Application of access control system based on second-generation ID card in hospital intelligent building

Publisher:QuantumPulseLatest update time:2012-03-01 Source: 百业博客 Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere

Problems in hospital management

Current hospital management model

The hospital adheres to the concept of "saving the dying and healing the wounded" and the service concept of "patient-centered", and strives to provide patients with a good medical environment. However, the hospital is a huge system with a large and diverse staff, and a wide variety of medical equipment and drugs that are expensive, which requires the hospital to have strict and effective management. At present, according to its own scale and development status, the hospital has two main management modes, namely personnel management and a combination of personnel management and technical management.

——People management

Personnel management is a relatively traditional and simple management model. It simply relies on personnel (mostly security guards) to control the entry and exit of hospital personnel, patrol, and take on duty. However, personnel management itself has certain defects and shortcomings:

(1) It is difficult to cover everything.

(2) It is easy to miss registration, miss reporting, and make human identification errors.

The model of relying solely on personnel management is inefficient and difficult to meet the management requirements of hospitals, especially large and medium-sized hospitals. Therefore, most hospitals adopt a combination of personnel management and technical management.

——Combination of personnel management and technical management

The use of access control systems, as a major achievement of security technology, has made up for the lack of personnel management. However, since the access control system cannot complete all security work independently, it is necessary to combine personnel management and technical management to better realize the management function. This management model is currently adopted by most hospitals. Among them, the most commonly used technical management is the RFID-based access control system.

The access control system controls and manages the door opening rights of the hospital's main gate, office building, inpatient wards, etc. The traditional access control system uses IC cards (contact or contactless) and ID cards to replace the traditional backward method of manually checking documents and opening doors with keys. Cardholders can only enter and exit access points after swiping their cards at authorized access points at the specified time. Since access control rights can be changed at any time, access control rights can be updated in a timely manner regardless of changes and flows of personnel, and there is no risk of theft when opening doors with keys. At the same time, access control entry and exit records are saved in a timely manner, which can provide direct basis for investigating security incidents.

Analysis of the current situation of hospital management

Judging from the current access control situation in hospitals, first of all, RFID-based access control systems are widely used. Access control systems based on biometric technology (fingerprint recognition, facial recognition) are more secure, but due to their higher technical requirements and stricter use environment, these performances limit the scope of use of access control systems based on biometric technology. Since RFID technology is relatively mature and the performance of access control system products using RFID technology is stable, most hospitals install and use RFID-based access control systems.

From the analysis of the use of access control systems in various departments of the hospital surveyed, not all departments and wards are equipped with access control systems. Most hospitals install and use access control systems in individual important departments, precision instrument rooms, such as radiology, ultrasound, blood laboratory, ICU, infectious area, finance room, sensitive drug room, etc. Due to the large turnover of personnel in these departments, including the entry and exit of medical staff, staff and special patients, the access control system must have both high security and be able to withstand high-intensity usage frequency (i.e. stability). However, the key card of the access control system based on RFID technology used by the hospital is an IC card or ID card, and the users are medical staff, staff, patients, and accompanying and visiting personnel.

At present, the most prominent problem in the use of access control systems is the key card problem. Holding multiple cards has become a phenomenon in people's daily lives. However, people still need to hold a key card to enter and exit access control points, which invisibly increases people's burden of multi-card management. Due to the multi-card phenomenon, it is easy to cause card loss. At the same time, it is difficult to avoid the phenomenon of card use, mixing and misusing. Once an accident occurs, it is difficult to distinguish the responsibility clearly. In addition, ordinary IC cards or ID cards are easy to copy, and there are safety hazards when using them.

Application of access control system based on second-generation ID card in hospital intelligent building

——Access control system with second-generation ID card as key card

The second-generation ID card is not only an important document for Chinese residents to prove their identity, but also a necessary document for people to travel and handle things. It can be seen that the second-generation ID card has become inseparable from people's lives and work. In daily life, the habit of carrying the second-generation ID card when going out has invisibly provided a broad space and platform for the use of access control systems based on the second-generation ID card. The second-generation ID card has an embedded smart chip, which is a special chip designed according to the management and security requirements of the issuance of ID cards in my country and has independent intellectual property rights. The production of the chip is undertaken by domestic manufacturers designated by the Ministry of Public Security. The production process of the second-generation ID card is strictly controlled. From this perspective, the access control system using the second-generation ID card as a key card is more secure.

In addition, the second-generation ID card has the following advantages as a key card: it is difficult to counterfeit. Counterfeiting the second-generation ID card is both technically difficult and a violation of the criminal law.

Since the second-generation ID card is a special document, it carries a large amount of residents' personal information. Therefore, people will have concerns about using the second-generation ID card as a key card. They are worried about the leakage of personal identity information when reading the second-generation ID card through the card reader of the access control system. However, in the development of the access control system based on the second-generation ID card, it can be designed to use the card reader to read the CSN (Card Serial Number) of the second-generation ID card, that is, the globally unique serial number, instead of reading the ID card number or other information on the second-generation ID card. In this way, the security of using the second-generation ID card as a key card is guaranteed, and people's concerns are also dispelled. At present, in the access control market, Perry Access Control System has developed and produced access control systems and single access control systems based on the second-generation ID card using the corresponding technical principles.

Whether from the importance of the second-generation ID card itself or for the protection of personal information, the use of the second-generation ID card as an access key card is less likely to be handed over to others to punch in than the traditional access key card. The phenomenon of mixed and misused cards can be effectively reduced.

Energy saving and environmental protection. From the perspective of long-term sustainable development, the access control system using the second-generation ID card can eliminate the management burden caused by the separate issuance of key cards, effectively reducing the waste of social resources and environmental pollution caused by repeated card issuance. At the same time, it reduces the trouble of multiple cards, effectively prevents counterfeiting, and reduces the risk of substitution.

——System Integration

Due to the time difference between the installation and use of various hospital management information systems, most hospitals have not completely realized the integration of various subsystems and the "unification" effect of the one-card system. For example, in terms of hospital security, almost all hospitals are equipped with monitoring equipment, and most hospitals use access control systems. However, when using these two systems, hospitals only apply monitoring and access control systems independently. Without integrating the two systems, on the one hand, the monitoring equipment runs all day, taking up a lot of hard disk space, and it is cumbersome to retrieve videos for a certain period of time; on the other hand, the system does not maximize its utility. If the access control system is linked with the monitoring system to realize the video linkage function, that is, when the second-generation ID card is swiped to enter a certain access control point, the monitoring recording function is turned on, and the monitoring system is idle when no one is around. This will greatly save hard disk space, while improving security efficiency and achieving "targeted".

Visitor and access control linkage. For some special departments and wards in the hospital, it is necessary to strictly control the entry and exit of personnel, such as the radiology department, blood laboratory, ultrasound department, infectious disease ward, neonatal room, pharmacy, finance office, employee passage, etc. These departments need to install access control systems to strengthen the management of personnel entering and leaving. The characteristics of these departments are that the personnel entering and leaving include both medical staff and patients, and may also be accompanied by visiting and accompanying personnel. Therefore, it is necessary to grant different door opening permissions to the above personnel. Similarly, the visitor system and access control system linkage are developed based on the second-generation ID card. For medical staff, they are hospital employees, and the corresponding access control permissions can be directly granted to employees. For patients and visiting and accompanying personnel, the linkage between the visitor system and the access control system can be used to realize the registration of visitors by swiping the second-generation ID card, and the access control authorization of the department visited, which reduces the card replacement link. This system integration not only ensures the quality of hospital management, but also greatly reduces the workload of personnel management.

Reference address:Application of access control system based on second-generation ID card in hospital intelligent building

Previous article:Design and implementation of pulse wave measurement system based on J2ME
Next article:Application of network monitoring system and alarm linkage technology in hospitals

Latest Medical Electronics Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号