无障碍浏览:
中文 - ENGLISH
You are here : Home >> News Center
  NEWS CENTER
Company News
Industry News
Industry News
Intelligent lock innovation is endless brilliant
Time: 2016/10/30   Hits: 4133 

[China Security Exhibition Network enterprises concern] Just in the past 2016 for the smart lock industry is an extraordinary year, this year ushered in the smart lock market explosive explosive growth. According to the latest statistics, the shipments of China's smart lock market exceeded 2 million units in 2016, with an industry-wide annual growth rate of over 40%. The smart lock brand has grown from a few hundred in 2015 to more than 1,000 in 2016. In 2017, the innovative technology of intelligent lock is endless, brilliant.
 
Semiconductor Fingerprint Identification
 
Semiconductor (Capacitive) Fingerprint Recognition The 8bit grayscale image is formed using the difference in capacitance between the ridges and valleys of the fingerprints against the smooth silicon sensor. The working process is pre-charged to a certain reference voltage by capacitive sensing particles on each pixel. When the finger is pressed to the fingerprint collection window, since the human body is an electric field, the fingerprint lines of the user and the sensor surface will form a coupling capacitor. For the high-frequency current, the capacitor is a direct conductor, so the finger will suck a Small current. This current flows from the peripheral electrode and the current flowing through the peripheral electrode is proportional to the distance from the fingerprint to the periphery. The controller calculates the ratio of the current accurately to form the fingerprint image data.
 
Due to the deep dermal layer, the sensor can capture more real data, less susceptible to the dirt on the finger surface, improve the recognition accuracy, and can effectively prevent the recognition error, thus greatly improving the system security.
 
Cloud lock
 
Different from the traditional smart locks, the cloud lock retains most functions and unlocking methods of the smart lock, meanwhile, it can also be connected to the cloud server through the mobile phone or the tablet APP for remote monitoring, authorization unlocking and real-time information push. There are crowbar locks, password verification error several times, the door is not closed and other anomalies, the alarm will be pushed in the first time, more intelligent security with other home smart home systems such as interoperability.
 
Face recognition technology
 
Face recognition technology, also known as face recognition technology. Human faces vary, either by a pair of twins or by anthropological methods to measure differences. Face recognition technology through the "local feature analysis" and "graphics, neural recognition algorithm" on the facial organs and features of the location of the position to extract into digital information and then compare with the database template information to determine and confirm. When the head of the home to go home, smart face lock through the camera to capture facial features points identify the identity of the owner, after the completion of identification automatically open the door.
 
The traditional face recognition technology is mainly based on visible light image of face recognition, which is also the most familiar identification methods, has more than 30 years of research and development history. However, this method has insurmountable defects. Especially when the ambient light changes, the recognition effect will drop sharply, which can not meet the actual needs. One solution that has rapidly developed is multi-light source face recognition based on active near-infrared images. It overcomes the effects of light changes in overall system performance in terms of accuracy, stability and speed over 3D image face recognition.
 
Vein recognition
 
One way of vein identification system is to obtain the individual vein distribution chart by the vein identification instrument, extract the characteristic value from the vein distribution chart according to a dedicated alignment algorithm, and obtain the image of the finger, the palm of the hand and the dorsal hand vein by the infrared CCD camera, The digital image stored in the computer system, to achieve eigenvalue storage.
 
Vein comparison, the real-time take venous map, the use of advanced filtering, image binarization, thinning means to extract the characteristics of digital images, the use of complex matching algorithm stored in the host vein with the eigenvalue matching match, so that individuals Identification, identification.
 
NFC recognition
 
NFC is an abbreviation of NearFieldCommunication, short-range wireless communication technology. It is a non-contact identification and interconnection technology for short-range wireless communication between mobile devices, consumer electronics, computers and intelligent control tools. NFC has evolved from the integration of contactless radio frequency identification (RFID) and interoperability technologies that combine inductive readers, inductive cards and peer-to-peer capabilities on a single chip to identify and data with compatible devices over short distances exchange. Initially only a simple merger of RFID and networking technologies, this technology has evolved into a short-range wireless communication technology that is growing rapidly.
 
NFC provides a simple, touch-based solution that allows consumers to simply and intuitively exchange information and access content and services. NFC door lock program used in smart locks, so that with various models of different electronic door locks, the door lock control Internet.
 
NB-IoT technology
 
NB-IoT technology first applied to OFO small yellow car, the technology also contributed to the real bike into the shared Internet era. This also marks the NB-IoT smart lock began full commercial.
 
NB-IoT, also known as NarrowBandInternetofThings, is an important branch of the Internet of Everything. Built on a mobile cellular network, NB-IoT consumes only about 180 KHz bandwidth and can be directly deployed on a GSM network, a UMTS network or an LTE network. Compared with Bluetooth , Zigbee and other short-range communications technology, mobile cellular network with wide coverage, mobility and large number of connections, etc., can bring richer scenarios and more convenient user experience, NB-IoT has gradually become the main Internet of Things technology.
 
Floating password
 
Floating Cipher Technology is that the password is automatically replaced each time the key is contacted with the lock body. Irregular password and can not be copied digital security system technology. Unlike traditional passcode locks, the traditional passcode does not change with each use, posing the risk of being stolen and copied. Floating Ciphers, on the other hand, uses two sets of passwords, fixed and floating, stored in semiconductor (card) keys (281 megacycles) and lockers (4.2 billion floating passwords), each time it is used Enter the key in the lock system to confirm and automatically replace the password.
 
In case the key is stolen and copied, since the password has been changed in the floating password group previously used by the holder, even if the same fixed password is not recognized by the system, such copying is meaningless (this probability corresponds to one person Two times the probability of winning the first prize in the lottery).

  Close
Next: Oriental password the first national smart lock chain purchase beach landing landing Shandong
Address: 2nd Floor, Building 1, Zhongtai Science Park, East Ring Road, Longhua Town, Longhua District, Shenzhen, China
Telephone: 0755-29369175
Mobilephone: 13570872289
Website: www.RaySmartTech.com
Email: sales@raysmarttech.com

Scan code attention to
WeChat public platform
Partner
Download: ismart DV app
Copyright © 2006-2017  ShenZhen RaySmart Technology Co.,Ltd ICP:18145072