1. Demand Analysis in the Banking Field:
Banks are key national security units engaged in financial business, and vaults are important places for directly storing large amounts of cash, securities, gold and other valuables. Security is of vital importance. The national and bank security departments attach great importance to the security of vaults. They have invested heavily in vault security systems to build human defense, physical defense and technical defense for vault security. Among them, technical defense is particularly important. Judging from previous vault thefts, the most prominent one is theft by the occupants. There are three main reasons: First, blocking the outside but not the inside, including the theft of the vault of the Bank of China Hubei Yichang Branch, the theft of the vault of the Bank of China Pingjiang County, Hunan, and the theft of 51 million yuan from the vault of the Agricultural Bank of China in Handan, Hebei, all of which were internal thefts. Second, the technical defense system is not well designed, relying solely on passive defense systems such as closed-circuit monitoring, ignoring the fact that crime prevention should shift from after-the-fact to during-the-fact to before-the-fact. Third, the three aspects of technical defense, human defense and physical defense have not been effectively and organically combined, resulting in a significant reduction in the effectiveness of the security system.
Therefore, it is an inevitable development trend of financial security prevention to adopt high-tech security technology to establish a security barrier for the vault, improve the standardized and scientific management level of financial security, and use efficient technical prevention measures to implement proactive prevention of financial security.
Combining the actual needs of financial security and the trend of technological development, under the guidance of financial security experts, we have designed a series of special equipment and comprehensive solutions. We have built a set of vault security management and control solutions. We have designed a complete workflow, established an active security prevention system from the three-dimensional intersection of internal, external, time and space, and effectively managed the entry and exit time of internal security personnel and the door opening process and permissions. We have effectively reduced the loopholes in technical defense, minimized the incidence of financial unit cases, and effectively improved operational management efficiency.
2. System Overview and Advantages
1. System composition:
The vault entrance and exit access control system consists of a mobile phone SMS network access control controller, a live fingerprint reader, a video server, a camera, a microphone, a backup power supply, a lock, an alarm device, and a remote vault management software.
The live fingerprint reader is responsible for fingerprint collection, storage, verification and transmission of fingerprint signals;
The mobile phone SMS network access control controller is the core of the system, responsible for receiving and judging the legitimate fingerprint users, driving the electric lock, emergency unlocking, sending out alarm signals, uploading fingerprint information, etc.
The video server is used in combination with the camera to capture and record when the personnel verify the fingerprint, as well as remote voice intercom and monitoring, which is convenient for the background management software to review and query the video. The specific project can also be captured according to the on-site video DVR.
The backup power supply provides system power during power outages.
The alarm device provides local sound and light alarms.
The built-in GSM SMS module of the access controller provides SMS pre-authorization function, SMS arming and disarming, SMS query of arming and disarming status, current wireless SMS transmission alarm opening and other events.
2. System structure diagram
According to customer needs and on-site inspections, we conduct a comprehensive analysis of the system and provide the following system structure design: C/S structure is adopted to facilitate construction, maintenance and system expansion. Each county-level vault controller is connected to control the fingerprint machine, electric lock, and door opening button of the local vault. All county-level vault controllers are connected to the central server through TCP/IP and are controlled by the remote vault software of the center.
3. Implementation of the plan
The specific design of each branch vault is as follows:
Each vault door consists of a network vault access control DW-6834D-CP controller, an electric lock, a live fingerprint machine, a video server, a pinhole camera, a hemispheric camera, a door magnetic switch, an exit button, a set of professional access control power supply and related alarm accessories. The live fingerprint machine is installed on the wall outside the door, and the exit button is installed inside the door (or the fingerprint machine is also installed inside), replacing the traditional key to open the door. The electric lock is installed on the outer door of the vault, and a pinhole camera is installed outside the control isolation door to capture facial images. A hemispheric camera is installed on the upper side to capture and record the environment for use in identifying people entering the warehouse. Double identity recognition is implemented for people entering the warehouse, one is the trial reading device recognition, and the other is the video capture comparison.
During normal working hours, both of the two storehouse managers verify their fingerprints within the specified time. At this time, the access control system automatically disarms and transmits the verification message to the storekeeper at the monitoring center through the network for verification and confirmation. When the vault door is opened, it will open. When personnel go out, they can arm the internal infrared detectors, vibration detectors, etc. by pressing the arming button outside the door.
During non-normal working hours, the vault door is opened only after the fingerprints of two vault managers (the system automatically disarms) + a senior manager's SMS reply verification authorization + central software confirmation. When leaving the house, the internal infrared detectors, vibration detectors, etc. are deployed by touching the deployment button outside the door.
When the network fails and remote monitoring and door opening authorization are impossible, two or more personnel with senior fingerprint authority must be on-site to authorize the entry into the vault. That is, two on-site vault managers + two senior executives authorize the door opening via SMS. When leaving the house, the internal infrared detectors, vibration detectors, etc. are deployed by pressing the deployment button outside the door. When the network between the front-end access control and the central software is unobstructed, all offline operation records and login information will be automatically uploaded to the computer.
When a bank staff member is threatened at the door of the vault, the threatened staff member can use the assisted fingerprint, that is, the double vault management fingerprint + the center staff's confirmation to open the vault door. At this time, the scene will not alarm, but the alarm signal has been transmitted to the police duty room. The alarm in the control room will howl to remind the duty staff to take corresponding measures (or the alarm light will flash). At the same time, the alarm situation is also transmitted to the 110 alarm center through the 110 dialer. These linkage actions are quietly carried out without everyone's knowledge. This can protect the front-end personnel from security threats, but at the same time, the alarm signal is also transmitted in time.
The remote vault center management software is multi-level management, supporting custom levels and level permissions. Each level of permission can be refined to each submenu. All administrators are divided into different user levels according to actual conditions. Each person uses a different user name and password to log in to the software and has different permissions. It is recommended to be divided into three levels of permissions (the bank vault can be customized and added): the first level is the system administrator, who can operate all function menus for system maintenance; the second level is the super administrator, who can operate most function menus, including modifying fingerprint user permissions, etc., but does not directly control and confirm the opening and closing of the vault door, and authorizes the use of the bank security department leader; the third level is the administrator, who is only responsible for remote real-time monitoring to confirm whether the vault door is opened or closed. In this way, power is restrained and the possibility of collusion and internal theft is effectively reduced.
The remote vault guarding system adopts a C/S structure, installs an SQL database on the central computer server, and installs the server-side vault access control management software to confirm the operation of opening and closing the vault door. The computer of the bank security department leader is installed with the client-side vault access control management software to modify and manage door opening permissions, fingerprint validity period, time period settings, etc.
4. System advantages and features:
Adopt the principle of proactive prevention in advance, breaking through the old model of traditional technical prevention system
It seems that the theft cases in the vaults of financial institutions in various places are mainly caused by the imperfect technical defense facilities, and the comprehensive prevention system before, during and after the event has not been effectively combined. At present, all financial institutions generally believe that their video surveillance facilities are advanced and have invested a lot in technical defense. However, video surveillance is a post-incident verification system and cannot prevent people from committing crimes. Although the intrusion alarm system is a prevention device during the event, it often triggers the alarm at the time of the crime or after the crime occurs, and cunning criminals still have the opportunity to quickly escape from the scene. The mobile video SMS access control remote vault management system adopts advanced multi-fingerprint verification + remote vault center computer software to confirm the opening of the door to proactively prevent the occurrence of criminal acts in advance. In addition, the organic combination with the video surveillance system and the alarm system forms a three-dimensional prevention in all directions, time and space.
Remote centralized warehouse guarding effectively prevents internal and external theft.
The system verifies fingerprints through a variety of combinations, as well as remote center verification to confirm the door opening method. The fingerprints of multiple associated local vault managers are quickly transmitted by the system to the remote vault center computer software via the network. The dedicated vault access control software screen will immediately pop up a prompt box to confirm whether to open the door. The center's full-time manager can only open the door after clicking confirm, thereby effectively preventing the occurrence of collusion between internal and external theft.
Seamless connection of system platforms improves bank management efficiency
With the continuous increase of bank outlets and the expansion of the scale of banking systems, it is also very meaningful to seamlessly connect the access control system with a large-scale integrated management platform to realize the linkage of access control, monitoring, and alarm, and to archive events, follow up on matters and manage equipment, which is also very meaningful for assisting bank security and business management.
Communication encryption between bank access control system platform and device transmission
Different manufacturers use different communication encryption mechanisms for transmission between platforms and devices, such as AES encryption, SSL encryption, or encryption with proprietary protocols, which effectively protects against the risk of intrusion and leakage during communication transmission. The use of custom passwords in access control devices to communicate with access control software can prevent criminals from using the same software to modify the parameters of access control devices to obtain door opening permissions.
Customized entry and exit procedures for banks.
Normal warehousing process:
Two vault managers input their fingerprints and stand at designated locations waiting for identity recognition by the monitoring center. After passing the identification, the alarm zone within the isolation door is automatically disarmed.
After the monitoring center sends the access authorization signal, whether the on-site isolation door is opened.
Outbound process: Personnel press the button from inside the isolation door to open it
Control function:
After closing the isolation door, more than two people coming out of the vault input fingerprints (or press buttons) to arm the system. 2. Automatic arming reminder and automatic arming function: After pressing the button to go out, "Please arm the system" will be displayed within 5 seconds. If the system is not armed within 30 seconds, an unarmed alarm will be generated.
Entering the vault during abnormal time periods (2+1+monitoring center):
1. A senior authorized person scans fingerprints on site (or sends SMS) to authorize door opening;
2. After the advanced permission is granted, the isolation door opening process is the same as the normal time period
When the network fails (the remote authorization of the monitoring center fails 2+2+0):
At the vault, two high-level personnel scan their fingerprints (or send text messages) for authorization, plus the fingerprints of two people entering the vault (2+2), and the isolation door is opened;
Adopts composite identification technology of live fingerprint recognition + dynamic random password
The front end adopts advanced semiconductor live technology fingerprint machine, which is ahead of the traditional optical scanning technology fingerprint machine.
Fingerprint verification uses the DW-FP3 fingerprint machine of Li Ze Company to collect fingerprints and authenticate identity of personnel. The fingerprint reader adopts advanced semiconductor silicon sensing technology to strictly distinguish between live fingerprints and fake and broken fingers, which is far ahead of the fingerprint machine with traditional optical scanning technology. Semiconductor pressure sensing acquisition technology forms image signals by sensing the deformation of semiconductor pressure-sensitive medium material units. The surface of the fingerprint acquisition device using semiconductor pressure sensing technology is covered with a series of tiny pressure-sensitive medium units. These tiny units are very sensitive to changes in external pressure. When the finger is placed on the fingerprint acquisition surface, because the ridges of the fingerprint are convex and the valleys are concave, the convex part will form pressure on the pressure-sensitive unit and cause the pressure-sensitive unit to deform. After the pressure-sensitive unit is deformed, its resistance value will change, resulting in voltage changes. The concave valley does not generate pressure in the corresponding unit, so its corresponding voltage value will not change. Through different voltage values, the digital information of the ridges and valleys on the fingerprint pattern can be formed.
1. Support multiple identification methods including fingerprint recognition, fingerprint + card swiping, and dynamic password.
2. The fingerprint acquisition module of the fingerprint reader adopts capacitive (live) technology and 3D technology.
3. The Wiegand card number output of the fingerprint machine, the corresponding address code (F/C) of the fingerprint machine can be set and changed arbitrarily, and the card number corresponding to the fingerprint output can also be set and changed arbitrarily.
4. The fingerprint reader has an integrated arm and disarm button function. By using the function menu, the arm and disarm functions of the access control system can be realized;
5. The fingerprint reader has an integrated digital intercom button. By using the function menu, the system front end can actively call and intercom.
6. The fingerprint reader has an integrated camera. By connecting to video equipment such as DVS, it can capture the facial image of the identified person and compare it with the local image.
7. The fingerprint reader is integrated with TTL voice function, which can realize the real-time broadcast of the name of the identified person and prompt whether the fingerprint verification is successful.
8. It uses a true color LCD display to show whether the verification is successful and can display a color photo of the person in real time after fingerprint recognition.
GSM SMS communication function
When the executive is out for a meeting and it is off-duty time, the front-end staff can press double fingerprints, and the controller will send an encrypted text message to the executive's mobile phone through the GSM module. The executive can reply to the text message to confirm the door opening. In addition, when the wired network is interrupted, the controller automatically enables the onboard GSM text message function, automatically sends alarm information, and receives confirmation of door opening instructions.
Remote network voice intercom and monitoring function
Through the built-in and external microphones and speakers of the camera, as well as the microphones and speakers configured on the monitoring center computer, intercom and on-site monitoring can be achieved. The voices on the scene and the sounds made by prying, digging, chiseling, sawing, drilling and other actions can be controlled and recorded. The sound data will be stored on the monitoring center computer via the network for more than 30 days (the storage time can be extended according to the size of the hard disk).
Access control and video linkage capture, video comparison
The remote warehouse management software is connected to the video equipment through the interface program, realizing the remote monitoring of the access control site, the linkage capture and recording of access control events, and the comparison of portrait capture and local photos.
The system captures images and records videos after people swipe their cards, verify their fingerprints or press a button. By installing cameras at access control points and setting up video linkage in the software, the system can automatically capture images and record videos for a specified period of time after people swipe their cards or press a button to open the door. This allows the management center to verify whether it is the cardholder who has applied to open the door.
Through mobile phone GSM remote authorization, a second remote confirmation center is established for the system.
The system can use the GSM SMS module to conduct off-site authorization for abnormal entry into the vault, that is, to open the door during off-duty hours, and can realize multiple remote authorization functions such as two vault managers + 1 senior manager SMS authorization + center confirmation of door opening. When an intrusion alarm or emergency alarm occurs at the front end, the alarm signal issued by the system should be sent to the monitoring center, the mobile phone of the main leader of the unit where the vault is located, the mobile phone of the security director of the unit where the vault is located, and the mobile phone of the on-duty personnel of the building where the vault is located.
Complete alarm function
The safe is a high-risk prevention place. In addition to having a high level of security management and control, the safe access control system must also have multiple alarm methods to provide security support for the site.
Illegal fingerprint alarm
Malicious use alarm - When illegal fingerprints are used five times in a row, the fingerprint machine will sound an alarm to prevent malicious use of the fingerprint machine.
Illegal door opening alarm - an alarm generated by opening the door without legal identity verification.
Door opening timeout alarm - an alarm generated when the door is opened for more than the specified time and is not closed.
Fingerprint alarm
The system can be set up with an alarm finger. Use the alarm finger for identity verification, and when the door is opened, the system will automatically and secretly send out an alarm signal, effectively protecting the lives of employees.
It supports self-protection function alarms such as anti-disassembly, anti-wire cutting, mains power outage, and network disconnection, and sends alarm signals to the monitoring center, which also displays the sound and light alarm status.
Powerful permission group settings and door opening mode settings
Remote confirmation to open the door: Any number of fingerprints or cards (the number can be set) in this permission group, after verifying the specified number of fingerprints in this combination, the software needs to confirm before opening the door, which enhances security.
Double fingerprint to open the door: Any double fingerprint or two cards in this permission group can open the door, which can be implemented in the same group or different groups.
Main and secondary fingerprints to open the door: This permission group has a combination of fingerprints to open the door, any combination of main card + secondary card 1 + secondary card 2, custom number of people to open the door during working hours and off-duty hours, remote confirmation + personnel group selection. The door can only be opened when the conditions are met. That is, the maximum number of combinations of the system is 15*15*15=3375 main and secondary card combinations.
Previous article:Eight easy steps to install a home camera
Next article:Working principle and service life analysis of infrared lamp for explosion-proof cameras
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- Construction of CCS v5 software development environment for TMS320C6000
- About the IP address routing of the WiFi module
- DSP2812 code is blocked by compiler problem
- DSP TMS320F28335 interrupt vector table
- (3) UART DMA plus IDLE interrupt indefinite length byte reception
- This positioning hole and via are the same as repairing a building.
- SVPWM control of sensored BLDC cannot start when fixed sector 5
- TMS570 Learning 1- Creating Engineering Lighting
- Arteli AT32 WB415 Bluetooth function development help
- [DIY Creative LED] Introduction