Artificial Intelligence Entrepreneur Torben Friehe on Why He Is Eyeing Africa

German-born tech entrepreneur Torben Friehe is the CEO of

1aim

, a full-stack AI building platform that is helping businesses use and manage their commercial spaces more efficiently. Among other things, 1aim

develops and produces access control systems which enable users to open doors with mobile phones.

According to Friehe, 1aim is now in talks with commercial real estate developers across the region, with a particular eye on South Africa, Nigeria and Angola, to implement his platform.

I had the opportunity to speak with him in London this week to learn about 1aim and his regional ambitions.

There's much talk about 1aim in the start-up community. Can you tell us more about the company?

Sure. We are creating an AI platform that changes how buildings are used, managed and secured. I realize that sounds a bit ambiguous, so let me give you some more details.

If you look at corporate expenses, the two most significant are salaries and real estate. On one side, you spend tons to make your employees effective. You give them software tools like

Slack

and

Dropbox

. You make a real effort. On the other side, even though real estate is your second largest expense, you have no idea how well you utilize your space. Research shows that 40 percent can go underutilized. It's an insane figure. This means inefficient office space management costs U.S. businesses $113 billion annually. It's a massive pain point, but one that has flown under the radar because the technology to assess it has been so poor.

Until now, companies didn't have the technology to solve this problem. That's what we offer them today - a full-stack AI building platform. Think of us as a central nervous system for office buildings. Our platform collects all the building data, interprets it intelligently and performs a series of actions as a result. It tracks, monitors and analyzes how a business uses real estate, and also creates operational recommendations.

Our platform consists of hardware, software and server infrastructure and has four main components - secure access and identity management, data collection and analytics, tools allowing you to plan and allocate space efficiently, and an improved smart-workplace user experience that creates a

WeWork

-like climate.

We have already rolled out phase one, our LightAccess Pro access and identity management system, which allows businesses to manage employee access rights and identify space usage patterns.

In phase two, they will be able to analyze space usage in real time and perform tasks to improve efficiency. For instance, our AI will secure areas as employees leave, manage utilities, intuitively merge building and inventory management systems, and create a real-time workplace model that reveals inefficiencies and pilot-tests strategies.

We've heard of products like Nest for residential users, but they have limited functionality. That's a bone of contention with the Internet of things (IoT) industry. Too many companies offer the "same old product with a chip inside," like a blender you control with an app. The smart element doesn't add value. Where are you with the first phase of your platform, LightAccess Pro? Give us an example of what it can do.

Sure. Picture this:

You're the president of a big public company. You have a 30-acre campus in France, and international offices covering 600,000 square meters. A core part of your team is young engineers who do complex technical work.

You understand how hard it is to find the right engineering talent. So it is a priority to keep them happy. Instead of hiring a group of engineers in each country of operation, you offered your French team to work on global shifts for extra pay, spending a few months per year abroad at your offices. Since they are young and motivated, they agreed. But after the first few trips, things took a bad turn.

Retention rates fell. When you raised the issue, you learned that the traveling had been a nightmare. It was a headache for the engineers to get their identification authorized, find where to work, and receive access rights when they arrived to a new location. They didn't even have Wi-Fi, and couldn't print or buy food in the canteen.

With our platform, you overcome these problems. You can provide access rights over vast commercial space and monitor, control and analyze the movements happening inside.

After you implemented our platform, your tens of thousands of global employees were able to instantaneously enter any building required for their job. All the sudden, your hovering French engineering team was able to move between your offices without needing to exert additional effort to get things up and running.

Our platform also allowed you to see who was entering and exiting every door across your global commercial space, and to learn that 30 entire floors were sitting empty.

After talking it over with your management, you decided to use the space productively. You assigned space using our data insights and not only saved an annual cost of tens of millions of euro, but also earned extra revenue from leasing space to other businesses.

Can you tell us how you started the company?

My co-founder,

Yann Leretaille

, and I have been friends since high school. We loved science and technology.

We collaborated on a number of projects at the time. The most interesting was an international student competition, in which students build CO2-powered dragsters. The project grew out of my love of racing.

We won several prizes for our designs and were later appointed competition ambassadors.

After graduating, we enrolled at university. But studying was never our thing. Instead, we continued working on different projects together.

Yann loved cryptography, and somehow came up with an idea for a technology allowing online IDs to be created while authenticating them with offline devices. We combined his concept with a technology letting you use any phone to transmit data. We saw how many problems were caused by our university's access control system. So we thought, "Hey, let's build an access control system." And that's what we did.

It started as a simple idea - to open any door with any phone.

But during our initial pilot tests, we saw that access is the centerpiece of so many other systems in a building.

Deutsche Telekom

, with whom we held our first pilot test, asked us if we could also record who went into which meeting room when. We said, yes. Then they asked if we could track how people moved in their space. They said they wanted to record that data for years, but couldn't find a solution. We realized the technology in buildings today is mostly 20th-century leftovers, and that wouldn't cut it in this day and age. Companies want to record their data - especially building-related data that is valuable and can't be otherwise recorded.

Access is the ideal way to record this information. Collecting data with an access management system gives you quality data connected to your ID that you can't get anywhere else.

This is when we came up with the idea for our platform.

So, long story short, Yann and I dropped out of university in 2012 to work on the project full-time.

We opened 1aim in 2013. We lived and worked in a friend's office furniture warehouse for two years, sleeping under our desks and basically living hand to mouth.

But we grew, and in 2015 started securing major investments.

The first was from venture capitalist

Lars Hinrichs

, founder of

XING

, a social network for professionals that is often called Europe's LinkedIn. This allowed us to wrap up our development of LightAccess Pro. British tech entrepreneur

Brent Hoberman

also chipped in, as did

Matthias Ummenhofer

, the former head of venture capital at the European Investment Fund. Another big investor was

Florian Moerth

, who is involved in EU tech start-ups.

In 2016, we attracted investment from the

Hormann Group

, the world's fourth-largest door manufacturer. It has several billion in revenue and 1,600 employees globally, offering on-site door installation and support in Europe. The partnership is nonexclusive and puts us in the enviable position of having a leading player selling and installing our products through its distribution channels.

I want to ask about security, because this is a critical issue for the IoT industry, as we have seen recently with the Bluetooth vulnerabilities known as "

BlueBorne

." I know LightAccess Pro uses Bluetooth. What are you doing to ensure you have airtight security?

First, we do not see ourselves as an IoT company. As you noted, the IoT industry is flawed. Trendy, but flawed. It was a powerful concept, but in the past several years we have witnessed its heart-wrenching commercialization. Now, any product with a chip is "IoT" - from blenders to wooden toy robots whose eyes flash when parents press a button on an app. Development cycles are short, companies hire external engineering on a project basis, and security is an afterthought.

For us, security is the priority. It has to be because we service businesses. They answer to their clients, personnel and board, and entrust us with their safekeeping.

This is why all our hardware and software is designed and manufactured in-house, so we can leverage 360-degree control over the technological process. We employ 25 top-notch mechanical, electrical, software and product engineers. Some worked in the defense sector - in the military and at Boeing. Others have been coding since they were kids and exemplify everything great about those "good hackers" you see on TV.

LightAccess Pro offers Bluetooth and three other technologies, including our proprietary protocol. Our users mostly turn off Bluetooth. We think businesses should prioritize the other technologies, because Bluetooth has inherent flaws. We rarely encounter businesses who want to use it, but some still do. We have minimized the associated risk.

What "BlueBorne" shows us is that there is an issue with insecure low-level stack implementation. I can't offer an easy solution. But I will say responsible companies shouldn't just throw up their hands and say, "These things happen." As an industry, we must rethink how we implement stacks and introduce new best practices.

So you're looking to make an entry into Africa; what's so compelling about the African market?

Urbanization and mobile penetration.

Regional hubs are experiencing an unprecedented demand for quality commercial space due to economic growth and urbanization. Lagos is an example. Modern commercial real estate is being built and the price is high at up to $100 per square meter. This means tenants will want to use space efficiently.

Our LightAccess Pro hardware and software also interfaces with your phone, so mobile penetration rates are key. And they are skyrocketing in the region, with 1 billion devices on the continent.

Young urban Africans are also leapfrogging wealthier peers in Europe as far as certain mobile technologies are concerned, like mobile payments. Many are offered by local players that learned to deal with the lack of expensive data-consuming smartphones.

So our building solution fits in perfectly. It works with any phone, even feature phones. It also helps companies deal with issues of scale by maximizing space efficiency. Data usage is minimal and there's no need for a constant Internet connection.

AI is seeing a lot of press. How will AI and algorithms impact the world economy?

Their impact will be decisive. But there is an ethical dimension that is all too often overlooked. It's important for the industry to start considering the ethical implications of technologies during the actual development process. Yann and I found that these issues worry many young people today. But industry stakeholders are behind the curve. This is why we teamed up with colleagues to open a nonprofit called the

Good Technology Collective

, which addresses issues at the crossroads of technology and society. We've attracted high-profile experts to our council, including

Annie Machon

, the activist,

Ida Tin

, co-founder of the popular app

Clue

, and

LucianoFloridi

, the

Oxford Internet Institute's

professor of ethics of information. We have greatly been aided in this process by our founding member,

Cy Leclercq

, and our economist and researcher Nicholas Borsotto.

E-mail: mfon.nsehe@gmail. com

Artificial Intelligence Entrepreneur Torben Friehe on Why He Is Eyeing Africa 1

HOT PRODUCTS
no data
GET IN TOUCH WITH US
no data
recommended articles
Cases
Access control system
Access control system
access control system manufacturer What is the access control system?The Access Control System(ACS) is a control system that uses modern electronic equipment and software information technology to control the entry, shuch as recording and alarming of people or things at the entrance.  It has become an effective measure to ensure the security of the area and realize intelligent management.Types of access control systemThe access control system is mainly composed of the reading part, transmission part, management/control part and execution part, and corresponding system software. There are various types of the access control system. According to its hardware composition mode, it can be divided into the integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type.1.Each component of the integrated access control system realizes all the functions of access control through internal connection, combination or integration.Each component of the split-type access control system has a structured part and a combination part in different ways. The separated part and the combined part are connected to form a system through electronic, electromechanical and other methods to realize all functions of access control.Independent control type access control system, all display / programming / management / control and other functions of its management / control part are completed in one device (entrance controller).Networked control type access control system, all display / programming / management / control functions of its management / control part are not completed in one device (entrance controller). Among them, the display/programming function is completed by another device. Data transmission between devices is achieved through wired and / or wireless data channels and network devices.The difference between the data carrier transmission control type access control system and the networked type access control system is only in the way of data transmission. The display / programming / management / control and other functions of its management / control part are not completed in one device (access controller). Among them, the display/programming work is done with other equipment. The data transmission between the devices is done through the input/export operation of the removable, readable and writable data carrier.Most important things of the access control systemCharacteristic carrier: The access control system is a system that manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legality of their access (behavior). This is to give them a mark of identity and authority through a method. We call it a feature carrier, and the identity and authority information it carries is a feature. The key to a mechanical lock is a feature carrier, and its "tooth shape" is a feature. Many feature carriers can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used at present. These feature carriers must be used with the holder (person or thing), but it does not have the same identity with the holder, which means that the feature carrier can be used by others (things). To prevent this problem, multiple methods can be adopted, that is, two or more feature carriers are used (depending on the security requirements of the system). If a unique and stable feature can be selected from the holder itself as the information for identity, this problem will not exist. Of course, the features from the "holder" are called "biological features", such as face recognition technology, and the feature carrier is, of course, the holder.Reading device: A reading device is a device that exchanges information with a characteristic carrier. It reads the information about identity and authority from the feature carrier appropriately, to identify the identity of the holder and judge the legitimacy of its behavior (access request). The feature reading device is a device that matches the feature carrier. The technical attributes of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "lock core". After the key is inserted into the lock core, the identity of the holder and the authority are confirmed by the movable marbles in the lock core and the tooth shape of the key. The identification process of an electronic reading device is: converting the read feature information into electronic data and then comparing it with the data stored in the device memory to achieve identity confirmation and authorization verification. This process is also called "feature identification ". Some feature reading devices only have the function of reading information, and some also have the function of writing information to the feature carrier. This kind of device is called a "reading and writing device". The system writes information to the feature carrier to authorize the holder. Or revise the authorization process. This feature vector can be modified and reused. The key to a mechanical lock cannot generally be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the rights they possess can be changed through system settings.The locking mechanism of the access control system: The access control system is only practical if it is coupled with an appropriate locking mechanism. After the reading device confirms the identity and authority of the holder, it is necessary to enable the legal person to enter and exit smoothly and effectively prevent the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems or different applications of access control technology. For example, the lever of a subway toll system, a car stop in a parking lot, and a banknote collection device in a self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. After the lock core matches the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.The security of the access control system includes impact resistance, which is resistant to damage by mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the lock mechanism of the access control system is also commonly used with electric control locks. Its characteristic carrier is mainly various information cards, and the opening and closing of the door are controlled by the electromagnetic force. Access control solutionApplication scenarios of access control system1.Pedestrian management for international airport and  metro station .2.Access control system for the office buildings,schools,factories etc.it can be equipped with a face recognition function.Shenzhen TGW Technology Co., Ltd is an access control system manufacturers specialize in access control system security fundamentals.To learn more about our access control system solution  CLICK HERE>>by:Shenzhen TGW Technology Co.,Ltd
TGW team building activities
TGW team building activities
TGW team building activity-world view, world view This year's epidemic came very suddenly and brought huge changes to many companies and individuals. During the epidemic, TGW was fully prepared to fight the epidemic. The employees worked together to face the coming of the crisis, united and stabilized the company's situation, actively promoted products, and entered a new level in business development.The epidemic situation has improved greatly, and the company is also entering a new stage. TGW gathered the staff and their families to participate in outdoor activities after the team had done one live broadcast after another. After the intense work, it was a relaxing trip.On August 23-24, 2020, our team drove to JIAO WEI CHANG of the famous beach in ShenzhenStaying in a homestay, barbecue, entertainment, watching the sunrise, swimming on the beach, relaxing walks and blowing the sea breeze, group dinner, very happy.Once a high-temperature person is detected, the system will not only not open the gate, but also emit a buzzer sound.Our system will also automatically send a high temperature alarm email to the exhibition manager.After this team building, the cohesion has been upgraded again.1. After this team building activity, I deeply feel the importance of the team. Everyone plays a different protagonist in the team. As long as everyone works together, there are no difficulties and problems that cannot be solved. I believe that with the joint efforts of everyone, our company will become stronger and stronger and create greater glories.2. The strength of the team is infinite. In many cases, we need to work together and cooperate. But when others are unable to help you, the most important thing is to rely on yourself and listen to your inner voice. What should I do and what should I do? Then, try to find ways to challenge yourself.3. Team building is very important for an enterprise, especially our technology-based company. The company is a large team, and the work of one department is interlocking. We want to complete a project smoothly and lack a team. Cooperation is not enough. Only when we achieve real teamwork and the members trust each other to help each other learn from each other, our work will be smoother and our future will be brighter.The company’s culture is also one of our important cultures. In addition to daily work, it has enhanced the tacit understanding and collaboration between the teams. Everyone can appreciate the company’s dedication to us. I am grateful for this sense of belonging!
access control security
access control security
access control securityby:Shenzhen TGW Technology Co.,LtdThe access control security system is a security system that is commonly used in modern commercial buildings, communities, schools, and enterprises. The access control security system is a modern security management system that integrates microcomputer automatic identification technology and modern security management measures. Access control security system is used widely in our daily life and work, but how much do you know about the installation of an access control security system? Below I will share with you the contents of the installation of an access control security system. access control security system installation 1: equipment installation 1.Front-end equipmentA. Install a card reader at the entrance. Within the reader's sensing range, do not approach or touch high frequency or strong magnetic fields (such as heavy-duty motors, monitors, etc.), and it needs to cooperate with the grounding method of the control box.B. Install the exit button at the exit.C. The electromagnetic lock is installed on the upper edge of the door and door frame.D. To ensure safety and aesthetics, the controller and power box can be installed on-site or installed in a weak current well. The advantage of installing the controller on-site is to save the use of wires. The controller is installed in the weak current well to facilitate future system maintenance and system security. The controller box can also be installed above the card reader, near the electromagnetic lock. Specific circumstances can choose the installation method according to customers. 2. Central control room equipmentA. The control host and keyboard are installed on the facade wall or placed on the workbench.B. The alarm device is placed in a position with a good alarm effect.C. Due to the special nature of the access control security system, it is required to provide good power to the system. It is recommended to use a UPS power supply to centrally supply the access control security system. access control security system installation 2: equipment debugging 1. After the system installation is completed, firstly connect a signal of the access control card reader to the host, and then separately detect the condition of the access control card reader, and whether there are any false positives or false positives. After checking this way, there is no problem in accessing the other way. In this way, each way is tested separately, and all lines are connected after confirmation. 2. The management personnel can authorize according to the authority of the users. For example, some personnel can enter and exit any place at any time. Ordinary personnel can only enter and exit the authorization scope within the authorization time with the authorization card. When all the access points are opened normally and illegally, check the computer in the control center for records. 3. Attempt that the central computer cannot be connected to the controller due to malfunction or other reasons. Can the controller independently record the relevant information of the controlled door points? After the central computer is connected, can all information be automatically uploaded and whether the information record can be guaranteed to be complete Sex. 4. Make a good record of commissioning. 5. Finally, complete the completion report. access control security system installation 3: pipeline installation 1. The installation engineering wiring shall comply with the national regulations "Code for Construction and Acceptance of Electrical Installation Engineering" and the relevant codes and regulations issued by the state. Threading in pipes or ducts should be performed after construction plastering and groundworks are completed. Before threading, the water and debris in the pipe or wire groove should be removed. Lines with different systems, different voltage levels, and different current categories should not be worn in the same pipe or the same slot in a cable trunk. There should be no joints or kinks in the wires or ducts. The connector of the wires should be soldered in the junction box or connected with terminals. Small cross-section system connections can be spliced. The number of spliced turns should be more than five turns, then tinned and wrapped with insulation tape. Compensation measures shall be taken where the pipeline passes through the deformation joints of the building (including settlement joints, expansion joints, seismic joints, etc.), and the conductors shall be fixed on both sides across the deformation joints with appropriate margin. The terminals in the terminal box should be crimped or terminal boards with solder joints. The terminals should be labeled accordingly. 2. The access controller shall be installed firmly, shall not be inclined, and shall have obvious signs. Installation on light partition walls should be strengthened. The cables or wires introduced into the access controller should be neat and avoid crossover, and the cable core wire and the part of the matched conductor should be fixed and numbered, and should not be easily discolored with the drawing; the terminal board and each terminal, wiring No more than two cables should be left; there should be no less than 20cm of cable core and conductors; the conductors should be bundled into bundles; after the lead wires of the conductors are threaded, they should be blocked at the inlet pipe. 3. The main power supply lead-in of the access controller should be directly connected to the power supply. It is strictly forbidden to use a power plug. The main power supply should be marked. The ground of the access controller is firmly grounded and marked. 4. The routing and specifications of the ground bus in the monitoring room shall meet the design requirements. The construction should comply with the following regulations: the surface of the ground bus should be complete without obvious damage and residual flux slag, copper tape bus light, slip, and no burrs, the insulation layer should not have aging cracks; the ground bus should be laid on the ground trough or cable The center of the aisle is fixed on the outside of the track groove. The bus bar should be flat and free of skew and bend. The connection of the bus bar to the rack or the top of the machine should be firm; the copper strip bus bar on the cable aisle can be fixed by screws; the copper stranded bus bar on the cable aisle should be tied to the rung; Strictly follow the design requirements. Grounding installation shall be carried out simultaneously with civil construction.More info at Wikipedia
We are in the era of face recognition access control
We are in the era of face recognition access control
access control face recognitionby:Shenzhen TGW Technology Co.,Ltd With the development of technology, the era of intelligence is approaching, and the requirements for automation are increasing. We use the access control face recognition technology to modernize building access control.modernization of management and intelligence has become a top priority in the field of building safety. For a long time, access control system have played an important role in building security, intelligence and management. At present, some smart access control systems are based on cards, fingerprints or passwords for identity authentication. These recognition methods require people to operate at close range. And that is extremely bad when the user is inconvenient to use their hand to operate, it may also cause some troubles by card losing or password forgetting. Cost issues such as copying and theft. How to make the building's intelligent channel system truly safe, intelligent, and convenient has become a problem that security companies need to overcome. In fact, the advent of the access control face recognition system is to meet people’s need of a safe and convenient modern office buildings and living places. Access control Face recognition intelligent system is a kind of biometric recognition technology use human face feature for identification. Its is not easy to be copied,and this provide the necessary premise for identification. The recognition of human faces is used as the condition for opening the gate, and it is also used as the basis for attendance. It not only eliminates the trouble of forgetting to bring a key or card, but also does not require any media to open the door, and the only thing we need to do is registering the face information; in addition, the access control face recognition intelligent system can strictly standardize employee attendance management, thereby avoiding the problems caused by low efficiency and difficult statistics.We provide effective solution for Access control Face recognition system, click here to learn more!
Access control system
Access control system
access control system manufacturer What is the access control system?The Access Control System(ACS) is a control system that uses modern electronic equipment and software information technology to control the entry, shuch as recording and alarming of people or things at the entrance.  It has become an effective measure to ensure the security of the area and realize intelligent management.Types of access control systemThe access control system is mainly composed of the reading part, transmission part, management/control part and execution part, and corresponding system software. There are various types of the access control system. According to its hardware composition mode, it can be divided into the integrated type and split type; according to its management/control method, it can be divided into independent control type, network control type and data carrier transmission control type.1.Each component of the integrated access control system realizes all the functions of access control through internal connection, combination or integration.Each component of the split-type access control system has a structured part and a combination part in different ways. The separated part and the combined part are connected to form a system through electronic, electromechanical and other methods to realize all functions of access control.Independent control type access control system, all display / programming / management / control and other functions of its management / control part are completed in one device (entrance controller).Networked control type access control system, all display / programming / management / control functions of its management / control part are not completed in one device (entrance controller). Among them, the display/programming function is completed by another device. Data transmission between devices is achieved through wired and / or wireless data channels and network devices.The difference between the data carrier transmission control type access control system and the networked type access control system is only in the way of data transmission. The display / programming / management / control and other functions of its management / control part are not completed in one device (access controller). Among them, the display/programming work is done with other equipment. The data transmission between the devices is done through the input/export operation of the removable, readable and writable data carrier.Most important things of the access control systemCharacteristic carrier: The access control system is a system that manages and controls the flow of people, logistics, and information. Therefore, the system must first be able to confirm their identity and determine the legality of their access (behavior). This is to give them a mark of identity and authority through a method. We call it a feature carrier, and the identity and authority information it carries is a feature. The key to a mechanical lock is a feature carrier, and its "tooth shape" is a feature. Many feature carriers can be used in the access control system, such as magnetic cards, photoelectric cards, and IC cards that are most commonly used at present. These feature carriers must be used with the holder (person or thing), but it does not have the same identity with the holder, which means that the feature carrier can be used by others (things). To prevent this problem, multiple methods can be adopted, that is, two or more feature carriers are used (depending on the security requirements of the system). If a unique and stable feature can be selected from the holder itself as the information for identity, this problem will not exist. Of course, the features from the "holder" are called "biological features", such as face recognition technology, and the feature carrier is, of course, the holder.Reading device: A reading device is a device that exchanges information with a characteristic carrier. It reads the information about identity and authority from the feature carrier appropriately, to identify the identity of the holder and judge the legitimacy of its behavior (access request). The feature reading device is a device that matches the feature carrier. The technical attributes of the carrier are different, and the attributes of the reading device are also different. The reading device of the magnetic card is a magnetoelectric conversion device, the reading device of the photoelectric card is a photoelectric conversion device, and the reading device of the IC card is an electronic data communication device. The reading device of the mechanical lock is the "lock core". After the key is inserted into the lock core, the identity of the holder and the authority are confirmed by the movable marbles in the lock core and the tooth shape of the key. The identification process of an electronic reading device is: converting the read feature information into electronic data and then comparing it with the data stored in the device memory to achieve identity confirmation and authorization verification. This process is also called "feature identification ". Some feature reading devices only have the function of reading information, and some also have the function of writing information to the feature carrier. This kind of device is called a "reading and writing device". The system writes information to the feature carrier to authorize the holder. Or revise the authorization process. This feature vector can be modified and reused. The key to a mechanical lock cannot generally be modified, and the authority it represents cannot be changed. Human biometrics cannot be modified, but the rights they possess can be changed through system settings.The locking mechanism of the access control system: The access control system is only practical if it is coupled with an appropriate locking mechanism. After the reading device confirms the identity and authority of the holder, it is necessary to enable the legal person to enter and exit smoothly and effectively prevent the request of the illegal person. Different forms of locking mechanisms constitute a variety of different access control systems or different applications of access control technology. For example, the lever of a subway toll system, a car stop in a parking lot, and a banknote collection device in a self-service bank. Locking If the mechanism is a door, the system controls the opening and closing of the door, which is the "access control" system. The mechanism lock is a kind of locking mechanism of the access control system. After the lock core matches the tooth shape of the key, the handle can be turned to retract the lock tongue to open the door.The security of the access control system includes impact resistance, which is resistant to damage by mechanical forces. This performance is mainly determined by the locking mechanism of the system. In addition to the mechanical lock, the lock mechanism of the access control system is also commonly used with electric control locks. Its characteristic carrier is mainly various information cards, and the opening and closing of the door are controlled by the electromagnetic force. Access control solutionApplication scenarios of access control system1.Pedestrian management for international airport and  metro station .2.Access control system for the office buildings,schools,factories etc.it can be equipped with a face recognition function.Shenzhen TGW Technology Co., Ltd is an access control system manufacturers specialize in access control system security fundamentals.To learn more about our access control system solution  CLICK HERE>>by:Shenzhen TGW Technology Co.,Ltd
Several Troubleshooting Methods of Access Control System_ Taigewang Technology
Several Troubleshooting Methods of Access Control System_ Taigewang Technology
There are two kinds of common faults of access control system: 1. Unable to communicate; 2. If the electric lock cannot be locked, how can we solve it? There are two kinds of failure to communicate, one is that 485 access control does not communicate, and the other is that TCP IP controller does not communicate. Communication fault 1: 485 access control does not communicate. The solution steps are as follows: 1. Check whether the 485 communication line has short circuit or open circuit; 2. Measure the voltage at both ends of 485 communication line, and it is normal when it is between 3v5v; 3. Check whether the software port settings correspond to the computer port. 4. Conduct [detection controller] operation on the controller at the interface of the main control console, and observe whether the status indicator of 485 communication converter flashes while operating. 5. Check whether the serial number of the controller has been encrypted (the special encryption tool can be restored). Communication failure 2: the TCP IP controller does not communicate. The solution steps are as follows: 1. Check the communication mode of the controller. Select [small LAN] for LAN and [medium and large network] for cross network segment. When crossing network segments, first set the controller IP to the network IP of the LAN where the controller is located, including IP address, subnet mask, gateway, DNS server, etc. Then search the management computer for a. Net controller and add it. 2. Ping the IP of the controller at the command prompt to see if the network is connected. 3. If it is a cross network segment, check whether the router port is open or IP bound. 4. Use a line measuring instrument to measure whether the network cable is unobstructed. 5. You can take the controller to the computer and test the communication in a LAN. Ensure that the computer and access controller are free of problems. The above is the solution to the non communication fault of the two devices, and the following is the solution to the electric lock fault. Electric lock fault 3: the electric plug-in lock is not locked. The solution steps are as follows: 1. First check whether the wiring is correct. 2. Use a multimeter to measure whether the voltage at both ends of the electric plug-in lock is above 11.5V. 3. Check whether the magnetic sheet of the electric plug-in lock is magnetic or misaligned. 4. If the above methods fail, return the lock to inspection and maintenance. Electric lock fault 4: the electromagnetic lock is not locked or the suction is insufficient. The solution steps are as follows: 1. Check whether the wiring is correct. 2. Measure whether the voltage at both ends of the electric lock is above 11.5V. 3. Check whether the contact between the lock body and the suction sheet is complete and sufficient. The fixing nut of the lower suction sheet can be slightly adjusted to make the suction sheet have a certain movable space. Electric lock fault 5: the electric plug-in lock or electromagnetic lock is not locked for a long time. The solution steps are as follows: 1. First check the door opening delay setting of the access control. Generally, the door opening delay is set within 6 seconds. At the same time, the delay can be adjusted appropriately according to the speed of the door closer to ensure that the delay is longer than the door closing time of the door closer. 2. Online access control delay adjustment method: A. set the door opening delay on the software. b. Adjust the delay knob of the locking power supply. c. Adjust the time-delay jumper on the side of the electric plug-in lock. (see instructions for details).
Chat About Several Common Access Control Systems_ Taigewang Technology
Chat About Several Common Access Control Systems_ Taigewang Technology
Access control everyone will contact in daily life. Our most common lock key also belongs to access control. However, with the development of electronic technology and network technology, access control has developed into a complete access management system. Access control system not only plays a role in access security control, but also plays an important role in administrative management and personnel attendance. The access control system can be divided into password access control system, card access control system and biological access control system according to the identification method. 1、 Password access control system password access control system is more traditional. As long as you enter the correct password, the door will be opened and released. This identification method has the lowest cost, as long as you remember the password, which is its advantage. However, this identification method is not very convenient to use, because it takes time to enter the password. If there are too many people, they still need to queue up, and password input errors are common on the scene, which takes longer. On the other hand, the security of password recognition is poor, and others may remember the password through gestures, resulting in password disclosure. Due to these reasons, access control using password identification is less and less used, generally in storage cabinets, safes and so on. 2、 Card access control system card access control system can be divided into contact card access control system (such as magnetic stripe card, bar code card, etc.) and non-contact card access control system (such as induction card and RF card). At present, the non-contact card door ban system is widely used. It is welcomed by users because it is not easy to wear, good durability, fast reading speed and high security. On the contrary, because the contact card is easy to be worn and damaged and used less times, the scope of use is becoming smaller and smaller. We often use magnetic stripe cards such as bank cards. 3、 Biometric access control system biometric access control system is recognized based on human characteristics. The most common one is fingerprint identification system. In addition, there are palm access control system, iris (retina) access control system, portrait recognition access control system, etc. The biometric mode has high security, is not easy to copy and is convenient. The disadvantage is that the human characteristics will change, resulting in an increase in the rejection rate and a constant. At present, this identification access control system is mostly used in a few areas with high security requirements. Well, we'll introduce the types of access control systems here. Thank you for reading.
What Is the Access Control System? What Are the Brands of Access Control Systems at Home and Abroad_
What Is the Access Control System? What Are the Brands of Access Control Systems at Home and Abroad_
Access control system is an important branch in the field of security. Security is mainly composed of video monitoring system, access control all-in-one card system and perimeter alarm system. Parking lot system, access gate system, entrance and exit access control system; These management and control technical means commonly used to manage the access of vehicles and personnel are the specific application of access control system. Access control technology involves many high and new technologies, such as mechanical transmission, electronic information, automatic control, computer processing, communication transmission, biometrics and so on. It is mainly used in banks, hotels, parking lots, confidential rooms, intelligent communities, business centers, office buildings, etc. So what are the brand manufacturers of access control system at home and abroad? 1. Honeywell access control system, an American enterprise, a global security giant and a world top 500 enterprise, has rich experience in manufacturing electronic security products. 2. Bosch access control system is a German enterprise, a world top 500 enterprise, a leader in security and communication industry, a global comprehensive multinational group, product system and its stability. 3. Ingersoll Rand access control system (Ingersoll Rand (China) Investment Co., Ltd., a leading diversified multinational industrial company in the world, a world-famous brand and one of the first foreign-funded enterprises to enter China) 4. Jieshun access control system. Shenzhen company, with rich experience in the access control industry, complete product series, older qualifications, domestic access control brands and high prices, Shenzhen Jieshun Technology Industry Co., Ltd. 5. Taigewang technology access control system. Shenzhen local enterprise, double high certification (national high-tech enterprise, Shenzhen high-tech enterprise), a rising rookie brand in the field of access control parking lot, and the first independent and successful manufacturer of Taige Wangyun parking lot platform in China. Taige Wangyun product series is deeply welcomed by the market.
no data
Shenzhen TGW Technology Co.,Ltd is the leading access control solution provider for vehicle intelligent parking system, license plate recognition recognition system and pedestrian access control turnstile and face recognition terminals.
no data
CONTACT US

Shenzhen TigerWong Technology Co.,Ltd

Tel: +86 0755-23773884 

E-Mail: info@sztigerwong.com

Add: Room 601-605, Building 6, 1980 Science and Technology Industrial Park,  Longhua Street, Longhua District, Shenzhen

                    

Copyright © 2021 Shenzhen TigerWong Technology Co.,Ltd  | Sitemap
chat online
Please message us and we’ll be sure to respond ASAP, what product you intrested in?