Comparison and Analysis of Four Identification Technologies

First, Smart Card Technology

With the comprehensive development of integrated circuit technology and computer information system technology, scientists have built-in integrated circuit cores with processing power and security, reliability, and encrypted storage functions in a substrate of the same size as a credit card. "Card", internationally known as "Smart card", we are known as "smart card". Its greatest feature is its independent computing and storage capabilities. Under passive conditions, data will not be lost, and data security and confidentiality will be very good and the cost will be moderate. The combination of a smart card and a computer system can easily meet the needs for the collection and transmission of various information, K9 confidentiality, and management. It is used in many fields in foreign countries such as banking, road pricing, meter gas charging, and customs vehicle inspection (using Radio frequency cards, which have been read and written when the vehicle passes through, have been widely used.

In order to strengthen the smart card's authentication capabilities, researchers have introduced biometrics to replace traditional methods for personal identification. Since the personal password is only a series of numbers and cannot truly represent the individual's identity, biometric techniques (such as fingerprint recognition and pupil identification) can be used to make up for this inadequacy. Biometric technology has broad application prospects. In June 2003, the Hong Kong Special Administrative Region Government started a plan to replace existing ID cards with smart ID cards. The biggest difference between a smart ID card and an old one is the built-in computer chip, which has the ability to store and process data. The Hong Kong Special Administrative Region Government has installed self-service stations at the offices of all Immigration Departments to allow citizens to review the information contained in smart ID cards. More than 600 public service stations and computers in subway stations, shopping malls, post offices, public libraries and community centres are equipped with smart card readers to facilitate the use of e-certificates in smart ID cards. The government will also waive the first year of e-Cert fees to promote the development of e-commerce. The new ID card is a multi-purpose smart card. Hong Kong launches a smart ID card scheme to introduce a variety of value-added applications to the public, including the use of digital thumbprint templates in smart ID cards to implement passenger and vehicle clearance checks at border control points; The e-certificate is added to the certificate in order to efficiently and securely conduct e-commerce transactions; only simple registration procedures are required, and smart ID cards can be used as library cards. Another intelligence of the smart ID card lies in its networking performance. As a mobile database key, it can communicate with many public databases such as banking, taxation, labor insurance, unemployment benefits, medical care, education, and social security. Biometric technology currently also encounters some problems to be solved. For example, as the age increases, the biological characteristics of human faces and sounds will change. On the other hand, storing biometric information involves personal privacy issues.

Shenzhen will be equipped with liquefied gas cylinders "identity card" - electronic tags or bar codes. Through computer identification, the public can understand the use of cylinders, filling locations, circulation history and so on. Shenzhen's 22 liquefied gas filling units have all identified their own logos, and the Bureau of Quality Supervision will also file and register filling cylinders. The most important part of building a cylinder file is to develop electronic labels and barcodes for cylinders. Computer identification is used to confirm the filling stations, use time, and number of inspections of cylinders, so that “black gas” has nowhere to live. After the liquefied gas cylinder has an “ID card”, the operator can use the portable bar code data collector to automatically identify and register the cylinder barcode number when operating on site. The data collector automatically processes, analyzes, and judges the relevant information. When the counterfeit cylinder is encountered, the collector will prompt or alarm. Operators can timely and effectively find out-of-date bottlenecked bottles and unregistered bottles, which can effectively reduce or avoid accidents. The barcode "ID card" can also trace and query the history of any cylinder. In addition, the bar code label has the characteristics of high temperature flame grilling, corrosion resistance, never aging, and long-term repeated use, so that only one "ID card" is used for each cylinder.

Second, RFID smart labels

RFID is the abbreviation of "RAIDO FREQUENCY IDENTIFICATION" in English and is called "smart tag" or "radio frequency identification." Radio frequency technology uses radio waves to read and write to recording media. Programmable chips, IC loops, and transmit antennas are embedded in a thin paper-like tag, and the contents of the chip are stored and read and written at a distance of more than 1 meter at a certain frequency, and 30 can be accurately recognized at the same time. The above goal, it provides energy by identifying the frequency of system emission, does not require battery to provide energy, according to the password set by the customer and the serial number provided by the chip manufacturer to generate an absolute unique 6-digit identification code to ensure The uniqueness of each tag.

In order to realize high-speed and long-distance data transmission, the data signal must be superimposed on a radio wave whose signal strength is relatively regular. This process is called modulation, and the radio waves that change regularly are called carriers. In an RFID system, carrier waves are generally emitted by a reader or a programmer. There are many ways to achieve the data on the carrier modulation, such as the use of data information to change the wave amplitude of the carrier is called amplitude modulation; change the carrier frequency is called frequency modulation; change the phase of the carrier is called phase modulation and so on. In general, the higher the carrier frequency used, the faster the data can be transmitted. For example, a 2.4 GHz frequency carrier can achieve 2 Mbps (equivalent to approximately 2 million characters per second). However, the carrier frequency cannot be increased indefinitely to increase the information transmission speed because the selection of radio frequency is regulated by the government. Various countries generally provide different application purposes for radio waves of different frequencies, and the radio wave of RFID technology is selected. It must also comply with this rule. At present, the communication frequency in the country is generally 2.4GHz spread spectrum technology for communication. This is because the 2.4G-2.4835GHZ frequency band in China is a common frequency band that does not require the State Radio Management Committee to apply for a license. In the past, commercial wireless data transmissions generally used narrow-band transmissions, which used relatively single carrier frequencies to transmit data. Nowadays, spread spectrum technology is widely used in the commercial field to transmit wireless data, that is, to use a range of frequencies to transmit data. This has the concept of bandwidth. The bandwidth is the difference between the highest carrier frequency and the lowest carrier frequency used in communications. The most obvious advantage of using broadband frequencies for data transmission is that the data transmission speed is further accelerated and the reliability is higher, because when the carrier line of one frequency is busy or fails, the information can be transmitted through other frequency carrier lines.

The applicable field of radio frequency identification technology: occasions such as material tracking, vehicle tools, and rack identification, which require the collection and exchange of non-contact data, are particularly suitable where frequent changes to data content are required. The "Aowei" brand password recognition wireless network car alarm from the United States has already been available in China. The “Aowei” brand password identification wireless network car alarm adopts RFID technology and is at the leading level in the world of automobile anti-theft devices. It automatically identifies target objects and obtains relevant data through radio frequency signals. It requires no artificial preconditions, requires no light source, is free of batteries, has a service life of up to 20 years, can work in harsh environments, and uses low-frequency transmissions. Read data from external materials; it is quick and easy to operate, can be easily embedded or attached to products of different shapes and types, can be transmitted over long distances, data access is protected by passwords, security is higher, and objects attached to RFID tags can be attached Tracking and positioning. The radio frequency identification system uses radio waves to transmit identification data to complete identity and content recognition. It can be used to conduct data exchange, item tracking, classification, statistics, analysis, etc. without space limitations. IBM has already introduced this technology with companies such as Wal-Mart, Procter & Gamble, Gillette, and Pepsi. Once this technology is adopted, as long as the consumer picks up a product from the shelf, the computer system will automatically report the product information to the entire supply chain system. The customer will only need to pass the shopping cart through the reader of the identification system. The price of all items in the shopping cart is settled. The back-end warehouse can also stand up for the items that need replenishment.

Third, biometric identification technology

With the rapid development of technologies such as photoelectric technology, microcomputer technology, image processing technology and pattern recognition, a new type of human biometric identification technology has emerged. This is a kind of high technology that relies on human biometrics to perform human identity verification. Identification technology. Human biometrics At present, Wang uses the human body's fingerprints, palm prints, irises, sounds, handwriting, features, and DNA. Because these features have the inherent non-replicable uniqueness and stability of the human body, they cannot be copied, stolen, or forgotten. Therefore, the use of these unique physiological characteristics of the human body can accurately identify each person's identity. In recent years, human biometric identification technologies such as voice recognition, signature recognition, fingerprint recognition, hand shape recognition, and iris iris recognition have been developed and applied, and recently developed human face recognition technologies are simple, accurate, economical, and extensible. Many advantages, such as good, can be widely used in the entrance and exit control, security verification, security monitoring and search for criminals and other related parties.

The Japan Computer Expo has demonstrated a variety of biometric technology products that can recognize people based on biometric features such as faces, eyes, palms, fingerprints, and sounds. The face recognition system developed by Japan’s Omron Corporation can use digital technology to photograph and record 50 parts of people’s eyes and nose, and compare the newly extracted image information with face images stored in the system in advance. Determine the legitimacy of the user's identity. The "Rainbow" identification system invented by Japan Electric Industrial Co., Ltd. recognizes users based on the oval muscles of the human eye. When the eye is close to the perception device of the "Rainbow" recognition system, the recognition system can store the relevant information of the elliptic muscles of the eye within two seconds, and can later perform identity recognition accordingly. The basis is that the elliptical muscles in each person's eyes are different, and the eye muscles do not change much after two years of age. Therefore, the "Rainbow" recognition system error rate is only one part in 1.2 million. Experts at the Futuotong Institute have developed a palm vein recognition system. The user holds the palm of his hand at about 3 cm from the sensing device. The sensing device captures the veins of the palm of his hand with near-infrared rays, and identifies legitimate users based on the criss-crossing nature of the vein network. Usually the human palm vein network remains unchanged for the rest of the life. Therefore, this identification system is as accurate as the fingerprint identification system. Animo Corporation of Japan has developed a voice recognition system that is compatible with home computers and mobile phones. If someone wants to send voice commands to a computer at home through a mobile phone, he only needs to speak with his/her mobile phone for two seconds. The voice recognition in the computer The system can determine if the person speaking is the legitimate owner of the handset based on the frequency of the voice.

Because the banking financial system has extremely high requirements for security and control systems, such as security facilities, safes, ATMs, and e-commerce information systems of the vault, it needs a more intuitive, accurate, and reliable identification system for human face recognition technology. . In recent years, the incidence of financial fraud and robbery has increased, raising new challenges to traditional security measures. The human face recognition technology does not need to bring any electronic or mechanical keys at all, thus eliminating the loss of keys and passwords. If the IC card, fingerprint identification and other technologies are combined, the safety factor can be increased exponentially. Moreover, since there is a record of time, date, and body image for each operation event, it has good traceability. At present, the banking system is carrying out the business of safe leasing and custody. If banks use this identification system, they can increase the safety factor and the customer's credibility with the bank. In addition, if this recognition technology is applied to an ATM, the user can be relieved of the trouble of forgetting the password, and it can also prevent the occurrence of fraudulent or stolen incidents.

At present, China’s public security, prosecution, and law are strengthening the crackdown on economic, criminal, and other crimes, and are jointly engaged in the “fight to escape” struggle. At present, most of the fugitives’ photos, identity cards, and feature data are posted online. However, the judgment of this method must pass multiple technical appraisals. It has a greater difficulty in the investigation of counterfeit criminals of credential materials. The identification and disguise of criminals often consume a lot of time and material resources to confirm. If you use the human face recognition technology, you can greatly improve work efficiency, and can have a great deterrent power against criminals. If cameras are installed near important entrances and exits of stations, terminals, airports, customs, etc., the system can automatically capture the heads of people entering and exiting the above venues in an unoccupied position, and then transmit the facial features to the computer through the Internet. The central database is compared with the fugitives' avatars to quickly and accurately determine their identities. Once an avatar is found, the target automatically records and alarms. For example, in the United Kingdom and London, due to the recent use of the human face recognition system, the detection rate was increased by 34% in three months.

Fourth, voice recognition technology

The rapid development of voice recognition and the development of efficient and reliable application software have enabled voice recognition systems to be used in many ways. Such systems can use voice commands to apply specific phrases to achieve “hands-free” data collection. With hands and eyes, this is especially useful for workplaces where data is collected and used simultaneously. Because everyone's voices vary widely, sound can be used as a basis for security certification. Others can imitate your signature, guess your password, and even leave your fingerprints, but to imitate your voice is a bit too harsh. In the United States, a smart building uses voice recognition. To reach the company entrance, you must pass a security check. The electronic voice-activated guard will greet “Good morning!” You should also answer polite phrases like “Hello!” or “Good morning!”. At this point, the electronic guardian uses your voice to tell if you are the company's staff. If you confirm that you are, it will open the door for you, but if it is not, the electronic guard will politely "reject" you.

If you have poor eyesight or walking difficulties, voice-activated devices can also help. For example, you can control machines such as washing machines, televisions, and computers through speaking. Let them perform simple tasks such as opening and closing. Computers equipped with voice-activated devices can also read new emails for you and tell you the latest news. The Philips company in the Netherlands has also recently developed a new type of audio equipment. If you want to listen to music, you don't need to go to the audio to find a button, you don't need a remote control, and you make you in the kitchen. Just shout, "Start playing music! "The sound in the living room can be turned on automatically. After the name of the song is spoken, the sound can be found automatically in a few seconds. What's even more amazing is that if you can't remember the name of the song, you can tell which song it is by playing the melody of a few songs and play it for you. At the CeBIT show in September 2003, SONY showed off their QRIO home entertainment robot. To enhance the dialogue function, this robot is equipped with a CPU dedicated to voice recognition and sound synthesis. In this way, the large vocabulary continuous voice recognition realized by the external PC in the original model "SDR-4X" can be independently performed by the robot. The robot can use about 20,000 vocabularies. To extend the memory conversation function, not only the face and name of the interlocutor can be remembered, but also the words used by the interlocutor in the dialogue. Therefore, when the new robot meets with the same person for the second time, it not only recognizes who the other person is, but also remembers the past conversation. In this way, people who have encountered can “create a certain feeling”. The original model robot can only remember the face and name.

Voice recognition is also a non-contact recognition technology that users can naturally accept. However, voice recognition is the same as other behavior recognition technologies. Because the range of the voice changes is too large, it is difficult to accurately match; the voice will affect the acquisition with changes in volume, speed, and sound quality (for example, when you catch a cold). With the result of the match. For this reason, in recent years, the CIA has also adopted voiceprint technology in recognizing the voice size. The voice signal is displayed in the form of time, frequency, and amplitude, which greatly improves the recognition efficiency.

Planar Beam Load Cells

Planar beam load cells, otherwise known as planar force sensors, are designed for compact solutions where there's limited space. They can be effectively used as single units or as a part of a multi-load cell structure for platform scales.

These innovative sensors are most utilized in applications that require three or four units per instance, focusing on point-of-sale scales or weighing systems ranging from 10 to 400 pounds. Their sleek, low-profile design makes them a preferred choice for a wide spectrum of uses. They find application in medical settings for weighing hospital beds, chairs, infants, and equipment within incubators.

Furthermore, their usage extends to retail sectors, incorporated in checkout counters and retail scales. Agricultural setups also benefit from these sensors for various devices, bench scales being a prime example.

Among these, the ultra-thin flat sensor is a popular choice owing to its portability and aluminum alloy construction. Primarily, it caters to the needs of weight scales, postal scales, and other handheld ultra-thin countertop electronic scales, enhancing convenience and accuracy in the weighing process.

Planar Beam Load Cells,Planar Beam Load Cell,Planar Force Sensors,Multiple Load Cell

Zhejiang Nanhua Electronic Technology Co., Ltd , https://www.nhloadcells.com