Presentation is loading. Please wait.

Presentation is loading. Please wait.

FINGERPRINT BASED ACCESS CONTROL SECURITY SYSTEM SPONSERED BY : PINACLE SOLUTIONS GROUP MEMBERS : 1.PRATIBHA DESAI 2.MANISHA BOLAGE 3.SEEMA KAKADE GROUP.

Similar presentations


Presentation on theme: "FINGERPRINT BASED ACCESS CONTROL SECURITY SYSTEM SPONSERED BY : PINACLE SOLUTIONS GROUP MEMBERS : 1.PRATIBHA DESAI 2.MANISHA BOLAGE 3.SEEMA KAKADE GROUP."— Presentation transcript:

1 FINGERPRINT BASED ACCESS CONTROL SECURITY SYSTEM SPONSERED BY : PINACLE SOLUTIONS GROUP MEMBERS : 1.PRATIBHA DESAI 2.MANISHA BOLAGE 3.SEEMA KAKADE GROUP ID :23

2 WHAT IS BIOMETRICS ?

3 Tokens- Can be forged and used without the knowledge of the original holder. For example, a forger can "steal an identity" and create a fake ID document using another person's information. - Can be lost, stolen or given to someone else. Passwords- Can be obtained or "cracked" using a variety of techniques such as using programs/tools to crack the password. - Can be disclosed. If the password is disclosed to a person they will be able to gain access to information for which they are not authorized. - Can be forgotten which will place a further burden upon an organization’s administration Biometrics- Can be destroyed, and a biometric characteristic's ability to be read by a system can be reduced. An individual's fingerprints, for example, can be affected by cuts and bruises and can even be destroyed by excessive rubbing on an abrasive surface [4]. Also, Accuracy of Biometrics depends mainly on the software that is dealing with them. The following table outlines a comparison between passwords vs. tokens vs. biometrics

4 Generally, physical and behavioural characteristics used by biometrics include the following taxonomy

5 The accuracy of a Biometrics system is measured by: 1.FMR : false match or acceptance rate 2. FNMR : False non-match or rejection rate

6 a list of some of the strengths, weaknesses and suitable applications for each biometric methodology:

7 The following table briefly compares five biometrics according to seven parameters

8  This project implements a Biometrics Access Control Terminal with fingerprint & face identification using an ARM microcontroller. Ethernet capability can also be provided to make a complete Network Enabled Biometrics Access Control System.  The fingerprint of the user will be captured using the fingerprint scanner module. The fingerprint would be processed by the module and if a match is found then this data is communicated to the ARM uC.  Then uC will also capture the timestamp of the fingerprint scan from the RTC.  All these timing details will be stored in the memory.  LED and buzzer indication can also be provided for access allowed/access denied etc.

9  LCD will be used to display different messages.  The keyboard will be used to enter user ID, to change user ID, for selecting modes etc.  Once a user is successfully verified at the terminal using his/her fingerprint, a live image of the user is captured using the CMOS camera at the terminal.  The image will be transmitted over TCP/IP to the server.  The software on the sever will retrieve the user image stored on the server database and will provide a comparison between the retrieved and the live image.  Once the identity of the user is verified completely the user can be granted access to the premises.

10 LCD DISPLAY CMOS CAMERA (HIDDEN) FINGERPRINT MODULE ARM7TDMI BOARD ANALOG INTERFACE DOOR CONTROL ETHERNET CONTROLLER RJ45 INTERFACE 16x4 KEYPAD BLOCK DIAGRAM FOR FINGERPRINT BASED ACCESS CONTROL SYSTEM

11 LAN CONNECTION PC SIDE SOFTWARE USER DATABASE REMOTE PC CONTROL BLOCK DIAGRAM

12  Fingerprint Scanner Module.  CMOS Color Camera.  Ethernet Controller Interface.  Display & Keypad.  Analog Interface for Door Control. MAIN MODULES USED IN FINGERPRINT BASED ACCESS CONTROL SYSTEM

13 FINGER PRINT SCANNER MODULE THE FINGERPRINT SCANNER MODULE USED IS FIM 3030. THIS GIVES A RS 232 COMPATIBLE OUTPUT THIS PARTICULAR FINGERPRINT SCANNER MODULE CAN STORE AROUND 1000 ENTRIES OF FINGERPRINT OF INDIVIDUAL USER THIS COMPARES THE FINGERPRINT WITH THE STORED ONE THEN AS RESPONSE TO IT,IT CREATES ITS OWN ID TO THAT SPECIFIC FINGERPRINT AND SENDS IT TO ARM7

14 3D fingerprint

15 CMOS COLOR CAMERA CMOS image sensor CMOS image sensor THE NAME OF CAMERA WHICH WE ARE USING IS C23R IT’S OUTPUT IS IN THE FORM OF JPEG FORMAT IT GIVES OUTPUTWHICH IS ARM7 COMPATIBLE

16  An active-pixel sensor (APS)  An integrated circuit containing an array of pixel sensors  Each pixel containing a photo detector and an active amplifier.  CMOS APS used in cell phone cameras, web cameras and in some DSLRs.

17  Ethernet : family of frame-based computer networking technologies for local area networks (LANs).  No of wiring and signaling standards for the Physical Layer of the OSI networking model as well as a common addressing format and Media Access Control at the Data Link Layer.

18 FEATURES OF LPC 2131/32/34/36/38  Based on a 16/32-bit ARM7TDMI-S CPU with real- time emulation  Embedded trace support with 32kB, 64kB, 128kB, 256kB and 512kB of embedded high-speed flash memory.  A 128-bit wide memory interface  Enable 32-bit code execution at maximum clock rate. Tiny size and low power consumption  Wide range of serial communications interfaces  On-chip SRAM options of 8 kB, 16 kB, and 32 Kb.

19  32-bit ARM7TDMI-S  32 kB of on-chip static RAM  512 kB of on-chip flash program memory.  128-bit wide interface with speed of 60 MHz operation.  High speed erase in 400 ms  programming of 256 B in 1 ms.  Low power Real-time clock & 32 kHz clock input.  Vectored interrupt controller  Up to forty-seven 5 V tolerant general purpose I/O pins  60 MHz maximum CPU clock FEATURES OF ARM7 TDMI-S MICROCONTROLLER

20 IT PROVIDES HIGHER LEVEL SECURITY. IT IS HIGHLY IMPOSSIBLE TO ENTER THE FAKE FINGERPRINT IT IS CHEAPER AS COMPARED TO ALL OTHER SYSTEMS FINGERPRINT IS UNIQUE IDENTITY ADVANTAGES OF FINGERPRINT BASED ACCESS CONTROL SYSTEM

21 DISADVANTAGES OF FINGERPRINT BASED ACCESS CONTROL SYSTEM SYSTEM RESPONSE IS POOR WHEN THE RIDGES ON FINGER ARE NOT DETECTABLE (eg. BURNED FINGER,WET FINGER etc. )

22 APPLICATIONS OF FINGERPRINT BASED ACCESS CONTROL SYSTEM IT IS USED IN BIOMETRICS. IN VIDEO SURVEILLANCE. IN HUMAN COMPUTER INTERFACE IMAGE DATABASE MANAGEMENT USED IN MILLITARY AREAS. IN SCIENTIST LABS.

23  BIOENABLETEHC.COM REFERENCES

24 THANK’S!


Download ppt "FINGERPRINT BASED ACCESS CONTROL SECURITY SYSTEM SPONSERED BY : PINACLE SOLUTIONS GROUP MEMBERS : 1.PRATIBHA DESAI 2.MANISHA BOLAGE 3.SEEMA KAKADE GROUP."

Similar presentations


Ads by Google