FPI Training Material New Product Development Group 1 2015.05.25.

Slides:



Advertisements
Similar presentations
FPC1011F Introduction of a new sensor package.
Advertisements

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
DRS \\ 7jun02 1 techieDetail16.ppt TruePrint Technology The Fundamentals.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Quick Enroll Dialog Using the Dialog Enrollment Technique: Lock Drop & Hold Suggested Finger and Finger Placement Fingerprint Core Finger Position, Rotation.
Fingerprint Sensing Techniques, Devices and Applications
CASS TECHNOLOGY SDN BHD ( X) THE LEADING INNOVATOR OF SECURITY SYSTEM TOTAL SECURITY SOLUTION PRESENTS InnerScan Fingerprint Security Access Control.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
PRESENTED BY : DUA RAZA CLASS IX. FINGERPRINT IDENTIFICATION Among all the biometric techniques, fingerprint- based identification is the oldest method.
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Defence Research and Development Canada Recherche et développement pour la défense Canada Canada Challenges and Potential Research Areas In Biometrics.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
BIOMETRIC CARDS – SECURE, SAFE AND SIMPLE ID FOR MASS MARKET APPLICATIONS Ralph W. Bernstein (CEO/CTO) Transatlantic Science Week 2011, Stanford University.
How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.
Exploitation of smart cards and human biometrics attributes RNDr. Luděk Smolík Martin Drahanský.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
THE FINGERPRINT  The reader acquires the fingerprint image.
MBIU PDR MBIU Preliminary Design Review. MBIU PDR Team Members and Presentation –Brian Weigner: Overview & Application –Claude Rossignol: CPU Board –Dan.
LP 400. General Issues faced by Business Organizations:  Attendance Proxy through “buddy punching”  Errors when computing time  Cost of paper time.
Biometrics and Authentication Shivani Kirubanandan.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Digital Technology 14.2 Data capture; Digital imaging using charge-coupled devices (CCDs)
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Introduction to Biometric Systems
Input technologies All require some form of data acquisition –e.g. Image scanner, Microphone Once acquired, if the signal is not already digital, it will.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
UMPC meeting STMicroelectronics Oct 21st Image Sensors with 3D Heterogeneous Integration GIP-CNFM November, 26th 2009 Jean-Luc Jaffard : Deputy.
The solution is at your fingertips!. BARTEX 2000 Corp. BARTEX brings You integrated security solutions using the most advanced technology available in.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
PPT on ”Transparent Technology”
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
DRS \\ 7jun02 1 Operating Principles for Very small fingerprint sensors.
“Fingerprint Recognition based on Silicon Chips”.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
Cypress Semiconductor Corporation Cypress Confidential Sales Training 09//25/2012 Synaptics S320x vs. Cypress TMA46x Mobile Phone Applications Cypress.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
TOUCH SCREEN TECHNOLOGY
Biometric for Network Security. Finger Biometrics.
1 Machine Vision. 2 VISION the most powerful sense.
Matching monitors for SPS and LHC E. Bravin 31 March 2011.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
By: Brad Brosig.  Introduction  Types of Biometric Security  The Installation Process  Biometric Authentication Errors  The Necessity of Mobile Device.
Fingerprint Sensor Market Demands
Cypress Roadmap: TrueTouch® Touchscreen Controllers
Implementation of An Automatic Fingerprint Identification System
PRECISE BIOMETRICS CORPORATE PRESENTATION
Cypress Roadmap: TrueTouch® Touchscreen Controllers
FPI Module Presentation
Advanced Hybrid Fingerprint Recognition USB Module
Hand Geometry Recognition
Multimodal Biometric Security
Products/Solutions/Expertise of C-DAC Mumbai in Smart City Domain
2N® Access Unit Fingerprint reader
Jenna Lutton February 26th, 2007
Secure and Privacy-Preserving User Authentication Using Biometrics
Welcome To Money pad November 23, 2018 Sample footer.
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Midway Design Review Team 1: MirrAR
ONE PHONE ANDROID Samsung Mobile Phones Singapore.
ONE PHONE ANDROID Huawei Mobile Phones Singapore.
ONE PHONE ANDROID Huawei p30 lite Singapore Price.
Presentation transcript:

FPI Training Material New Product Development Group 1 2015.05.25

Ⅰ What is Fingerprint? The definition of minutia feature is made from modern fingerprint method by E.R. Henry, a British scholar, which is Henry System Classification. He classified the fingerprint as 2 parts and 8 types. If there are 13 features matching, Henry will consider they are same fingerprint. The gap between 2 ridges are between 300 to 500 μm, while the height difference are between 100 to 400 μm. In order to get enough feature points for identification, the size and resolution of the fingerprint image should be 1cm x 1cm and 500dpi.

Ⅰ What is Fingerprint?

Ⅰ What is Fingerprint?

Ⅱ Fingerprint Identification System and Application

Ⅱ Fingerprint Identification System and Application ENROLMENT: Extraction of biometric data and construction of template FTE: Failure To Enrol Template Verification (1:1): User: “I am Christian” System: “Yes you are” or “No, you are not” Identification (1:n) or (1:many): User: “Here I am” System: “You are Christian” or “I do not know you”

Ⅱ Fingerprint Identification System and Application VERIFICATION:Comparison of captured biometric data with one predetermined stored template FRR: False Rejection Rate FAR: False Acceptance Rate

Ⅱ Fingerprint Identification System and Application IDENTIFICATION:Comparison of captured biometric data with many stored template in database

Ⅱ Fingerprint Identification System and Application Fingerprint Identification provides a safe and convenient method for ID Verification and Management Cellphone/PAD Unlocking App. Access Control Folder Encryption Fast Logging(alternative for digital code) Quick Launch and Logging Express Payment

Optical:Illuminant+CMOS+Lens Ultrasonic:determine the distance Ⅲ Fingerprint Sensoring Principle Capacity Type Trans Capacitive Self Capacitance Optical:Illuminant+CMOS+Lens Ultrasonic:determine the distance Two types: Area vs. Swipe Sensor

Self Capacitance Ⅲ Fingerprint Sensoring Principle Sapphire Cover Lens Exciter Ring Sense Pixel Array

Ⅲ Fingerprint Sensoring Principle Each square is pixel RX Finger is TX Driven by Exciter Ridge Valley Excitation voltage ~1 MHz coupled into finger via Exciter Ring or Bezel Sense Amps at each pixel measure capacitance between finger and pixel Very good sensitivity, but active circuitry at each pixel needed

Trans Capacitive Ⅲ Fingerprint Sensoring Principle Very fine TouchPad TX RX Ridge Valley Very fine TouchPad Sense trace spacing typically 70-110 um 16 MHz 3V RF placed onto successively-scanned TX rows

Swipe Type Sensor Ⅲ Fingerprint Sensoring Principle Host Platform Reconstruct Image Extract Minutiae M1={x1,y1,a1,z1) M2={x2,y2,a2,z2} ... Raw Image Data Fingerprint Template

Ⅲ Fingerprint Sensoring Principle Area Type Sensor

Ⅳ FPI Module Structure and Sensor List I Molding + Ultra thin cover lens II Molding+Thick CoverLens

Ⅳ FPI Module Structure and Sensor List III Molding+Coating IV CoverLens(Independent)

Ⅳ FPI Module Structure and Sensor List V Under Glass FPI Module RoadMap MP PP MP PP MP R&D PP MP R&D PP MP

Molding+Coating Structure FPI Appearance and Surface Magnification Ⅳ FPI Module Structure and Sensor List Molding+Coating Structure FPI Appearance and Surface Magnification Features Coating Sapphire Lens Glass(thick) Lens Glass(thin) Lens Appearance Hardness Cost IC Compatibility MP Capacity IC Sources for Truly Goodix、Silead Goodix Goodix、Silead、MicroArray

Ⅳ FPI Module Structure and Sensor List FPI Solutions IC Supplier IC P/N IC Packaging IC Size Pixels 0.26mm Saphire/Glass Cover Lens Goodix GF616 COB+Trench+Exposed Molding 4.2*12*0.47 68*118 GF816 COB+Trench++Exposed Molding GF818 96*96 0.2mm Glass Cover Lens GF516 COB+Molding GF518M Silead GSL6163DPR Die 109*123 MicroArray AFS120 TVS Square 0.05mm Ultra-thin Glass Cover Lens /Coating GSL6162MSB COB+Trench++Molding 110*118 GSL6162MRB GSL6162EM GSL6172MTB 80*200 GF316 GF318

Ⅴ Production Capacity Plan

Ultra-thin Glass Cover Lens Ⅵ Market Information Smart Phone Apple iPhone6/Plus HuaWei Mate 7 OPPO N3 Meizu Mx4Pro GuanQun 3022 Type Sapphire Cover Lens Coating Ultra-thin Glass Cover Lens Sensor Authentic FPC Goodix Silead Module Vendor Taiwan ASE Korea CrucialTec A-Kerr Truly Cost 13 USD 8 USD 11 USD 10 USD

LENS Manufacturing Process: Substrate Cleaning→Silkscreen/Ink Spraying →Solidification→AF Evaporation→Cutting →Splintering→LENS QC Assembly Process: FPC Baking→Solder Paste Printing→Chip Mounting →Reflow Soldering→Gel Filling →Solidification →Washing→LENS Lamination→Autoclave→ Solidification→Semi-finished Product Electrical QC→Holder Attaching→ Solidification →Label Printing →Splintering→Silicone Pad Attaching →Finished Product Electrical QC →Protective Film Attaching→Visual Inspection→OQC→Shipping

Sensor Supplier Qualification List Qualcomm (Ultrasonic) √ Qualified ×Total Rejected Updated by 2015/03/15 Class Customer FPC Goodix Synaptics Silead Qualcomm (Ultrasonic) 1st Tier Brand VIVO √ x OPPO Huawei ZTE Xiaomi 2nd and 3rd Tier Brand LeTV K-Touch TCL Gionee Design House Ragentek SIMCOM

FPI Module Manufacturing Ability Matrix 20150430 Molding Coating Optical Bonding Sensor Resources Truly × √ Goodix, Silead, MicroArray O-Film FPC, Goodix A-Kerr Goodix, MicroArray WLCSP Silead Crucial Tec FPC, Idex

Notes for Design Stage Independent power for FPI Module to make sure pure AVDD without noise. If the FPI module is placed on the back of smartphone, and the rear cover is made of metal(connected to GND), customer need to contact the sensor supplier need to confirm the potential risk. If the FPI module is placed on the front side, and the middle- frame is made of metal(connected to GND), customer need to contact the sensor supplier need to confirm the potential risk.

Debugging Notice Silead Sensor Debugging Suite. The debugging suites for Android 4.2/4.4 are OK The debugging suite for Android 5.0 will be OK by the end of this month.