Major: Communication Engineering
Class level: xx Communication Engineering Class 1.
Last name: XXX
Lecturer name: XXX
Lecturer title: Lecturer
20xx year xx month
1. The research significance, research status, level and development trend of this topic at home and abroad.
1. 1 the significance of this study
With the increasing awareness of enterprise management modernization, the door lock system in the ordinary sense can no longer meet the requirements of modern enterprise management. The appearance of electronic access control system has greatly facilitated people's management of entrances and exits, and quickly began to popularize and apply.
In recent years, access control system has emerged quietly because of its own advantages, including post and telecommunications systems, power supply systems, banking systems, residential quarters, enterprise units and other places have examples of using access control systems. Through the use of the system, the work efficiency of managers and the safety of management areas have been greatly improved.
The access control system works through a personal identification card. Give everyone who has the right to enter a personal ID card, which is equivalent to a key. The system judges whether the cardholder can enter (or leave) according to the card number and the current time, and if so, the system automatically opens the door. For enterprises and institutions and other places that need attendance, the access control system can also record whether each employee goes to work on time. Another advantage of the access control system is that you can add or delete cards at any time, without worrying about the losses caused by lost cards.
1.2 research status, level and development trend at home and abroad
The basic meaning of access control system is access control system. Its function is to manage the personnel entering and leaving the management area, restrict unauthorized personnel from entering and leaving the specific area, make it more convenient for authorized personnel to enter and leave, and query a series of records according to actual needs. The access control system is to install control devices such as magnetic doors, electric locks or card readers at the entrances and exits of the main management areas, elevator halls, main equipment control center rooms, valuables warehouses and other important parts in the building, which are monitored by the central controller. The system adopts multi-task processing by computer, which can control the positions of entrances and exits in real time or set up program control through objects and transit time to adapt to the safety management of residential areas and office buildings.
The traditional mechanical door lock is just a simple mechanical device. No matter how reasonable the structural design is, no matter how strong the material is, people can always open it by various means. Key management is very troublesome in places with frequent personnel changes (such as offices and hotel rooms). In some large institutions and enterprises, the cost of key management is very high. When the key is lost or replaced, the lock and key are often replaced together. In particular, the traditional mechanical key is easy to be copied, and there is no record of entry and exit, so the safety of the flag is very poor. In order to make up for the above problems, electronic magnetic card locks and electronic password locks have appeared, which have improved people's management of access channels to some extent. But their own defects are gradually exposed. The problems of magnetic card lock are that the information is easy to be copied, the card and reader are greatly worn, the failure rate is high and the safety factor is low. The problem with password locks is that passwords are easy to leak. In this period, the access control system and high school were still in the early immature stage, so the access control system at that time was usually called electronic lock and was not widely used.
In recent years, with the rapid progress of digital technology and network technology and the development of sensor card technology and biometric technology, the access control system has been developed by leaps and bounds, and various technical systems such as induction access control system, fingerprint access control system, iris access control system, face recognition access control system and disordered keyboard access control system have emerged. The access control system has already surpassed the simple doorways and key management departments and gradually developed into a complete access control management system. The application field of access control system is more and more extensive. It is the most effective tool for people to implement import and export management in public places. It has played a great role in working environment safety management, personnel attendance management and large-scale personnel access.
With the high integration of electronic chips, the function of access control system has become more and more perfect and simple, and it is easier to operate. The development process of access control system is as follows:
1, the first generation of access control
Single keyboard password input method. There are often embarrassing things that are rejected because they forget their passwords.
2. Second generation access control
Contact card access control system. The contact cards used are magnetic code cards and iron code cards. Magnetic coded cards are made by sticking magnetic materials on plastic cards. The disk can be rewritten and the application is convenient. Its disadvantage is that it is easy to degauss and wear. The middle of Tiema brand is coded by special metal wire arrangement and made by using the principle of metal magnetic burning. It is not easy to be copied. Tiemaka can effectively prevent magnetism, water and dust, and it is a kind of card with high security. Although this non-access control system has some improvements, if the card is accidentally degaussed or dirty, it will refuse to enter the personnel.
3. Third Generation Access Control
Induction card, that is, contactless IC card generally refers to passive IC card. The card adopts advanced semiconductor manufacturing technology and information security technology. When the card enters the energy range of the card reader, it uses the special oscillation frequency generated by the electronic circuit and the induction coil to generate * * * vibration. The induced current causes the electronic circuit to send a signal to the card reader, and the card reader converts the received signal into card data and sends it to the controller for comparison.
4, the fourth generation of access control
Biometric identification system. Comprise a fingerprint machine, a palm print machine, a retina recognition machine and voice recognition equipment. The access control system adopts fingerprint and palmprint recognition, which has high security. Retina recognition machine and speech recognition equipment are extremely safe under normal circumstances, but if the retina is congested or diseased, and diseases such as colds will affect its use.
In the above generations of access control systems, magnetic code cards are cheap and still in use; Iron code cards and inductive cards have good safety performance and are popular now; Biometric technology is extremely safe and is generally used in key military and political departments or bank vaults.
Because magnetic cards and contact ic cards have higher requirements on the operating environment and limited working life, the actions and time required by operators in the identification process are obviously longer than those of non-contact cards. Therefore, from the current level and development direction of front-end input equipment in the global access control system, although there is still a certain market for the application of magnetic cards, contact ic cards and card readers in access control systems, from the development trend, non-contact smart cards will definitely replace magnetic cards and IC cards completely.
2. The basic content of this topic, possible difficulties, and methods and measures to solve the problem.
2. 1 Basic content
This topic is mainly based on the existing website resources, research and design a cost-effective, safe, reliable, convenient and fast access control system. The contents of this study are:
1, study and analyze the basic structure of the access control system, the necessary development tools and various reference materials.
2, understand the user's needs, can quickly and accurately locate the functions that the system needs to achieve and the running process of the system.
3. According to the requirements provided by users and the functions to be realized by the system, the corresponding system function modules, databases and overall design drawings are designed.
4. Determine the system development task book and allocate the time in each stage reasonably. Complete relevant technical documents and give detailed instructions.
5. Complete the detailed design of the system, and design each functional module and the relationship between each module.
6. Study the current resources and existing systems on the network to prepare for the integration of related systems after development.
2.2 possible difficulties, put forward methods and measures to solve the problem.
This theme is mainly designed between struts and other development frameworks, combining javascript, oracle and apache. The understanding of struts and other development frameworks is not deep enough, and it is often necessary to look up information on the Internet. The requirements of access control system are all realized according to the needs of company customers, and special analysis is needed for some special needs. There are still some misoperations that need to be considered in advance, and corresponding exception handling should be set.
3. The research methods (approaches) and feasibility analysis to be adopted in this topic.
Feasibility analysis of this scheme.
This software project feasibility study report is a comprehensive consideration of the project topics, a prerequisite for project analysts to carry out further work, and also a prerequisite and foundation for software developers to develop projects correctly and successfully.
Writing the feasibility study report of software project can make the software development community estimate the feasibility of the research project as early as possible, realize the defects of the system scheme at the early definition stage, spend less time and energy and avoid many professional difficulties. Therefore, the feasibility study report of software project is very important in the whole development process.
The system is analyzed and studied from four aspects: technical feasibility, economic feasibility, operational feasibility and scheme feasibility.
1, technical feasibility
Using Java technology to develop the system. Apache is the most common network server; Oracle is a powerful relational database; Java is the most popular programming language at present.
In view of the maturity of Java technology, the system can be completely completed.
2. Economic feasibility
This system uses Oracle database management system and eclipse as application development tool, which is convenient to purchase and low in price. The development and application of the system has the advantages of simple installation, low cost, easy maintenance and upgrading, short development cycle and high economic benefits.
The computer configuration required by this system is not very high, and it needs operating system, application software and database management software, and the cost of basic investment and construction is not very high. Support users with no computer experience, less computer experience and more computer experience to use this system conveniently. Therefore, it is economically feasible.
3. Operational feasibility
This system needs a WEB server, and the configuration requirements are related to the number of customers. For ordinary company use, an ordinary server is enough. The current mainstream servers can fully meet the requirements. For the client, only the client needs to be equipped with a browser, and there is no high requirement for the machine itself, and the general computer can meet the requirements.
4. Feasibility of the scheme
This system is committed to designing a management system that can meet the needs of building management and realize the management of working environment safety, personnel attendance management and large-scale personnel access. Its economic benefits are very good, so this scheme is feasible.
I recommend it carefully.