laitimes

Financial Security | Design and implementation of smart access control management system for banking business library

author:Digitization of finance
Financial Security | Design and implementation of smart access control management system for banking business library

Text / Bank of China Jiangxi Branch Gong Xizhi

In accordance with the Ministry of Public Security's "Bank Security Precaution Requirements (GA38-2021)" and the safety management regulations of the banking business library, in order to strengthen and improve the security management capabilities and technical defense monitoring level of the business library, Bank of China Jiangxi Branch has developed and put into operation the smart access control management system of the banking business library.

Project Overview

The original business library management system has the following problems: first, the traditional security-based, lack of high-definition intelligent prevention and control system; second, passive supervision, lack of pre-active prevention function; third, the system management is scattered, the system linkage is not realized, and the emergency handling ability is weak; fourth, the localized management of the warehouse room is the mainstay, and the effective linkage with the remote monitoring center is lacking. In order to further improve the efficiency of digital transformation of security, the system integrates integrated intelligent integrated management solutions such as vehicle recognition, AI control, face access control, voice review, and people counting analysis based on the central platform to improve the security and reliability of business library access control management.

1. Convergence and intensive platform. The system integrates systematic management functions such as vehicle recognition, video perimeter, real-time intercom, face recognition, intelligent control, and people counting.

2. Vehicle identification system. The entrance and exit license plate capture all-in-one machine captures the license plate of the escort vehicle in real time, and compares it with the license plate whitelist in the system, and automatically verifies the vehicle information.

3. Video vigilance system. From 8 p.m. to 7 a.m., perimeter intrusion control is implemented, and when personnel appear in the control area during the control period, the local automatic sound and light vigilance is delivered, and the video screen is linked to the pop-up alarm in the remote storage room/network monitoring center.

4. Sound review system. It can realize remote intercom, real-time monitoring, emergency help, keywords and custom sound alarm functions.

5. Face recognition verification. Enter the relevant storage area of the business library or the remote storage room/network monitoring center to carry out confirmation, and complete the identity verification through face recognition authentication. It solves the problems of the lack of effective identity verification in the original system, the fact that the card is easy to be swiped by personnel, the fingerprint recognition is easy to wear, and the identity of personnel entering and exiting the business library cannot be effectively verified. Realize personnel anti-counterfeiting, and the accuracy rate of face verification ≥ 99%. You can set the automatic opening of the door after the local verification and comparison is passed, or the face recognition authentication verification of the personnel on duty (single/double) in the remote storage room/network monitoring center.

6. Personnel trailing control. When the authorized personnel enter the buffer zone and handover area of the business library after completing the face recognition authentication, and other personnel enter the same area without authentication, the platform will immediately prompt and alarm, and the remote storage room/network monitoring center will verify through audio and video linkage, and the platform will record and process it synchronously.

7. Demographic analysis. The use of artificial intelligence chips, the number of people statistics rate is greatly improved, and the number of people in the region is supported, and the actual number of people entering the business library is inconsistent with the number of people authorized and approved by the center, and the total number of people entering the business library and the total number of people leaving the business library are inconsistent, so as to realize automatic alarm.

Project Highlights:

1. Comprehensively improve the security level of the business library. Through intelligent prevention and control methods, we can achieve efficient and intelligent, all-round, all-weather and three-dimensional security protection for people, vehicles and things.

2. Avoid operational risks and strengthen internal control management. Strictly follow the two-person management requirements of the "Bank Security Precaution Requirements (GA38-2021)" to prevent internal management loopholes.

3. Comprehensively improve the supervision ability of the business library. The remote warehouse room/network monitoring center can grasp the request information of personnel entering and exiting in real time, so that it can be obtained immediately and can be seen, so as to avoid the random entry and exit of personnel and the occurrence of uncontrolled situations.

4. Improve the level of scientific and technological management of the business library. Through AI means, it can effectively prevent unauthorized personnel from tailgating and entering, and the remote storage room/network monitoring center can be displayed in real time, so as to be aware and reduce the labor intensity of manual review.

5. Quickly realize integration linkage and data traceability. The entry and exit information of all personnel is well documented, which is convenient for follow-up retrospection, effectively distinguishes the management responsibilities of each department of the business library, and the data can provide a basis for the management to continuously improve the security level of the business library.

construction scheme

In strict accordance with the requirements of the specification, combined with the actual business needs of the bank's business library, after several rounds of business and technical demonstration, the following construction plan was completed.

1. Business library remote duty access control system scheme. The five isolation doors are mainly introduced.

The first is the isolation door in the loading and unloading area of the escort vehicle.

Each time an empty vehicle enters, except for the driver of the escort vehicle, other personnel must get out of the car and enter the door one by one through the personnel entry and exit for face recognition authentication.

The second is the security door of the cash tail box handover area.

(1) For the management personnel/security personnel of the business library, they shall enter and exit the door in strict accordance with the face recognition + single authentication of single or multiple people (each actual entry and exit personnel are authenticated one by one).

(2) In addition to meeting the requirements in (1), the management personnel of the business library of the operation control department are required to complete the task confirmation in advance before opening the door remotely, and the timeliness of the task of personnel entering and exiting the business library is effectively authorized.

(3) In addition to meeting the requirements in (1), the clearing director of the operation control department is required to complete the task confirmation in advance before opening the door remotely, and effectively authorize the timeliness of personnel entering and exiting the business library.

(4) In addition to meeting the requirements in (1), the entry and exit of the personnel of the business department/escort cashier (including the borrowers of the branch) also requires the management personnel of the business library of the operation control department to complete the task confirmation in advance before opening the door remotely, and authorize the personnel to enter and exit the business library task timeliness.

(5) During the peak period of business library in and out of the warehouse in the morning and evening, in order to improve the efficiency of warehousing, the two doors can be remotely normally open (can be closed and normally open in real time), and the normal opening and closing of the center need to be certified by two people, and the business library is on duty throughout the process of normal opening.

The third is the security door in the buffer area of the cash tail box.

This prevention and control isolation door is controlled by the management personnel of the business library of the operation control department, and enters and exits through single face recognition authentication.

Interlock method: The third door and the fourth door are interlocked.

Fourth, the current business reservoir area double access isolation door.

For the management personnel of the business library, they can enter in strict accordance with the double face recognition + remote warehouse room/network monitoring center, and the system can automatically compare and match the face recognition of the two people when they go out.

For maintenance personnel and inspectors, it is necessary for the business library management personnel of the operation control department to complete the task confirmation in advance, and the business library management personnel must accompany them to enter and exit, and the double face authentication + remote warehouse room/network monitoring center double authentication goes out.

Interlock method: The third door and the fourth door are interlocked.

Fifth, the security door of the clearing room.

The clearing director of the operation control department shall confirm the task of the business library management personnel/clearing personnel in real time, and enter and exit in strict accordance with the single or multi-person face recognition + single face recognition authentication of the clearing director of the operation control department.

The business library is equipped with binocular passenger flow camera equipment, which can count the number of personnel entering and exiting the second cash tail box handover area of the business library and the isolation door of the fourth business library area, and the number of personnel statistics is matched with the number of face recognition, and the alarm will be automatically carried out when the number of people is found to be inconsistent, and the remote storage room/network monitoring center can confirm whether there is any abnormality through video linkage.

Table Comparison of access control systems of the old and new business libraries

Financial Security | Design and implementation of smart access control management system for banking business library

2. System equipment topology. The commissioning of the smart access control management system of the banking business library has comprehensively improved the security level of the business library, improved operational efficiency, avoided operational risks, strengthened internal control management, and realized integrated linkage and data traceability.

Using the concept of technology to empower security, we explore the security applications of smart business libraries such as face recognition and behavior analysis in the business library, which further saves costs, reduces risks, and improves reliability. In the follow-up work, we will actively explore the application of artificial intelligence in the field of smart security, and improve and supplement new functions on the basis of the existing platform (as shown in the figure).

Financial Security | Design and implementation of smart access control management system for banking business library

Figure System device topology

(This article was published in the second half of March 2024)

Read on