The WEDS Enterprise Attendance and Access Control Card focuses on the application technology of the Internet of Things, fully absorbing the new development characteristics of enterprise informatization, assisting enterprises in promoting the integration of network information, IoT, intelligent management services, and construction in environmental monitoring, public services, and other fields, comprehensively improving the utilization rate of enterprise resources, management level, and quality of software and hardware infrastructure. Based on the accumulated experience in industry practice over the years, drawing on some industry development precedents, and adhering to the needs of the enterprise and future development strategy, we aim to create a new generation of smart enterprise attendance and access control card system for the enterprise.
The system will integrate with the Internet of Things, cloud computing, mobile devices, virtualization, and 3G technologies to support the development of new IT technologies; While upgrading the old business system, it meets the needs of operation and maintenance management and multiple business departments, becoming a “basic platform level application system” that covers the enterprise.
The system will shift from focusing solely on business implementation to focusing on the overall value of the system. Therefore, this system adopts a multi-core, bus based, multi-channel, and flexible architecture to meet the continuous development needs of enterprises.
The system aims to establish a unified application platform for enterprises, and with its support, its applications can achieve the interconnection of identity and data services, changing the current situation of duplicate construction, information isolation, and no unified standards.
The system has unified consumption payment and identity authentication functions, allowing employees to pass through the enterprise with cards, mobile phones, or biometrics alone. It has functions such as cafeteria consumption, parking lot management, entrance and exit gates and unit gates, attendance, recharge, and merchant consumption settlement. Compared to other management information systems, the success of the construction of the enterprise attendance and access control card directly reflects the superior management quality of the enterprise, and allows employees and foreign visitors to feel thoughtful care, creating a safe, comfortable, convenient, efficient, and energy-saving working environment for enterprise managers, employees, and merchants.
Full mode construction ideas
The enterprise attendance and access control card has functions such as attendance management, entry and exit of enterprise gates and unit gates, parking lot management, recharge and payment, welfare distribution, merchant consumption settlement, etc. The system should have unified identity authentication and data management functions, and can achieve a new application height of “visible, controllable, and traceable”, intuitively presenting the true data needs of the current role, and reflecting the people-oriented enterprise management and service philosophy. Therefore, the construction goals of the enterprise attendance and access control card are as follows:
1. Through the construction of the enterprise attendance and access control card system, a unified information platform for enterprise management will be formed first, promoting the standardization of enterprise information management, building an excellent digital space and information sharing environment, and further realizing the intelligence of information management, data transmission networking, user terminal intelligence, and centralized settlement management within the enterprise.
2. Utilizing the enterprise attendance and access control card system to achieve unified identity authentication, replacing multiple cards with one card, and using multiple identification methods to replace one identification method, this reflects the people-oriented enterprise management, making employee life more exciting and management easier.
3. Utilizing the basic data provided by the enterprise attendance and access control card system, integrate and drive the construction of various management information systems in the enterprise, provide comprehensive information services and auxiliary decision-making data for various management departments, and comprehensively improve the management efficiency and level of the enterprise.
4. Implement unified electronic payment and fee collection management within the enterprise, and connect all payment and consumption information with the data resource center platform to share the database of the enterprise attendance and access control card platform.
Overall architecture ideas
The WEDS Enterprise Attendance and Access Control Card System adopts a two-level operation management approach, which is a “centralized control, decentralized management” approach to achieve the management mode of cooperative operation between the enterprise management center and various enterprises.
The system is based on the one card management platform and connects various functional modules through the network to form the basic framework of the system. As the system is designed according to modules, it can be tailored according to the needs of management and development, implemented step by step, with any increase or decrease in functions and expansion of scale.
All functions of the enterprise attendance and access control card system are provided in the form of functional modules. The advantage of modularity is that it can adapt to the needs of users, and the system can be arbitrarily matched and cooperate with each other. It can be combined to meet user needs and closely integrated with user management mode. The system covers multiple application subsystems such as attendance, restaurant consumption, shopping, vehicle entry and exit, pedestrian channels, appointment systems, meetings, shuttle buses, access control, leave entry and exit, data monitoring, information publishing, and query systems. All subsystems can achieve information sharing and uniformly serve the entire enterprise attendance and access control card platform.
Applying technical ideas
The system adopts its own platform framework to simplify the architecture of complex issues related to the development, deployment, and management of enterprise attendance and access control card solutions. The system application program structure adopts a B/S+C/S combination architecture, and the application program architecture is determined based on the characteristics of each subsystem application program. At the same time, it provides the application requirements of high availability, high reliability, and scalability of the middle layer integration framework. Multiple online solutions such as forward UDP unicast, forward UDP broadcast, reverse UDP unicast, reverse TCP, and cloud services are adopted between the front-end business and application servers, covering all current network topologies.
By providing a unified development platform, the cost and complexity of developing multi-layer applications are reduced, while providing strong support for integrating existing applications, enhancing security mechanisms, and improving performance.
Considerations for identifying media
Supports various non-contact RFID card recognition, can expand biometric recognition such as fingerprints/facial images, and mobile phone QR code recognition.
For the encryption process of IC/NFC mobile cards, the card is first authorized. Unauthorized cards prevent enterprise users from using them normally, and then card issuance operations are carried out. After the card issuance is completed, the cardholder can carry out identification operations with the card.
For biometric identification such as fingerprints/facial images, the system first collects the identification features of employees’ fingerprints/facial images, and saves them based on certain algorithms. When re identifying, the detected facial images are searched for targets in the facial image database. Compare the fingerprint features/facial features collected on site with the fingerprint features/facial images stored in the fingerprint database/facial image database to determine whether they belong to the same fingerprint/facial image.
Facial recognition secondary verification: Enable secondary facial recognition verification. When the facial recognition terminal identifies individuals with high similarity (such as twin recognition), it will automatically pop up a secondary verification input box, prompting the recognition personnel to enter the last three digits of their ID number (which can be set), and perform secondary verification comparison to achieve accurate facial recognition of individuals with high similarity such as twins.
contact us
Shandong Well Data Co., Ltd. focuses on campus and government enterprise users with the development strategy of “providing users with overall identity recognition solutions and landing services”. Its leading products include: smart campus collaborative education cloud platform, campus identity recognition application solutions, smart enterprise management platform, and identity recognition intelligent terminals, which are widely used in access control, attendance, consumption, class signage, conferences, etc Management of places where visitors and other personnel need to verify their identities.
The company adheres to the core values of “first principle, honesty and practicality, courage to take responsibility, innovation and change, hard work, and win-win cooperation”, and develops and produces core products: smart enterprise management platform, smart campus management platform, and identity recognition terminal. And we sell our products globally through our own brand, ODM, OEM and other sales methods, relying on the domestic market.
Created in 1997
Listing time: 2015 (New Third Board stock code 833552)
Enterprise Qualification: National High tech Enterprise, Double Software Certification Enterprise, Famous Brand Enterprise, Shandong Province Gazelle Enterprise, Shandong Province Excellent Software Enterprise, Shandong Province Specialized, Refined, and New Small and Medium sized Enterprise, Shandong Province Enterprise Technology Center, Shandong Province Invisible Champion Enterprise
Enterprise scale: The company has over 150 employees, 80 research and development personnel, and more than 30 specially hired experts
Core competencies: software technology research and development, hardware development capabilities, and the ability to meet personalized product development and landing services