in time and accuracy.
5.3 High stability
Independent continuous operation, good stability.
5.4 Flexibility
Support multi-user, multi-group combination door;
5.5 Scientific Management
Time management, so that the management of more scientific;
5.6 Hints
Do not close the door to remind, power off the alarm function;
5.7 Alarm fingers can be set
If someone is forced to open the door, use the alarm finger to alarm. In order to protect the collective and personal life and property security.
5.8 Remote Control
You can manage it anytime you want.
5.9 System uses hierarchical management: managers and users.
Set up administrative authority in the manager. The user's fingerprint is collected centrally in the central management host and stored in the central management host. According to the user's opening permission, the user fingerprint is transferred to the corresponding access control machine.
Six, the Fingerprint access control system extensibility
The access control machine can be operated either offline or networked. Access management According to the different communication methods can be divided into a networked access control system and non-networked access control system. Networked Intelligent access control system consists of computer, communication converter, card reader, controller, card, electric lock (or infrared to shoot, three-roll brake), according to customer demand can be installed TCP/IP protocol module to solve the large-scale access control system project.
An analytic scheme for fingerprint identification of biometric identification technology for authentication