Analysis of Market Status of Four Types of Automatic Identification Technology

First, smart card (SmartCard) technology With the comprehensive development of integrated circuit technology and computer information system technology, scientists have a processing power and a safe and reliable, encrypted storage function integrated circuit core embedded in a credit-sized base In the film, it is the "integrated circuit card", internationally called "Smartcard", and we are "smart card". Its biggest feature is its independent computing and storage functions. In the passive case, the data will not be lost, the data security and confidentiality are very good, and the cost is moderate. The combination of smart card and computer system can easily meet the needs of collection, transmission and K9 confidentiality of various kinds of information. It is used in many fields abroad such as: bank, highway toll, water meter gas toll, customs vehicle inspection (use RF cards, which have been read and written when the vehicle passes, have been widely used.

In order to strengthen the smart card certification capabilities, researchers have introduced biometric technology to replace the traditional personal password identification method. Since personal passwords are just a series of numbers that don't really represent an individual's identity, biometrics (such as fingerprints and pupils) can be used to make up for this deficiency. Biometric technology has broad application prospects. Since June 2003, the Hong Kong SAR Government has started a plan to replace its existing identity card with a smart ID card. The biggest difference between the smart ID card and the old card is the built-in computer chip, which has the function of storing and processing data. The Hong Kong SAR Government has installed self-service kiosks in all Immigration Offices to allow members of the public to check the information in the smart identity cards. More than 600 public service stations and computers in subway stations, shopping malls, post offices, public libraries and community centres are equipped with smart card readers to facilitate the use of e-Certs in smart ID cards. The government will also waive the first year of e-Cert to promote e-commerce development. The new ID card is a smart card with multiple uses. Hong Kong's smart identity card scheme has introduced a number of value-added uses to facilitate the public. The contents include: using the digital thumb fingerprint template in the smart ID card to implement passenger and vehicle self-ribbed entry and exit inspection at the border control point; The e-Cert is added to the certificate for efficient and safe electronic business transactions; the simple registration procedure can be used to use the smart ID card as a library card. Another smart thing about smart ID cards is their networking capabilities. As a mobile database key, it can communicate with many public databases such as banking, tax, labor insurance, unemployment insurance, medical care, education, and social security. Biometrics technology is currently experiencing some problems to be solved. For example, as you get older, there are some changes in the biometrics of people's faces and sounds. On the other hand, storing biometric information involves personal privacy issues.

Shenzhen will equip liquefied gas cylinders with "identity cards" - electronic labels or barcodes. Through computer identification, the public can understand the use time, filling location, and circulation history of the cylinder. The 22 liquefied gas filling units in Shenzhen have confirmed their own logos, and the Municipal Quality Supervision Bureau will also file and register the filling station cylinders. The most important part of building a gas cylinder file is to develop the electronic label and barcode of the cylinder, and confirm the filling station, the use time and the number of inspections of the cylinder through computer identification, so that the "black gas" has nowhere to go. After the liquefied gas cylinder has the "ID card", the staff can automatically identify and register the gas cylinder barcode number by using the portable barcode data collector when operating on site. The data collector will automatically process, analyze and judge the relevant information. When the counterfeit cylinder is encountered, the collector will issue a prompt or alarm. Operators can timely and effectively discover expired scrap bottles and unregistered bottles, which can effectively reduce or avoid accidents. The barcode "ID card" can also trace and query the history of the flow of any cylinder. In addition, the bar code label has the characteristics of high temperature flame grilling, corrosion resistance, never aging, and long-term re-use, so it is guaranteed that only one "identity card" is used for each cylinder.

Second, RFID smart tag RFID is the abbreviation of English "RAIDOFREQUENCYIDENTIFICATION", called "smart tag" or "radio frequency identification." Radio frequency technology uses radio waves to read and write to a recording medium. Embed a programmable chip, IC loop and transmit antenna in a label like a thin paper, and store and read and write the contents of the chip at a distance of more than 1 meter through a certain frequency, and accurately identify 30 at the same time. The above goal, which provides energy by identifying the frequency of the system's transmission, does not require the battery to provide energy, and generates an absolutely unique 6-digit identification code by a complex algorithm based on the customer-set password and the serial number provided by the chip manufacturer. The uniqueness of each label.

In order to realize high-speed and long-distance transmission of data, the data signal must be superimposed on a relatively strong wave of a regularly changing signal. This process is called modulation, and the regularly changing electric wave is called a carrier. In RFID systems, carrier waves are typically sent by a reader or programmer. There are a variety of methods to achieve data modulation on the carrier, such as changing the amplitude of the carrier with data information called amplitude modulation; changing the frequency of the carrier is called frequency modulation; changing the phase of the carrier is called phase modulation. In general, the higher the carrier frequency used, the faster the data can be transmitted. For example, a carrier of 2.4 GHz frequency can achieve 2 Mbps (equivalent to about 2 million characters per second). However, the carrier frequency cannot be increased indefinitely to improve the information transmission speed, because the selection of the radio wave frequency is regulated by the government, and various countries generally stipulate different application purposes for radio waves of different frequencies, and the selection of RFID technology radio waves This regulation must also be observed. At present, domestic communication is generally carried out using a communication frequency of 2.4 GHz spread spectrum technology. This is because the frequency band of 2.4G-2.4835GHZ in China is a public frequency band that does not need to apply for a license to the National Radio Regulatory Commission. In the past, commercial wireless data transmissions generally used narrowband transmission, that is, using a relatively single carrier frequency to transmit data. Nowadays, the spread of wireless data in the commercial field is widely used, that is, the transmission of data using a certain range of frequencies, which has the concept of bandwidth, which is the difference between the highest carrier frequency used in communication and the lowest carrier frequency. The most obvious advantage of using broadband frequency to transmit data is that the speed of data transmission is further accelerated and the reliability is higher, because when the carrier line of one frequency is busy or fails, information can be transmitted through other frequency carrier lines.

Areas in which RFID technology is applicable: where material tracking, vehicle and shelf identification require non-contact data collection and exchange, especially where frequent changes to data content are required. The "Aowei" brand password recognition wireless network car alarm device from the United States has been launched in China. "Aowei" brand password identification wireless network car alarm is the use of RFID technology, in the world of automotive anti-theft devices in the leading level. It automatically recognizes the target object and acquires relevant data through the RF signal. The identification work does not require manual pre-requisites, no light source, no battery, and has a service life of up to 20 years; it can work in harsh environments; The external material reads data; it is quick and convenient to operate, can be easily embedded or attached to different shapes and types of products, can be transmitted over long distances, has password protection for data access, is more secure, and can be attached to RFID tags. Track and locate. Radio frequency identification system uses radio waves to transmit identification data to complete identity and content identification. It can be used for data exchange, item tracking, classification, statistics, analysis, etc. without space constraints. IBM has already introduced this technology with companies such as Wal-Mart, Procter & Gamble, Gillette, and Pepsi. Once this technology is adopted, as long as the consumer picks up a product from the shelf, the computer system will automatically report the product information to the entire supply chain system. The customer only needs to pass the shopping cart through the reader of the identification system. The price of all items in the shopping cart is settled. The back-end warehouse can also understand the items that need to be replenished.

III. Biometric Recognition Technology With the rapid development of technologies such as optoelectronic technology, microcomputer technology, image processing technology and pattern recognition, a new human biometric feature technology has emerged, which relies on human biometrics to carry out human identity. A high-tech identification technology for verification. The biological characteristics of the human body currently use the human body's fingerprints, palm prints, irises, sounds, handwriting, face and DNA. Since these features have the unique and unrepeatable uniqueness and stability inherent in the human body, they cannot be copied, stolen or forgotten. Therefore, the use of these unique physiological characteristics of the human body can accurately identify each person's identity. In recent years, human biometrics such as voice recognition, signature recognition, fingerprint recognition, palm shape recognition, and iris recognition have been developed, and recently developed human face recognition technology is simple, accurate, economical, and scalable. Good and many other advantages, so it can be widely used in import and export control, security verification, security monitoring and search for criminals.

At the Japan Computer Expo, a variety of biometric technology products were displayed that can identify people based on biological characteristics such as faces, eyes, palms, fingerprints, and sounds. The face recognition system developed by Japan's Omron can use digital technology to capture and record 50 parts of the human eye, nose, etc., and compare the newly extracted image information with the pre-stored facial image in the system. Determine the legality of the user's identity. The "rainbow" recognition system invented by Japan Electric Industrial Co., Ltd. recognizes users based on the elliptical muscles of the human eye. When the eyes are close to the sensing device of the "Rainbow" recognition system, the identification system can store information about the elliptical muscles of the eye in two seconds, and can be identified accordingly. The basis is that the elliptical muscles of each person's eyes are different, and the eye muscles of the humans change little after the age of two. Therefore, the "rainbow" recognition system error rate is only one in 1.2 million. Experts at the Fututong Institute have developed a palm vein recognition system. The user puts the palm of the hand flat about 3 cm away from the sensing device, and the sensing device photographs the palm vein with near-infrared rays, and identifies the legitimate user according to the characteristics of the vein network. Usually the human palm vein network is unchanged for a lifetime, so this recognition system is as accurate as the fingerprint recognition system. Japan's Animo has developed a voice recognition system that is compatible with home computers and mobile phones. If someone wants to make a voice command to a computer at home via a mobile phone, then they only need to talk on the phone for two seconds, and the voice recognition in the computer. The system can determine whether the person speaking is the legal owner of the phone based on the frequency of the voice.

Because the bank financial system has extremely high requirements for the security control system, such as the security facilities, safes, ATMs and e-commerce information systems of the vault, the human face recognition technology is more intuitive, accurate and reliable. . In recent years, the incidence of financial fraud and robbery has increased, posing new challenges to traditional security measures. The human face recognition technology does not need to bring any electronic or mechanical keys at all, thus eliminating the phenomenon of losing keys and passwords. If combined with IC card, fingerprint recognition and other technologies, the safety factor can be doubled. Moreover, since a record with time, date, and body image is saved for each operation event, it has good traceability. At present, the banking system is carrying out the business of safe leasing and custody. If the bank uses this identification system, it can improve the safety factor and the credibility of the customer to the bank. In addition, if the identification technology is applied to the ATM automatic teller machine, the user can be relieved of the trouble of forgetting the password, and the event of fraudulent or stolen can be prevented.

At present, China's public, prosecution and law are strengthening the crackdown on economic, criminal and other criminal acts, and are jointly carrying out the "fighting and chasing" struggle. At present, most of the photos, ID cards and feature data of fugitives are published online. However, the judgment of this method must be identified by a variety of techniques. It is more difficult to check the criminals of the documents and documents. The identification and disguise of the criminals often consume a lot of time and material resources to confirm. If you use the human face recognition technology, you can greatly improve your work efficiency and have a great deterrent effect on criminals. If the camera is set up near the entrances and exits of important stations, terminals, airports, customs, etc., the system can automatically capture the avatars of the people entering and leaving the above places without any responsibility, and then transmit the avatar feature data to the computer through the network. The central database goes to compare with the escapist's avatar, and quickly and accurately make an identity judgment. Once it is found to be an avatar, the mouth automatically records and alarms. For example, the London Police Department in the United Kingdom has increased the crime detection rate by 34% in three months due to the recent use of the human face recognition system.

Fourth, the rapid development of voice recognition technology voice recognition and the development of efficient and reliable application software, the voice recognition system has been applied in many aspects, this system can use voice instructions to apply specific short sentences to achieve "no hands" data collection The biggest feature is that it does not use hands and eyes, which is especially suitable for those jobs that collect data and use both hands and feet. Since each person's voice varies widely, sound can be used as one of the basis for safety certification. Others can imitate your signature, guess your password, and even leave your fingerprints, but it is a bit too harsh to imitate your voice. A smart building in the United States uses a voice recognition method. At the door of the company, you must pass a security check. The electronic voice-activated guard will greet "Good morning!" You should also answer polite words like "Hello!" or "Good morning!" At this point, the electronic guard uses your voice to tell if you are the company's staff. If you confirm that you are, it will open the door for you, but if not, the electronic guard will politely shut you out.

If you have poor eyesight or difficulty walking, voice control equipment can also help. For example, you can control washing machines, televisions, computers, etc. by speaking. Let them perform simple tasks such as opening and closing. Computers with voice-activated devices can also read the newly received emails and tell you the latest news. Philips in the Netherlands has also recently developed a new type of audio equipment. If you want to listen to music, you don't have to go to the front of the stereo to find the button, you don't need a remote control, the mouth makes you in the kitchen, just yell "Start playing music! "The sound in the living room can be automatically turned on, and then the name of the song can be found. The sound can be found automatically in a few seconds." Even more amazing is that if you can't remember the name of the song, just sing the melody of a few songs, the sound can tell which song it is, and then play it to you. At the CeBIT show in September 2003, SONY showed off their QRIO home entertainment robot. To enhance dialogue, the robot is equipped with a CPU dedicated to voice recognition and sound synthesis. Thus, the large vocabulary continuous sound recognition realized by the external PC in the original model "SDR-4X" can be independently performed by the robot. The robot can use about 20,000 words. To extend the memory dialogue function, not only can remember the face and name of the interlocutor, but also remember the words used by the interlocutor in the conversation. Therefore, when the new robot meets the same person for the second time, it not only recognizes who the other party is, but also remembers the content of the conversation in the past. This will create a certain feeling for those who have encountered it. The original model robot can only think of the face and name.

Voice recognition is also a non-contact recognition technology that users can accept naturally. But voice recognition, like other behavioral recognition techniques, sounds are too large to change, so it's hard to make some precise matches; sounds affect collection as volume, speed, and sound quality change (such as when you have a cold) With the result of the comparison. To this end, in recent years, the CIA has also adopted voiceprint technology to identify sounds, and the sound signals are displayed in the form of time, frequency and amplitude, which greatly improves the recognition efficiency.

School Backpack

Backpacks For School,Kids Backpack,Childrens Backpack,Childrens Rucksack

Ningbo Happiness Stationery Industrial & Trading Co Ltd , https://www.bagshappiness.com