logo
There is currently no information to display
Please add data record on website background.
搜索
Search
201

News

01

 

01

/
/
-
Access the domestic market is experiencing a "shuffle" tends to polarize

Details

Access the domestic market is experiencing a "shuffle" tends to polarize

  • Categories:Industry News
  • Author:
  • Origin:
  • Time of issue:2016-07-14 00:00
  • Views:

(Summary description)

Access the domestic market is experiencing a "shuffle" tends to polarize

(Summary description)

  • Categories:Industry News
  • Author:
  • Origin:
  • Time of issue:2016-07-14 00:00
  • Views:
Information

Judging from the trend, the domestic market is experiencing access "shuffle", a considerable number do not have the strength or the technical strength of the R & D of small-scale enterprises will therefore be more difficult to survive, but with strong R & D strength, innovative technology manufacturers will be more powerful, polarization further.

Card access control system is the most widely used subsystems, from the introduction of the country so far, with the application development system and expand the user to access the system in-depth knowledge, experience multiple stages. Currently users of the access control system requirements is mainly reflected in the following aspects, such as: whether the system is stable, whether it can support many types of cards, whether to support various forms of authentication, compatibility with third-party systems, the communication speed of reaction time, the system how the architecture and other major aspects.

Integrated Access Card

With the rapid development of digital network security systems, network product range continues to expand, access control system from the traditional RS485 bus transmission steadily to TCP / IP network depth direction.

RS485 communication limited number of nodes, transmission distance, communication speed and other aspects of restricted its applications, particularly large-scale application access control system. And based on TCP / IP network communication access control system, with no node limitation, covering a wide range of communication speed interference and other advantages, the overall leader in the RS485 bus mode, of course, will get many users, especially large-scale access control system users.

Must draw attention to the fact that some uses external or built-in network switch access control systems on the market, in fact, is the use of RS485 to TCP / IP middleware, network access control is not in the true sense. Internet access in the true sense, its access controllers generally use 32-bit microprocessor ARM7 / 9 to achieve.

With full TCP / IP mode access control system, can take advantage of network resources have been built, new wiring works less, you can use across the region without distance limitations, information transmission and storage capacity can be improved significantly. However, if the project would have no network, dedicated network erection but increased the initial investment cost is still the main application of more than 100 large-scale systems.

Technological development on the other hand, is the access control system and other security decency integration, primarily the integration of video surveillance systems, intrusion alarm systems, perimeter detection systems, fire alarm systems, building automation systems. This combination provides an effective structure to enhance various systems complement each other. For example, once you have an event that triggered the alarm, it will send a signal to the video surveillance system to provide real-time video of the scene of the incident, while the corresponding linkage blocked access control system access channel.

In addition, integration with access control card system will be more closely, will range more widely, penetrated into all areas of society, and play an increasingly important role. In addition to containing access control, time and attendance, documents, patrol, dining, consumer, health, medical, car park, library, meeting attendance, visitor management, elevator control management, office equipment management, clubs and entertainment, three tables and property payments, etc., also with other intelligent systems integration and linkage necessary, such as burglar alarms, closed-circuit monitoring, fire alarm, and even building automation systems.

In addition, the system will also work with ERP systems for data interfaces, such as attendance and payroll, personnel management and other interactive data, in accordance with each other.

Access Card intention

Essentially speaking, the real access control card management system should be based on the "one card, a library network" and design ideas. "One Card" is to achieve access control, attendance on a card, dining, Patrol, car parks, consumer entertainment, shopping and other internal functions. "A library" is on the same software management platform, card issuance, report the loss, recharge, query data management, all systems share a database. "Network" is the end of each system to access the LAN data transmission and information exchange.

True card management system should have the following features:

Data sharing: use of system resources, accelerate the speed of data exchange.

Real-time monitoring: for all terminals within the system for real-time monitoring.

Quick Search: In the same time a database can retrieve all records, improve efficiency and accuracy.

General Statistics: All statistical reports can be completed in the Administration Center.

Easy management: the management center to be completed in the management of all systems.

Intelligence and security systems to the present, the card is already integrated management trend, simple patchwork "card" has been unable to meet the real needs and requirements of the card inside the system seamlessly links, as well as other external intelligence organic Response system

Access control card security issues of concern

Is an important carrier card, card access control systems is directly related to the choice of system security.

IC card stands for integrated circuit card (IntegratedCircuitCard), also known as a smart card (SmartCard). This kind of card frequency is 13.56MHz, can read and write, large capacity, is divided into 16 sectors, there is encryption, reliable data recording, easy to use, such as card systems, consumer systems, is currently the main PHILIPS Mifare1 series cards. Full name ID card identification card (IdentificationCard), proximity card is a non-written, with a fixed number, frequency of 125KHz, there are mainly EM, HID, TI, INDALA other species.

ID card because of its poor security, easy to copy, mainly for low-end market, as well as the safety of lower requirements, and thus become the preferred IC card access control system. The industry generally accepted IC card devaluation Mifare1 card, openness and versatility are better, such as Guangzhou's "Yangcheng Tong" card Mifare1 card is used.

An outgoing message shocked the IC card industry. German and American researchers have successfully cracked the security algorithm Mifare1 chip. Mifare1 chip is mainly used for access control card access control systems, as well as some small payment card, the application scope has covered the globe. So the "results" caused quite a panic, because a master criminals that break technique can clone any access cards, thus free access to government buildings or corporate offices; various batches clone or counterfeit cards wantonly Shopping without being detected. This card is issued by the country, estimated at hundreds of millions of sheets put into use, it relates to the security interests of a large number of operating units and cardholder. In this way, vandals can use very inexpensive devices within 40ms can easily get a M1 card password.

After Mifare1 card security problems exposed, some companies have publicly declared that the solution in which the magic is called "one card for a secret", that is, each sector of each card key is not the same, use CPU card loading system root key, according to Mifare1 card unique serial number calculation sub-key, a card is to prevent cracks and affect the entire system. In fact, this solution before Mifare1 card cracks had appeared. So, a card and a secret really solve security problems Mifare1 Mody, authentication mechanisms we still want to proceed with the analysis Mifare1 card.

In fact, such a card and a secret approach is borrowed from the CPU card authentication mechanism in a card for a secret concepts, but it is intentionally or unintentionally overlooked a very important fact that the CPU card and the logic encryption card is completely different two cards, which is completely different authentication mechanism. Since the internal CPU card has a CPU processor and operating system COS, certification process is completely between the user card and SAM card, the certification process is transmitted random number and the cipher text, the reader station chip just a communication channel , the certification process can not be copied, using the algorithm disclosed algorithm, which security is based on the CPU card protection key algorithm rather than protection.

Key in the user card and SAM card can not be read, and the key is installed by the ciphertext, on-line system even after issuing and developers can not get the key in plain text to ensure the safety of the system fundamentally sex. It is because of realized Mifare1 card potential security issues, the Ministry of Construction to promote the use of a number of meetings CPU card. Dual interface CPU card is due to the flexibility of its application and financial support for the specification has been appreciated by all parties.

Conclusion

From the trend, the domestic market is experiencing access "shuffle", a considerable number do not have the strength or the technical strength of the R & D of small-scale enterprises will therefore be more difficult to survive, but with strong R & D strength, innovative technology manufacturers will be more powerful, poles differentiation further.

Scan the QR code to read on your phone

Home / About / Products / Solutions / News / Services / Case / Contact

Copyright © Shenzhen Rona Intelligent Technology Co., Ltd All rights reserved 粤ICP备09033460号 Powered by www.300.cn