Month: September 2019

Access control system development trend in the next 5 years

       According to a report by Marketsandmarkets on the access control market, the access control industry is expected to grow from $7.5 billion in 2018 to $12.1 billion in 2024, with a compound annual growth rate of 8.24%. The main drivers of the growth of the access control market are the increase in the global crime rate, the adoption rate of access control solutions by users, and the deployment of security systems such as wireless technologies and the security systems based on the Internet of Things and cloud computing platforms. Universal application.

        The report pointed out that the application of access control as a service (ACaaS), based on the popularity of mobile access control, and the increasing level of urbanization in emerging countries, combined these factors provide a broad market for access control manufacturers. Among them, biometric readers are expected to grow at the highest compound annual growth rate in the next five years (2019-2014), including fingerprint recognition, iris recognition, and face recognition. Biometric readers have achieved the best development period due to the increasing demand for security from government facilities, factories, power stations, defense agencies, and corporate units.

        Researchers predict that in the vertical market, the family housing access market will have the highest compound annual growth rate over the next five years. In smart home systems, access control systems are mainly used to improve security. The key factors driving this market growth are the global crime rate and the continuous improvement of technology. The current users' demand for dangerous detection such as fire and gas leakage is increasing. To ensure the safety of children and the elderly at home. At the same time, the growing guide to the home market is also promoting the upgrade of access control solutions from another dimension.

        Increasing security issues will drive demand for access control solutions for users in the Asia Pacific region, so the region is also seen as the region with the highest compound annual growth rate in the future. Factors such as industrialization, commercialization, and increased demand for security systems have become key factors in the development of the market. In addition, compared with other regional markets, the increasing mismatch between crime rate and police configuration also allows users to generate more for the access control system. demand.

Beijing Haidian pilot 5G smart community

        Recently, the pilot 5G smart community in a residential area in Beijing Haidian has aroused everyone's enthusiastic attention.

        The community of the pilot 5G smart community is a typical old community, with dense personnel and vehicles, commercialization of the residential environment, and small advertisements in the community affecting the community environment. Controlling the entry and exit of outsiders and caring for the elderly and children are two management problems.

        Nowadays, a face recognition access control system combining 5G technology is installed. A high-definition AI camera based on 5G network settings is installed around the community to realize advanced functions such as face recognition, face control, and big data analysis. Residents of the community quickly enter and exit by brushing their faces, greatly improving the recognition efficiency of outsiders and the recognition of vehicle license plates, and strive to create a safe, efficient and inclusive community environment. It is worth mentioning that the planning of the community is relatively old, and there is a perspective that video cameras are difficult to shoot. However, the set of face recognition access control system also sets the camera for sound setting at these angles, and sends out a "life-saving" shout with a camera monitoring capture and an alarm signal to effectively remind the community security personnel.

        The face recognition access control system can realize intelligent guardianship for the elderly who are widowed and widowed. The system does not go out for more than 24 hours. The system automatically sends a signal to remind the community personnel to take relevant measures to search and care, and to improve the happiness of the elderly residents. The system comes with a camera that can send out “徘徊 alarms”. If someone is in the prescribed area for a long time, the system will automatically send out an alarm to remind the community security personnel to provide adequate security for the children in the community.

        According to the staff of the community, after about half a year of pilot operation of the face recognition access control system combined with 5G technology, the order and environment of the community are constantly improving, and the happiness and security of the residents of the community have been greatly improved.

The principle of four mainstream near field recognition technologies for mobile phone access control

In recent years, mobile applications have been extremely popular. Mobile Internet means such as WeChat payment and Alipay payment parking fees have been swaying in the parking lot, which has led to the development of mobile phone access control in the development of the inaccessible security industry.

At present, there are four main solutions for mobile smart access control at the technical level: Bluetooth, NFC, QR code and WIFI. Let's take a brief analysis of the implementation and advantages and disadvantages of these four technologies.

Bluetooth technology

Technical background: Bluetooth technology is very mature, it is a wireless technology standard, which can realize short-distance data exchange between fixed equipment, mobile equipment and building personal area network (UHF radio waves using ISM band of 2.2-4.85GHz) ). Bluetooth technology was originally created in 1994 by the telecom giant Ericsson as an alternative to the RS232 data line. Bluetooth can connect multiple devices, overcoming the challenges of data synchronization.

Implementation: Bluetooth access control can be connected to the access control with a distance of about 8 meters in the case of no obstruction interference. The Bluetooth service is called by the app on the mobile phone side, the intelligent hardware is installed on the access control end, and the door lock is controlled after receiving the Bluetooth command. .

 

advantage:

1. Mature technology;

2. The transformation cost is lower;

3. Long control distance;

Disadvantages:

1. The mobile phone needs to be turned on by the mobile phone;

2. If there is obstruction, it will affect the reading effect;

3. According to the analysis of TOP600 model data in May 2016, most of the smartphones support Bluetooth, but there are about 200 models supporting BLE Bluetooth 4.0, accounting for 33% of the mainstream models, that is, only 2015. The models introduced in the year may support Bluetooth 4.0, and 67% of the models do not support BLE Bluetooth 4.0. Therefore, the popularity of Bluetooth access control is very large.

  NFC technology

Technical Background: This technology evolved from contactless radio frequency identification (RFID), developed by Philips Semiconductors (now NXP Semiconductors), Nokia and Sony, based on RFID and interconnect technology. Near Field Communication (NFC) is a short-range, high-frequency radio technology that operates at a distance of 10 cm at 13.56 MHz. The transmission speed is 106 Kbit/s, 212 Kbit/s or 424 Kbit/s. At present, near field communication has passed the ISO/IEC IS 18092 international standard, the ECMA-340 standard and the ETSI TS 102 190 standard.

Implementation: First, you need a mobile device with NFC capabilities. Second, you need to configure the hardware that can read the virtual credential card from an NFC-enabled mobile device. Finally, an ecosystem must be developed that includes mobile network operators, trusted service managers, and other operators that provide and manage mobile credential cards.

advantage:

1, the setting procedure is shorter, the use of NFC instead of manual settings will greatly speed up the creation of the connection: less than one tenth of a second;

2, low power consumption, only one machine link at a time, with a high degree of confidentiality and security.

Disadvantages:

NFC-enabled phones are less than Bluetooth 4.0, accounting for about 15.4%. Therefore, NFC is good, but it is only suitable for specific occasions.

QR code technology

Technical background: 2-dimensional bar code is a black and white graphic that records a certain geometric pattern in a plane (two-dimensional direction) with a certain geometric pattern; The concept of "0" and "1" bitstreams that make up the internal logic of the computer is skillfully used, and several geometric shapes corresponding to binary are used to represent the literal numerical information, and the image input device or the photoelectric scanning device automatically recognizes Read to achieve automatic processing of information; it has some commonality of bar code technology: each code system has its own specific character set; each character occupies a certain width; has a certain check function. At the same time, it also has automatic recognition function for different rows of information, and handles the rotation change point of the graphic.

Implementation: Two-dimensional code access control uses two-dimensional code as the medium and carrier for personal identification. The system assigns each user a real-time encrypted two-dimensional code. The user can open the corresponding code by scanning the two-dimensional code on the access control device. Door lock.

advantage:

1. The current application of QR code is very wide, and it is convenient and easy to use, which is conducive to popularization;

2. The two-dimensional code can integrate two functions of access control management and visitor management.

3, whether using the APP or the public number, can support most smartphones;

4. User experience is better.

Disadvantages:

1. The QR code is easy to be copied, and there are security risks;

2. The cost of transformation is relatively high.

WIFI technology

Technical background: Wireless network technology was invented by the Australian government research institute CSIRO in the 1990s and successfully applied for wireless network technology patents in the United States in 1996. Almost all smartphones, tablets and laptops support Wi-Fi Internet access and are the most widely used wireless network transmission technology today. WIFI is not affected by the hardware chip and operating system, the connection speed is fast, it can be connected one-to-many, and it can also directly connect to the Internet. The WIFI protocol implements the globally compliant standard 802.11n protocol, which is forward-looking and has been released since then. It has never been replaced, and there is no compatibility problem. It is suitable for all mobile phones.

Implementation: It is widely used in the intelligent community. It is usually used together with monitoring and access control through APP.

advantage:

1, using WIFI access control, usually one of the applications of the smart community, compatibility, large capacity, and rich features;

2, the communication protocol is a unified standard 802.11n, all smart phones can be stable and applicable;

3, the background management is convenient, and can be opened remotely.

Disadvantages:

1, need to access the network, the cost of transformation is higher;

2, WIFI access control is highly dependent on the network, if there is a phenomenon of network disconnection, network signal transmission instability, etc., it will directly affect the application of this function.

The state strongly supports the development of the face recognition technology industry

        Face recognition is a kind of biometric identification technology that implements identity recognition based on human facial basic characteristic data information. Face recognition differs from the five advantages of other basic characteristics recognition methods, and its non-intrusiveness, convenience, friendliness, non-contact, scalability, and so on.
 
        Since 2015, the state has issued guidelines for the opening of RMB accounts for banking financial institutions (draft for comments), which has opened the door for the popularization of face recognition; thereafter, the security and security video surveillance face recognition system technology Regulations, data security technology, Internet face recognition verification system, security technical regulations, and other laws and regulations have laid a solid foundation for the popularization of face recognition in the financial, security, medical and other industries, clearing the policy obstacles. In the same period, in 2017, artificial intelligence was first written into the National Political Situation Report. As a major segment of artificial intelligence, the country's policy compatibility related to face recognition continues to increase. The three-year action plan for promoting the development of a new generation of artificial intelligence industry (20182020) released in December 2017 is scheduled to be 2020. The face detection efficiency is more than 97, and the correct recognition rate is over 90.
 
人脸识别相关政策
Information from: Lishang Industry Research Institute
 
        Since 2016, face recognition has been frequently used in banks, securities, financial social security, transportation, education, e-commerce and other places, and the heat is still high. Face recognition plays a major role in the city under the craze of smart city development. Under the policy compatibility, the prospect of face recognition in China is bright.
 
        Relevant analysis reports show that the size of the face recognition market will be maintained at around 20%. By 2022, the size of the world face recognition market will reach $7.595 billion. The domestic face recognition market accounts for about 10% of the world's markets, and he is expected to continue to expand.
 
        In the same period of the continuous expansion of the face recognition market in China, the face recognition technology manufacturers are quietly rising, and the team continues to grow. Emerging units, such as contempt, business soup, wisdom eye, and illustration, have grown rapidly in the past few years. Hikvision, supported by traditional security techniques, has emerged in China and its international arena. , Dahua shares, Jiadu Technology and other units, collection of modern security technology, the use of face recognition more rational and effective in security practice.
 
         Ximo Wisdom is supported by technology and keeps pace with the times. It is a high-tech enterprise focusing on smart families in smart communities. The company has deep technical accumulation in Internet audio and video communication, intelligent hardware, security and artificial intelligence; in Beijing Shanghai, Xi'an, Changsha, Weifang, Chongqing and other places have branches and offices, with national service capabilities. The company has the industry-leading mobile Internet-based smart community smart home series products and solutions, the main products mobile phone Bluetooth QR code cloud access control, face recognition cloud intercom, community robots, smart home products and cloud platforms; for Vanke, Stars, Construction Bank, Agricultural Bank, Jinke, Fangyuan, Zhujiang Real Estate, R&F, Shangpu, Weigu and other domestic famous brands provide products and services for many real estate, internet and security companies in Malaysia, Singapore, the United States, and the United Kingdom. Based on the business philosophy of “customer first, quality first, serious and hard work”, the company is open and win-win, constantly creating high-quality products, returning customers with quality products, and creating a better community service!

Face recognition and intelligent analysis technology merge, the prospect is expected

        Among the biometric technologies, face recognition has unparalleled strengths. The video analysis intelligent alarm system based on face recognition can capture the face, human form and other characteristics at any time in different care places for the escaping population, suspect population, controlled population, and out-of-control population. The basic characteristics of the archives in the library are compared, and the identity of the object being guarded is implemented, and the warning is given at any time.
1. Rapid development of biometric technology
        Biological identification can be roughly divided into two categories: physical characteristics and behavioral characteristics. The basic characteristics of the body as well as: fingerprint recognition, veins, palms, retina, iris, body odor, face, and even blood vessels, DNA, bones and other characteristics of the path and: signature, voice, walking gait.
        At present, biometrics technology is becoming more and more mature, and it has been well utilized in various economic and social industries. It has obvious advantages in dealing with security difficulties and improving task efficiency. In the coming days, the integration and diversification of multiple biometric technologies over time will promote the popularization of products and solutions corresponding to China's multiple biometric technologies, and will actively promote market demand and transform into cross-biotechnology. Emerging industries in the security, IT and other industries.
         Integrating bio-resolution technology into the Internet video watchdog platform, integrating the resolution algorithm into the intelligent analysis of video watchdog, will help the accurate analysis of intelligent profiling, and at the same time, rely on high-definition video surveillance technology to drive biological resolution from near The distance is identified by long-distance identification, from static resolution to dynamic identification, from small groups to large groups.
2, face recognition is widely used in intelligent profiling
        The intelligent video care system uses networked, intelligent video watchers and image processing, computer vision, and artificial intelligence to presuppose conditions. The video is deployed in the care system to intelligently analyze the video content at any time. The abnormal information data in the caretaker image was found, and an early warning was issued to assist the number of people in charge to handle the crisis. At present, intelligent analysis technology has behavior analysis, basic feature recognition, video diagnosis, and classification calculation.
         Through several years of rapid development, the application of video intelligence analysis has a high core density in advanced markets such as the military, political, judicial, financial, transportation, surveillance, nuclear power plants, airports and ports, and then to industrial facilities, education, medical care, etc. The mid-end market has now penetrated into residential markets such as residential areas, retail stores, warehouse management, and logistics. It can be said that the use of video intelligence analysis in the domestic intelligent security has been a hundred flowers.
        The video analysis intelligent alarm system based on face recognition can capture the face, human form and other basics in different guarding places for the number of people who are escaping, the number of suspected population, the number of controlled population, and the number of people out of control. The characteristics, after comparison with the basic characteristics of the archives in the template library, realize the identity of the object being watched, and timely warning. The front-end equipment of the system realizes the early warning function of the suspicious target. When it is found that there are suspicious targets within the scope of the guard screen, the high-definition picture of the suspicious target is immediately sent to the center of gravity service platform, and the time generated by the target is marked at the same time, which is convenient for the next time. Check the video in one step.
3, face recognition implant video surveillance technology difficulties
       With the tangible development of face recognition technology, face recognition technology will realize the deepening of the digital watch system and become a further application field of face recognition technology. According to statistics, only in the domestic mainland, in the next few years is expected to transform adult sales over 10 billion, and in the next decade is expected to transform into a market scale of annual sales of over 100 billion. Along with the in-depth development of China's peaceful cities and smart city projects, the high-definition of urban guards has become popular, and the total number of cameras has risen on a large scale, which has greatly reduced the face recognition in the extraction of information data and promoted the quality of face recognition. . The connection between face recognition and guard technology has been re-used in the judicial system, which is in line with the urgent need of the public security organ system for functions such as city custody, fugitive pursuit, blacklist investigation, etc., which will be a good helper for the popularization of face recognition technology.
       Face recognition is divided into three categories: identification, authentication, and supervision. The identification is a process of comparing the face image of an unknown person with a face image of a known identity in the database to confirm the identity of the unknown person. It is a one-to-many face recognition authentication that is the face image of the person who is now recognized. Aligning with the face image in the database that is claimed by someone else to authenticate the right or wrong order of the identified person, in the case of a one-to-one face recognition monitoring target, to treat an unknown identity The sample to be tested, the face recognition system detects whether it is on the supervision roster, and belongs to one-to-many face recognition.
       In the identification, it is the most difficult to monitor the target person. The key reason depends on the discriminative mode of involuntary and the difference of the place. The changes in posture, illumination, age and face resolution seriously affect people. Face recognition rate. Many research companies are always studying how to apply face recognition technology to guards. At this moment, the first thing that should be considered is still taking a good face image. In addition to the algorithmic efforts, from the beginning of the system utilization, the key needs to get the following troubles: system structure difficulties, face resolution problems, gesture troubles, lighting troubles and age difficulties.

 

Houses without artificial intelligence are rough houses

Bill Gates said: "There are no artificial intelligence houses in the future, all of which are rough houses."

 

When technology is no longer out of reach, the intelligent scenes in the movie are beginning to enter everyone's life: automatically launch the application scene according to your work schedule, control the home appliances through voice, use fingerprints or face recognition system to open the home. More than one security...

While giving science to building wisdom, technology has also begun to subvert traditions and subvert people's old perceptions of home.

A good community is not only to provide owners with a house with comfortable rest, but also to let people living here find more possibilities for a better life. The use of face recognition technology in smart security will definitely improve the community safety factor, the community is safe and worry-free, and life can be brilliant. With the wisdom of science and technology, we will open a new era of intelligent living.

Face recognition is a biometric recognition technology based on human facial features, namely “brushing face”. The industry mainly enters the scope of the camera through the access control, and the system will quickly capture the face for identification, analyze the face, judge the identity, prompt the person within the authority and open the door.

In terms of community security control, although there are a large number of HD cameras, these cameras only have simple shooting and recording functions. Due to the lack of unified planning, monitoring equipment can easily lead to redundant construction and cannot form bottom-up intelligence. Unified management. Once a malignant event occurs, the video in the area can usually be fully screened after the event to find evidence and then process the event itself. Because it is not smart, it requires a lot of manpower to check the video itself, which is difficult to coordinate and cooperate effectively.

Face recognition technology, as part of an intelligent surveillance system, directly helps users extract the most useful information – “people” from the video screen. This will greatly enhance the value of the monitoring system, making the monitoring system no longer a "dull" video, and letting it "know people" is a very good application mode.

The community installs face recognition access or gates, and the face recognition system is set up at the main entrance and exit of the gate to automatically identify the residents of the community, which is safe and convenient, and builds a strong and favorable security line for the owners.

Face recognition access control system application

The face recognition access control system mainly collects face information through the camera, and compares with the huge face template in the background to confirm that the community or floor residents can freely pass. In this way, even if you forget to bring a magnetic card, fingerprint deformation, forget the password, you will not be stopped at the gate of the community, "brush face" access, safe and sanitary.

 

Face access control in the enterprise park, government office building and other places using face recognition technology in the access control system to do the permission "key", by capturing the face and pre-recorded face database comparison, for different areas, different access points The access rights of different time periods are judged by the special "card" of the face, and the opening of the access control system in the building is controlled. Mainly based on face recognition control equipment, combined with IC card, fingerprint and other methods on the basis of face verification, the security is further strengthened and guaranteed.

 

One of the representative products of face recognition access control is the human face gate. The face gate is a product that realizes personnel management, personnel storage and comparison record function through the face recognition system, mainly by importing personnel photos into the database or the scene in advance. The method of brushing the face, verifying the identity of the incoming and outgoing personnel, and querying and exporting the visiting records.

 

First, the function of face recognition access control

 

Common face access applications have the following features:

 

1. Internal and external personnel diversion management, VIP visitor experience upgrade

 

The personnel information can be entered into the database, and the internal personnel can directly brush the face in and out of the gate. The external visitors only need to simply register the information and then brush the face to enter. The intelligent face recognition greatly saves the time for personnel to enter and exit, and the visit of the personnel is also efficient. Orderly management. For VIP visitors, the administrator can enter images in the face database in advance, and visitors do not need to register when visiting, and directly brush their faces to enhance the image of corporate access.

 

2. Infrared recognition of human face, security upgrade under high accuracy

 

The face gate adopts infrared recognition face technology, which has strong anti-interference ability, can reduce the influence of external environment and position such as illumination, accurately extract face attributes for real-life dynamic comparison, and greatly reduce the recognition error. When a person fails to compare information in the database, it cannot enter. This ensures the safety of the entry personnel. Unregistered outsiders and non-Courin personnel cannot impersonate others to enter, even if they take photos of others, they can't “swipe their faces”.

 

3. Multi-entry data interconnection to achieve cross-door management

 

When there are multiple entrances in the same unit, multiple face gates can be installed. The face gates in different areas have a unified database and terminal management platform, so that the face switches of each area can realize data interconnection and more The entrances are managed in a unified manner. Specific to different units, will also be based on the actual situation to develop a corresponding custom face shutter solution.

 

Second, the role of face recognition access control

 

The population of the community is concentrated, and the situation of personnel access is complicated. There are friends and family, express delivery, and unknown strangers. Due to the large flow of people and the energy problems of managers, the management of entrances and exits has not been ideal. In addition, problems such as loss of magnetic cards, password leakage, and theft of fingerprints have not been effectively solved. Many illegal elements have sneaked into the security incidents in the community. usually

 

Face recognition access control system, combined with face recognition, face comparison, Internet of Things and other technologies to achieve identity cross-validation, to help community managers accurately user identity. It is understood that due to the intuitive nature of the face and the characteristics of being difficult to be copied, the face recognition access control system can effectively block strangers from entering and leaving the community at will, reduce the frequency of community safety accidents as much as possible, and strengthen the community security system.

 

With the rapid development of face recognition technology, the optimization of face recognition access control goes further. At present, the recognition rate of face recognition technology is not affected by external factors such as makeup technology, portrait photos, mask models, day and night. It is hard for strangers to enter the community with camouflage.

 

Compared with the traditional fingerprint and magnetic card access control system management, the face recognition access control system is more intelligent and convenient in management applications. In the past, changes in community personnel required the timely replacement of fingerprints, magnetic cards and keys. After the face recognition access control is put into use, the newly-occupied users only need to level the face information in the community management office, and they can freely enter and exit, which greatly saves the management cost of the community personnel.

 

Access control as the first level of residential environment security, its importance is self-evident, the design of the access control system has gradually become the focus of the security market. At the moment when artificial intelligence technology is blooming, face recognition has sprung up everywhere, and with the help of Dongfeng, the face recognition access control has been pushed to the market. At present, the face recognition access control system has been applied in the fields of finance, security, education, office, building management and so on.

Face recognition access control system creates intelligent property

The old community has more or less management problems. Advertising, advertising, leaflets, and people who do not know the vehicles are free to enter and exit, which brings great security risks. But the application of the face recognition system solves this hidden danger.

Of course, some residents have raised questions: Do you want to do it at night? Black, face can't see clearly, how to brush your face? For night face recognition, face recognition technology is not the same as before, ambient light for today's face The recognition technology has little effect, and it is easy to recognize faces even under night light. "Cannot recognize faces at night" is just a problem that is not a problem.

First, eliminate strangers in and out at will, strengthen community safety management

The old community has more or less management problems. Advertising, advertising, leaflets, and people who do not know the vehicles are free to enter and exit, which brings great security risks. After the access control system was activated, the phenomenon was obviously alleviated, but the unintentional people could not be stopped. Access control card copying cost is low, fingerprints can be replaced by fingerprint film, as long as you want to come in, what access control is not a problem

Before the face recognition access control system is officially launched, the community service center will notify the residents to enter ID information and face collection. After the face recognition access control is officially launched, people who have not registered information in the system are not free to enter and exit, effectively preventing strangers from entering and leaving at will, and further strengthening community safety management.

What should I do if my relatives and friends come to visit and want to enter the community? Every time I have to open the door myself? Obviously unrealistic. In response to this problem, the community management explained: “The owner tenant can confirm the identity of the visitor by telephone, video, etc., and then register the temporary face and ID card, and then can enter and leave the community smoothly.

Due to frequent changes in the population of the community, such as moving, renting, etc., the management office needs to promptly replace fingerprint data for new residents, equipped with access cards, keys, etc., which is very troublesome. After the face recognition access control is put into use, the new residents only need to register the face information in the community management office, and they can freely enter and exit, which greatly saves the management cost of the community personnel.

Face recognition, once seemingly inscrutable, is now within reach. The application of face recognition access control changes the previous access mode, effectively blocks strangers from entering and leaving the community at will, reduces the frequency of community security accidents as much as possible, improves the living experience of residents, promotes the technicalization of community services, and creates a brand new property management model. Achieve intelligent management.

Second, improve the safety and convenience of the owner's residential use, upgrade the intelligent management

safer

When the face access control system is enabled in the cell access control system, the problem of security risks caused by the easy copying of the old-fashion access control card is solved. The face recognition access control system is based on the face recognition technology. The face has the characteristics of being difficult to copy. Compared with the traditional access control card and fingerprint, it is safer and not easy to imitate. The stranger can't rely on makeup, wearing a wig, wearing a hat. Dive into the glasses and other methods.

More convenient

Almost every owner has lost and forgot to carry the access control card. He can only ask the security guard to open the door, but face recognition does not have such concerns. I also think about the rainy days: the residents are carrying big bags and carrying the baby, and they have to vacate a hand to find the key to open the door, and they are in a hurry. This situation can be said to be very inconvenient. The face recognition access control system is This kind of flaw has been solved for the owners.

The face recognition access control system has the function of actively capturing the face. The main owner enters the camera recognition range, the system will respond quickly, and the face database is compared and recognized. The display is successfully recognized, the door will be automatically unlocked, and the residents can freely enter and exit. You don't need to free your hands to swipe your card, brush your fingerprints or lose your password. It really liberates your hands and makes you humanized.

Because the owner often loses the access card or the card is damaged, it is very troublesome to re-install the access card and key. With the face recognition access control system, the owner only needs to collect face information at the cell management office once, no longer worry about the trouble of losing or replenishing.

Open a new life for the owners

Smart communities are often mentioned

However, many people always feel like castles in the air.

Then

Smart community application scenario

Long rent apartment

Efficient apartment management

Smart property

Efficient management of 100,000+ people's lives every year, office

Smart home

Easy, safe, convenient and comfortable metal smart life

Wisdom site

Relying on face recognition technology to improve the safety management level of the site

Smart agriculture, smart farming

Monitor plant, animal growth, environment, etc. through various sensors, provide planting and breeding assistance based on big data analysis, and increase agricultural output

Open community service

Through the APP, the owner canQuickly inquire / pay property fees, participate in community activities, fast repair, QR code opening, one-click remote opening, visitor invitation, community announcement anytime, anywhereWait. When the owner picks up the mobile phone, he can easily understand the announcements and related information of the community, and can pay the property fee when he is at home.

Inquiry / payment of property fees

快速报修

 

This will greatly facilitate the owner's life service, and also improve the efficiency of the property management, reduce costs, and improve the satisfaction of the owners

From the initial exploration to the wide-ranging landing today, the development trend of smart communities has become increasingly clear. Many real estate and property companies have stepped up their efforts to explore the development of smart communities. Ximo Wisdom has always focused on the development and construction of smart communities and jointly promoted the process of building smart communities in China. While helping more real estate or property service companies to improve operational efficiency, Ximo will provide more safe, convenient and smarter community life experiences and services to more owners.

 

How convenient is the QR code access control?

Under the impact of the Internet wave, with the improvement of people's quality of life and the expansion of urban community size, traditional access control cards are increasingly popular with the public because of “inconvenient carrying”, “card loss” and “security risks that are easily copied and cracked”. Not recognized! The mobile phone QR code access not only makes up for this shortcoming, but also integrates the value-added services of mobile phones.

In response to market demand, Shenzhen Ximo manufacturers have launched a mobile phone QR code access control solution, using bar code technology and Internet of Things technology, combined with mobile phone QR code scanner to integrate the property management system perfectly, and expand the mobile phone “scan code” Value-added services that open the door. Realize a more convenient, more stable, safer and more efficient door opening service to create a safe and comfortable living environment for the public.

While retaining the traditional access control card, the smartphone can be used as a carrier, and the function of opening the door by brushing the mobile phone QR code is added at the access control end. The property upgrade management system, combined with the mobile phone two-dimensional code access control system at the access control end, the community owner only needs to open the WeChat applet and obtain the right to use the mobile phone QR code access control through the real-name authentication of the mobile phone number. If the mobile phone is lost, you can apply for a new scan code to open the door at the property, or use other methods such as IC card, fen certificate, password, etc. If the original mobile phone number is still used, you can directly enter the small mobile phone number. The program is fine. The settlement of the security of the residential quarters, multiple protection owners can not open the door to enter the door.

It replaces the traditional door card, the installation is simple, the maintenance cost is low, and the door opening function is integrated into the mobile phone, which is convenient for work and life. Through QR code visitor management, we can solve the troubles of relying on manpower registration to visit people in the past. The addition and change of permissions become very flexible, and the access situation can be mastered in real time. All problems can be solved remotely, and it can be ensured in time and effectively. Access to public places is safe. A large number of practical cases show that the mobile phone two-dimensional code access can provide a huge drainage for the smart community platform, forming a real and effective "closed loop", better taking into account property income and convenient access. Using mobile phones to open the door can effectively collect in and out data, master the flow of people, high and low peaks, and relevant departments can arrange human coordination scientifically and reasonably, reduce congestion in and out, improve user experience, and save labor costs. Give full play to the mobile phone QR code recognition and data transmission performance, combined with the mobile phone QR code access control system, to bring the new and fashionable mobile phone "scan code open door" experience to the community owners, and provide hardware support for the efficient operation of property access control, killing two birds with one stone.

The intelligent access control adopts the mainstream two-dimensional code scanning technology, which has high security, strong versatility, stable quality and low failure rate. At the same time, in the information management, data can be saved and updated in time, which can grasp the community faster and more accurately. The entry and exit of personnel.

We use the self-developed intelligent core decoding technology, which is specially designed for mobile phone screen code reading. In addition to quickly reading the screen code of the mobile phone, the bar code information on the paper document can be easily identified; in addition, it The core function of the modular design can be perfectly embedded with terminals such as smart access control and bus QR code card reader.

切换注册

登录

忘记密码 ?

切换登录

注册

Product Series:

Intelligent face recognition cloud intercom series

AI monitoring series

Cloud access control IoT lock series

Smart Home Series

Internet of things series

Intelligent channel smart parking series

Solution:

Intelligent waste sorting system

Smart community solutions

Smart campus solutions

Smart Building Solutions

contact us:

客服:4001883169‬

商务:0755-28688395‬

mailbox:sales@thinmoo.com

Address:Block East 3rd floor,Bantian High-Tech Park,Longgang District,Shenzhen,China

 

 

Official WeChat:

 

Scan code attention to the public number

ICP 15107074
en_USEnglish
zh_CN简体中文 en_USEnglish
Skip to toolbar