logo
Send Message
Wuhan Homsh Technology Co.,Ltd.
products
Cases
Home >

China Wuhan Homsh Technology Co.,Ltd. Company Cases

Criminal Investigation Iris Capture Project for a Municipal Public Security Bureau in Guangdong Province

Project Overview       A total of 33 sets of iris collection systems will be built in the sub-bureau and its subordinate police stations, equipped with telescope-type iris collection devices. Iris collection and recognition will be carried out for persons in the jurisdiction such as suspects involved in cases, persons subject to administrative penalties, and summoned persons. An iris database for key attention personnel will be established, and accurate identity verification will be conducted for criminals and offenders. The system collects and stores personnel's iris information in the database, and binds their ID card information with their iris feature information on a one-to-one basis, realizing the principle of "one ID card corresponds to one iris, and one iris corresponds to one ID card". At the same time, the local iris database and the national iris database are used to conduct iris identity verification for key personnel. Demand Analysis      The front-end collection devices use a telescope-type iris collection client and the Hongshi Collection Platform. Brief System Description      The iris identity recognition system centers on database storage technology. All front-end collection and recognition clients of the system are controlled by the back-end servers for data download and upload through communication methods. The back-end consists of an independent server cluster, whose main functions are to manage the communication of each collection and recognition terminal, and be responsible for uploaded data and access rights. In the early stage, the system collects personnel's iris information; in the middle stage, it conducts centralized storage and processing of identity information data; in the later stage, it performs identity information comparison, data statistics presentation and analysis. Finally, it achieves the goal of verifying the legitimacy of personnel's identity information. Most of the collection terminal devices of this project are integrated with the standard multi-modal biometric information collection platform for personnel. Topology Diagram System Composition      The system is mainly composed of an ID card reader, an iris collector, and an iris collection management client. System Process Project System Features 1.Excellent Performance and Comprehensive Functions of the Collection System     The equipment complies with the Technical Requirements for Iris Collection Devices Used in Criminal Investigation Services (for the construction of a 10-million-level iris database of the criminal investigation dedicated subsystem); it enables high-speed and high-quality iris image collection with a collection time of < 2 seconds; it supports automatic trigger for collection; it has a built-in LED fill light and supports automatic and manual control of internal light intensity to realize iris image collection under multi-level light intensity; it is equipped with liveness detection to prevent prosthetic attacks in the form of iris photos, iris videos, etc.2.One-Stop Identity Information Collection Solution     Based on independent intellectual property technology and a strong R&D and service team, Hongshi Technology provides a one-stop overall solution, including terminal collection device deployment, software development and data management.3.Easy-to-Operate and Intelligent Application Platform     The front-end collection platform can automatically mobilize collection devices in sequence, and perform functions such as automatic verification of collected data and automatic transmission, ensuring the integrity of collected data and realizing intelligent operations.4.Secure Transmission and Management of Data     It conducts effective and convenient management of a large amount of data collected by the front-end, as well as a large number of devices and stations, and provides multi-dimensional query and statistical analysis to serve business applications directly.5.Openness and Scalability of the Platform     The platform reserves standard unified interfaces and supports the access of multiple application systems. User Feedback      Since the successful implementation of this project, the system has been operating well and has been highly praised by senior public security leaders. By using unique iris feature collection and recognition devices, this project realizes high-security, high-precision and fully automatic collection of biometric features including iris information, enabling real-time, rapid and accurate grasp of the real identities of suspects. In addition, through real-time computer display and data statistics, it achieves effective management and tracking of suspects. At the same time, a customized suspect information management software has been developed, which realizes seamless integration with the already-built professional criminal investigation information application system, achieving information interconnection, sharing and reuse.

Construction of an Iris Access Control System at a Detention Center in Tianjin

Project Overview      With the rapid development of information and network technologies today, high and new technologies have not only improved productivity but also transformed people’s ways of thinking, working, and living. The strategic guideline of "strengthening police forces through technology" is profoundly changing the traditional working methods of law enforcement. The construction of access control systems in detention facilities is an essential foundation for realizing modernized detention management and ensuring detention facility security. Detention facilities are the primary places for detaining suspects and prisoners, so the construction of their security systems is a top priority. To effectively prevent and stop incidents such as escapes and prison riots, detention facility access control systems play a crucial role. By implementing strict restrictions and linked control over various entry-exit checkpoints inside detention facilities—such as second-door checkpoints, cell doors, and corridor doors—these access control systems enable the management of daily operations, including prisoner confinement and release periods, attendance tracking for detainees and on-duty police officers, and internal facility management. They inject a new concept of scientific management into detention area supervision, build a high-tech operational platform for various work aspects, and lay the groundwork for the detention facility’s management to reach a high and advanced level in the new century. Demand Analysis      The second-door checkpoint and channel control system at the entrance and exit of the detention facility building are important components in the field of security technology and protection. Detention facilities need to build a high-security access control system with accurate identity verification to maintain order and implement standardized management of police officers and prisoners within the facility. The entire access control management system consists of three parts: the Information Collection and Registration Subsystem, the Second-Door Subsystem, and the Channel Access Control Subsystem. The Information Collection and Registration Subsystem is installed at the detention facility’s management center; the Second-Door Subsystem is distributed in the police officer and prisoner channels on the first floor of the detention facility building; and the Channel Access Control Subsystem is distributed at key checkpoints, corridor doors, and inter-floor channels on each floor.      Front-end devices shall be installed on channel doors. For areas using mechanical access control systems, door magnetic switches or alarm devices shall be installed, with functions such as location identification and automatic sound and light alarm display. For areas using electronic access control systems, functions such as personnel identification, location identification, automatic monitoring and recording, and system-controlled full opening, full closing, or partial opening/closing of door locks in emergency situations shall be available, with manual switches provided as backups. The system supports multi-door interlocking and anti-tailgating functions: when one of the two doors is open, the other door is prohibited from opening; the door to be opened can only be unlocked when the other door is closed. It supports the emergency double-opening function to facilitate personnel entry and exit in emergency situations (such as fires, gas leaks, etc.). It also supports the emergency double-closing function: if someone tailgates into the facility, both doors can be closed urgently, and they can only be opened after the normally closed state is canceled and confirmed. The system supports the duress card access function: in special circumstances, if a person uses a duress card or password to open the door, the door will open normally, but the central controller will issue a duress alarm with sound and light prompts. The access control system of the detention facility shall be equipped with two-way identity verification control. Detailed data of each entry and exit—including time, personnel, and door location—shall be recorded by the access control system, which also provides functions such as checking historical records and printing time reports. Brief System Description      The system mainly realizes multi-level control over personnel entering and exiting the detention area. According to the entry sequence of personnel entering the detention facility building through the police officer channel and prisoner channel (AB-door system) at the first-floor second-door checkpoint, iris access control management systems are installed at the first-floor entrance/exit and corridors to control personnel entry and exit, greatly improving the overall security and management efficiency of the detention area. Detention facility managers uniformly collect and register information (including iris data) of police officers and detained prisoners, and assign access permissions. Multiple access methods are available, including CPU card, ID card, iris recognition, and password. For visitors and temporary personnel, temporary iris permissions can be registered and automatically deleted upon expiration. Meanwhile, the system can realize daily personnel entry/exit management, staff attendance management, and statistical analysis. Topology Diagram System Composition      The detention facility’s iris access control system mainly consists of three parts: the Registration and Collection Subsystem, the AB-Door Access Control Subsystem, and the Channel Access Control Subsystem. System Process Project System Features       The iris access control management system adopts non-contact identification and supports multiple access activation methods. It grants different entry and exit permissions to users for multi-level control, and equipment selection during system construction shall be based on the customer’s actual needs. Meanwhile, it implements access control over different areas, specific doors, and channels within the project. The iris access control system supports remote management, enabling functions such as data modification and security key verification. The access control system controller is connected to alarm output and fire-fighting linkage expansion interfaces, with fire alarm and emergency door opening functions: when a fire-fighting switch signal is received, all doors under the jurisdiction of the access control system controller will open automatically. User Feedback      This system has realized the following functions: user information management, authorization management, equipment management, attendance management, real-time monitoring, dynamic tracking and monitoring, entry/exit record query, double-door interlocking, anti-passback management, and duress password input.

Iris Identity Verification System for an International Airport in Hubei Province

Project Overview            The Iris Identity Verification System (hereinafter referred to as the Iris System) is developed with information technology as the support and integrated with biometric technology. Its intelligent analysis platform enables comprehensive business applications such as identity information collection and storage, 1:N identity verification, 1:1 identity authentication, blacklist control, and personnel trajectory marking. It also supports concurrent business requests and portal access from multiple users. The system can achieve information resource sharing in the existing police systems and integrate various comprehensive applications and coordination among multiple systems into integrated management through big data interaction. It aims to establish a complete biometric identity information database and a set of accurate, efficient, and secure identity recognition systems.       The project construction includes two parts: the server side of the iris identity verification system and the iris collection & recognition front - end. Requirement Analysis (1) Server Side of the Iris Identity Verification System      An iris identity verification system service platform will be built in the data center computer room of the Airport Public Security Branch (which enables access to the public security network). It adopts a one - level database construction mode, with a designed capacity for 2 million people. The server side of the iris system provides services such as data entry, storage, duplicate checking for storage, iris comparison, comprehensive information association, and comprehensive information query for the collection & recognition front - end. In the future, it can be connected with the provincial iris identity verification system, police comprehensive system, and security inspection management platform of Hubei Provincial Public Security Department to establish a complete iris data collection, storage, and application resource system.(2) Iris Collection & Recognition Front - end      Iris collection and recognition devices will be deployed at the manual counters of security inspection channels in the domestic departure area and airport police offices. At the initial stage, these devices are used for iris collection of domestic passengers. After accumulating a certain amount of data, they can be used for iris identity authentication of domestic passengers. In the future, they can also cover the iris collection and authentication of foreign passengers. A total of 62 sets of devices will be installed. Brief System Description       Based on iris technology, the non - contact iris recognition system provides customers with a complete, reliable, secure, and convenient non - contact iris system solution without affecting the original airport identity verification system and order.       The entire system operates on the public security private network. The integrated desktop iris collection client accesses via the public security wired network and interacts with the airport iris identity verification server. It will be connected after the provincial and ministerial criminal investigation iris systems are established in the future. Topology Diagram System Composition System Process Project System Features (1) Cloud - based Deployment      Supports virtualization and can be deployed on cloud hosts in the cloud computing center.      Supports clustered expansion, resource pool management, and unlimited capacity expansion.      Supports remote configuration and deployment for the collection & recognition front - end, enabling visualized platform management and batch loading/upgrading of software packages.(2) Unified Cloud Management and Centralized Resource Control      Enables unified portal access for user system management.      Supports centralized resource control and provides multiple management mechanisms such as permission domain management, user management, device management, resource management, and report management.      Supports resource pool formation, load balancing, local backup, and remote disaster recovery.(3) Openness, Flexibility, and Strong Network Adaptability      Provides open interfaces based on standard HTTP/Web Service specifications, allowing connection and integration with third - party systems.(4) Powerful Data Analysis Engine      This project uses an iris coding and comparison engine with a domestically pioneered all - hard - core technical solution. The original domestic iris recognition algorithm PhaseIris is applied to self - developed chips and loaded onto the coding and comparison engine. This product has been verified by a large number of actual commercial cases and can be applied to iris image collection, image segmentation, iris coding, fast comparison, and signal control in various environments. It features fast matching speed, high accuracy, and strong stability.(5) Intelligent Front - end Comparison Device      The device adopts a dual - screen design, allowing both passengers and security inspection staff to monitor the iris collection status via the screens. Triggered by ID card reading, the device automatically collects passengers' irises (with automatic zooming for iris capture). After completion, the collection or recognition results are displayed on the screens synchronously. There is no need for manual intervention or operation throughout the process. User Feedback       During the application period, the system has maintained stable operation for a long time. Without affecting the efficiency of entry - exit and customs clearance, it has achieved efficient collection and storage management of large - scale data. The collected data serves as an important data resource for personnel identity management, entry - exit management, and social security management applications. At present, Hongshi Technology is assisting in the deployment of high - speed comparison systems to support the airport in conducting secure identity verification.

Application of Iris Recognition Systems at a Mining Group in Henan Province

Project Overview       Iris recognition equipment is installed at the entrance and exit of the mine shaft to monitor in real-time the time when coal miners enter and exit the mine, the number of underground shifts, shifts, lateness, early departure, etc., and can perform classified and hierarchical summary. Demand Analysis       In order to strengthen the standardization of quality and management & maintenance work of the coal mine attendance management system, ensure that the coal mine workers' attendance management system plays its due role, in accordance with relevant national laws and regulations, industry standards such as the Coal Mine Safety Regulations and Specifications for the Use and Management of Underground Coal Mine Workers Management Systems, combined with the actual situation of the coal mine, iris recognition equipment is installed at the entrance and exit of the mine shaft to monitor in real-time the time when coal miners enter and exit the mine, the number of underground shifts, shifts, lateness, early departure, etc., and can perform classified and hierarchical summary. Brief System Description       The iris attendance management system adopts a two-level network construction mode. The group headquarters builds the iris attendance main system, and three mining areas (6th, 5th, and 12th mining areas) each build an attendance management subsystem (a two-level structure of one main system and three subsystems). The subsystems are responsible for the iris recognition equipment and attendance business applications of their respective mining areas, and report business data and equipment information to the main system. The main system is responsible for coordinating and maintaining all equipment management and aggregating business data, while the subsystems are responsible for the actual business applications and data reporting of their respective mining areas.       The iris attendance system (the main system and subsystems have the same architecture) consists of an iris attendance management platform (software), an iris database, and servers. The system realizes classified storage and maintenance of business data, records of iris comparison results (completing attendance), storage of iris data into the database, distribution of iris data templates (to iris recognition equipment), and provides various system management functions. In addition, the main iris attendance system needs to dock with the Hikvision attendance system (or the group's human resource management platform). Topology Diagram System Composition Project System Features       Equipped with the world's first iris recognition chip;       Full-hardware ultra-high security iris recognition solution;       The fastest recognition speed in the industry;       Recognition accuracy is at least an order of magnitude higher than industry standards;       High-speed and high-quality iris and face image acquisition;       No limit on user capacity;       Can integrate devices with USB ports;       Can realize iris registration and iris comparison functions;       With built-in screen for visual operation and voice prompts, making operation simple and intuitive;       Single-lens binocular automatic acquisition;       Aesthetically modern appearance, enhancing users' willingness to use;       Goggle-style design of the iris collector, improving the efficiency of iris use;       Iris image acquisition for various pupil sizes, ensuring applicability in more complex application scenarios;       Adjustable acquisition angle;

Pilot Project for Information Technology Development at a University in Hubei Province

Project Overview       This plan, integrating the independently developed iris recognition system by Wuhan Homsh Technology Co., Ltd., aims to upgrade and transform the security of the existing campus all-in-one card system at Huazhong University of Science and Technology. It is intended to fundamentally solve security issues, enhance the security level of information by leveraging modern high-tech biometric technology, simplify management processes, and improve the identity verification efficiency of the security system. Demand Analysis       Campus all-in-one cards are easy to lose, and the personal identity information stored in the cards is prone to leakage; moreover, they are vulnerable to fraudulent use. Brief System Description       The pilot system consists of five parts: the self-service iris collection subsystem, the self-service iris query and printing subsystem, the iris-based pickup locker system, the iris access control subsystem, and the server end. It realizes personnel management, intelligent control of the self-service query and printing system, intelligent control of pickup lockers, access control permission management, and rapid processing of background data. Topological Diagram System Composition       The system comprises system hardware equipment and system software management. The hardware equipment includes: self-service iris collection all-in-one machines, iris access control machines, iris recognition modules, and servers. The software includes iris access control management software, network management platforms, SDK development kits, databases, etc. System Process Project System Features       1. User Information Management      2. Authorization Management      3. Device Management Function      4. Permission Management      5. Real-time Monitoring Function      6. Dynamic Tracking and Monitoring Function      7. Entry and Exit Record Query Function User Feedback       Iris recognition devices work well, eliminating the security risks caused by all-in-one cards. In addition, students are highly interested in iris recognition technology, and the system operates stably.

Internet of Everything Smart Safe Community in a City, Hubei Province

Project Overview       The "Internet of Everything" Smart and Safe Community Construction Project in East Lake High-tech Development Zone is one of the top ten people-benefiting projects in Wuhan. Guided by the concept of "joint creation of safety" and adhering to the technical principle of "intelligent integration", the project deploys a series of pan-public security Internet of Things (IoT) element applications based on the city-wide private network IoT for data transmission. Demand Analysis      Based on the technical standards for smart and safe community construction and the functional requirements of intelligent access control, the following analysis is made:      1. It is necessary to build a standardized and normalized intelligent access control system for unified management, so as to realize personnel control over community unit doors and basement entrances and exits. The system should be easy to integrate and uniformly managed by the Smart and Safe IoT Police Platform. In addition, it should feature replicability, promotability and scalability.     2. On the premise of fully considering data and network security, a fully networked system architecture should be adopted. Based on the public security video private network, Narrowband Internet of Things (NB-IoT) technology should be fully utilized to expand the vertical attributes of the video private network.     3. A full-element IoT database should be established, which can support multiple data types and data structures (both structured and unstructured), and meet the real-time, massive, efficient, secure and other requirements of spatiotemporal data and IoT data applications.     4. An access control authorization and card issuance center should be built in the community, where self-service registration devices are placed to collect community residents' information (including ID cards, fingerprints, irises and portraits).     5. The intelligent access control host should support door opening functions such as card swiping, APP, Bluetooth, visitor authorization and iris recognition. Meanwhile, the device should be equipped with universal interfaces and meet the IP66 protection level. Brief System Description      The Smart Iris Access Control System centers on database storage technology. It first collects personnel's iris information, then conducts centralized processing of identity information data and grants access rights. In the later stage, it performs identity information comparison, data statistics presentation and analysis, and finally realizes the verification of the legitimacy of community personnel's identity information. Topology Diagram System Composition      The system is mainly composed of portable card issuers, cabinet-type self-service card issuers, intelligent iris access control machines, the Iris Identity Collection Platform, the Iris Data Management Platform and the Iris Access Control Management Platform. System Process Project System Features      The collection and recognition terminals of the iris access control channel security system based on iris recognition all adopt advanced recognition technology products - iris biometric devices. Its recognition accuracy is 6-10 times that of fingerprint recognition, with a false acceptance rate (FAR) less than 1/1000 of that of fingerprint recognition, a false rejection rate (FRR) less than 1/10 of that of fingerprint recognition, and an average failure rate less than 1/10 of that of fingerprint recognition. Besides, its recognition speed is 5-10 times that of fingerprint recognition. Therefore, iris technology is an ideal choice. There are no two people in the world with identical irises, because the irises of different people have random detailed features and texture images. The iris around the pupil has a complex structure, which can serve as a unique identifier.      The iris access control management system adopts a non-contact recognition method and can support multiple door opening methods. It grants different access rights to users for multi-level control, and equipment selection should be carried out according to the actual needs of customers during system construction. At the same time, it controls the personnel entering and exiting different areas, specific doors and passages within the project. The iris access control system can realize remote management, and perform functions such as data modification and security key verification. The access control system controller is connected with alarm output and fire linkage expansion interfaces, and has fire alarm and emergency door opening functions. When a fire switch signal is received, all doors under the jurisdiction of the access control system controller will open automatically. User Feedback      The entire system has been operating normally, and the work of information collection and card issuance has been completed. It not only serves the "One Standard and Three Realities" work of the public security system (for monitoring key personnel) but also supports community property management and ensures the safety and convenience of owners' entry and exit. It has greatly improved the intelligent construction of the community.

USB Iris Encoding Recognition Module Application Case

Features of USB Iris Coding Recognition Module       With the independently developed iris coding recognition chip as its core, the USB Iris Coding Recognition Module (hereinafter referred to as the Iris Module) integrates an internationally leading-level iris coding recognition algorithm, enabling accurate and fast recognition. This series of iris coding recognition modules is equipped with a universal USB 3.0 interface, which can be integrated into all devices with a USB interface to acquire, code and transmit iris information, with no user capacity limit. During acquisition, both the left and right eyes can be acquired and registered simultaneously; during recognition, either a single eye or both eyes can be used for recognition. It can be connected to a PC via the USB 3.0 communication interface and supports operating systems such as Windows XP, 7/8/10/11, Linux, and Android. The company also provides corresponding SDK development kits, facilitating simple secondary development and application. Main Functions of the USB Iris Coding Recognition Module       1.Iris acquisition;       2.Iris coding;       3.Iris matching Composition of the USB Iris Coding Recognition Module       The USB Iris Coding Recognition Module internally consists of an iris camera part and an iris coding part:       1.The iris camera part mainly realizes the function of acquiring iris images, including a camera, an auxiliary light source and its interface board, and a control board for distance measurement and three-color lights;       2.The iris coding part includes a coding template and an interface board, which is used to process iris images to generate iris templates, and realize template matching as well as communication and transmission.       In a typical application, the host computer (PC/ARM) communicates with the iris coding board via the USB 3.0 protocol to control the iris coding board. The control of other peripheral devices and user interaction are executed by the host computer. The connection diagram between the host computer and the module in a typical design is as follows: Application Cases of the USB Iris Coding Recognition Module       In this typical design, the PC/ARM host computer serves as the control center, which is connected to the iris coding recognition module via a USB interface and receives/sends control signals to control the module. Meanwhile, the PC/ARM host computer is connected to external devices (such as touch screens and keyboards) to receive external input signals. Application Fields       The USB Iris Coding Recognition Module realizes basic functions such as iris acquisition, iris coding, and iris matching. It requires no external power supply and is directly connected to the PC/ARM host computer and peripheral devices via the USB 3.0 communication interface, with no limit on the storage capacity of iris templates. Using this module, a variety of biometric devices with iris coding recognition functions can be developed.       The main application fields of the USB Iris Coding Recognition Module are:       ●heidianIris acquisition devices       ●Iris login devices       ●Iris encryption and decryption devices       ●Iris attendance devices       ●Iris access control devices       ●Identity authentication and authorization devices Application Examples 1. Binocular Iris Acquisition Device       The USB Iris Coding Recognition Module can be integrated into the development and design of binocular iris acquisition devices. A typical binocular iris acquisition device launched by Wuhan Homsh is shown in the figure below:       This typical USB binocular iris acquisition device is designed with an additional display screen and distance measurement module according to different appearance and functional requirements, facilitating use in various application scenarios. The design scheme is shown in the figure below: 2. Binocular Iris Access Control Machine       The USB Iris Coding Recognition Module can be integrated into the development and design of binocular iris access control machines. A typical binocular iris access control machine launched by Wuhan Homsh is shown in the figure below:       This typical binocular iris access control machine is designed with the integration of the USB Iris Coding Recognition Module, and is also equipped with a built-in mini PC, ID card and CPU card recognition modules, a keyboard peripheral, and a 4-inch full-color display screen. It supports multiple door-opening methods such as iris, ID card, CPU card, and password. The design scheme is shown in the figure below:       The USB Iris Coding Recognition Module is connected to the built-in mini PC via the USB 3.0 communication interface, enabling iris acquisition, coding, and matching. This binocular iris access control machine can be connected to the iris registration host via the TCP/IP network mode, allowing simple and fast networking. During iris registration and acquisition, the iris templates are automatically synchronized and distributed to the memory of the terminal mini PC, enabling unlimited user capacity. In addition, it can automatically detect changes (addition, deletion, modification) of iris information in the host-side access control management software and perform synchronous changes to maintain consistency, realizing integrated automation. USB Iris Coding Recognition Module       All iris acquisition devices of Wuhan Homsh are equipped with the USB Iris Coding Recognition Module. The integration of the USB Iris Module offers the following advantages:       1.The plug-and-play USB 3.0 interface enables quick connection and recognition with the PC host, featuring fast transmission speed and easy integration;       2.The product design scheme can include an additional display screen or distance measurement module, which facilitates detecting the acquisition range and effectively improves the user-friendliness of human-computer interaction, making the product design scheme flexible and versatile;       3.The goggle-type binocular iris acquisition device adopts VR design, enabling acquisition with one touch (immediate acquisition upon contact), with simple, convenient and efficient acquisition steps.       The development of other iris acquisition devices can refer to this typical application product for diversified designs.

Iris attendance system for children with disabilities in a city in Jiangsu Province

Project Overview       To implement and carry out the provisions of the Administrative Measures for Provincial Supplementary Funds for Basic Rehabilitation Programs for Children with Disabilities in Jiangsu Province and the Notice on Issuing the Implementation Measures for Free Services of Basic Rehabilitation Programs for Children with Disabilities in Jiangsu Province, and to ensure that children with disabilities receive basic rehabilitation assistance, the provincial finance department has allocated special subsidy funds. To guarantee the smooth implementation of the project, the effective disbursement of assistance funds, and the provision of assistance to children with disabilities, financial departments and Disabled Persons' Federations (DPF) at all levels shall establish and improve various rules and regulations, and effectively strengthen the fund management of basic rehabilitation programs for children with disabilities. They shall formulate fund allocation plans based on the number of assisted children, the duration of institutional rehabilitation, and the subsidy standards of each city and county, and promptly allocate funds to designated rehabilitation institutions. Therefore, the relevant audit departments need a set of accurate and scientific management methods to ensure that funds are earmarked for their designated purposes, accounted for in separate accounts, and that embezzlement, misappropriation, fraudulent claims, false claims, duplicate claims, and arbitrary charges are strictly prohibited. Demand Analysis      Based on the research and needs of the municipal and district DPFs as well as various rehabilitation institutions, the following requirements are specified:      1. It is necessary to build a standardized, intelligent, and advanced municipal-level attendance system for children under the DPF. The system shall facilitate quick and convenient identification of children with disabilities' identity information and enable scientific and effective attendance management.     2. Iris attendance terminals shall be installed in each rehabilitation institution, with the quantity of terminals matching the number of children with disabilities in the institution. The terminals shall effectively collect and identify iris information of children with different types of disabilities.     3. Different management permissions shall be assigned to different administrators to ensure the authenticity and reliability of attendance data. Attendance data can be presented and statistically analyzed by category as required. Administrators shall have remote access to the information and attendance data of children under the DPF in the rehabilitation institutions under their jurisdiction, and generate corresponding reports. Rehabilitation institutions shall not be allowed to delete or modify attendance data.     4. The iris identity information and iris attendance data of children under the DPF shall be backed up to prevent data loss due to unexpected incidents. Brief System Descriptio      The core function of the Iris Attendance System for Children with Disabilities is to manage the attendance of children with disabilities. First, the system collects iris information of children through the on-site iris attendance software (installed on local terminals of each rehabilitation institution) and supporting iris collection terminals, links the iris information with the children's basic information, registers and stores the integrated data, and uploads it to servers or the cloud. When children check in via iris recognition devices, their attendance time is recorded and uploaded to the cloud. Relevant staff then conduct statistical analysis on the attendance data of children with disabilities. Topological diagram System Composition      The Iris Attendance System for Children with Disabilities consists of system hardware equipment and system software management. The hardware equipment includes iris collectors and cloud servers; the software management includes the Iris Attendance Software for Children with Disabilities, the Iris Collection Management Platform, the Network Management Platform, and the Database Management Platform. System Process System Features      The Iris Attendance System for Children with Disabilities centers on database storage technology. In the early stage, it collects children's iris information; in the middle stage, it conducts centralized storage and processing of basic information data; in the later stage, it performs identity information verification, and presents, statistically analyzes attendance data. Finally, it achieves the attendance management goal for the rehabilitation programs of children with disabilities. Based on the Internet, the system uses a public cloud as the server end to uniformly store, manage, and analyze the children's registration information and attendance data from client terminals at various attendance points, enabling off-site, multi-location, remote, and hierarchical attendance management. User Feedback      The C20, built on an iris recognition chip, provides users with an easy-to-use binocular passive iris collection and recognition device. It has realized comprehensive management and recording of guardians' and children with disabilities' information, and effectively managed the attendance and medical services for children with disabilities, achieving convenient, fast, and accurate identity verification.
1