Design And Construction Of An Access Controlled System Using Fingerprint
This research work on “Design And Construction Of An Access Controlled System Using Fingerprint” is available in PDF/DOC. Click the below button to request or download the complete material
ABSTRACT
Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, bio metrics is gaining increasing attention these days. Security systems, having realized the value of bio metrics, use bio metrics for two basic purposes: to verify or identify users. There is a number of bio metrics and different applications need different bio metrics. Bio metric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. Bio metrics measure individual’s unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical bio metrics includes fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Project deals with Identification, Authentication and Setup of Security System using SM 630 Bio metrics and 8051 Micro controller. Beside Bio metrics and 8051 Micro controller the major components required are LCD, General purpose PCB, Relay section (for opening and closing of security doors). The interfacing between 8051-LCD and 8051 – SM 630 Bio metrics Module (Thumb Geometry recognition) is to be implemented. The details about each module are given in next sections of this report.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRCT
TABLE OF CONTENT
CHAPTER ONE
- INTRODUCTION
- BACKGROUND OF THE PROJECT
- AIM/OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- PURPOSE OF THE PROJECT
- STATEMENT OF PROBLEM
- LIMITATION OF THE PROJECT
- APPLICATION OF THE PROJECT
- DEFINITION OF TERMS
- PROJECT ORGANIZATION
CHAPTER TWO
LITERATURE REVIEW
2.0 LITERATURE REVIEW
2.1 REVIEW OF FINGER PRINT
2.2 THE HISTORICAL BACKGROUND OF FINGERPRINTS
2.3 FINGERPRINT RECOGNITION
2.4 PATTERNS OF FINGERPRINT
CHAPTER THREE
3.0 CONSTRUCTION METHODOLOGY
3.1 BLOCK DIAGRAM OF THE SYSTEM
3.2 DESCRIPTION OF SYSTEM BLOCK DIAGRAM
3.3 CIRCUIT DIAGRAM
3.3 CIRCUIT DESCRIPTION
3.4 SYSTEM OPERATION
3.5 COMPONENTS LIST
3.6 POWER SUPPLY UNIT
3.7 POWER SUPPLY CIRCUIT DESCRIPTION
3.7 DESCRIPTION OF MAJOR COMPONENTS USED
CHAPTER FOUR
4.0 RESULT ANALYSIS
4.1 CONSTRUCTION PROCEDURE AND TESTING
4.2 ASSEMBLING OF SECTIONS
4.3 CONSTRUCTION OF THE CASING
4.4 ECONOMIC OF THE PROJECT
4.5 PROJECT VIABILITY
4.6 PROJECT RELIABILITY
4.7 PROJECT MAINTAINABILITY
4.8 PROJECT EVALUATION
4.9 TESTING, TROUBLESHOOTING AND REMEDY
CHAPTER FIVE
- CONCLUSIONS
- RECOMMENDATION
5.3 REFERENCES
Appendix A: user’s guide
Appendix B: cost analysis
CHAPTER ONE
- INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
The general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity (according to Engert, Gerald J., 1964)[1].
Fingerprint Security Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their “Class Characteristics”.
Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags (Johnson, P. Lee 1973[3]).
RFID Readers, Road Barriers, RFID Smart Card, CCTV, Metal Detectors, LED Search Lights, Fire Alarm, Finger Print Movement Control, Physical Access Control, Optical Fingerprint Scanners, Optical Sensors, Card Locks Card Access Control Systems, Fingerprint Technology, Digital Fingerprint, USB Fingerprint Reader etc.
Fingerprint System Authentication is a simpler process. It involves affirming or rejecting a claimed identity by matching a live template with an existing one. Most of these identification/ authentications are done by using Smart Card. The large growth of ID – Card based Fingerprint system security is wildly used in Public service applications ( according to Fiebig, Tobias; Krissler, Jan; Hänsch, Ronny August 2014)[7]. These cards are used for multiple purpose applications such as Digital parking meters, telephone, vending machines, ATM Cards, Digital Fingerprint Security System Identity, Personal Identification Verification Number etc.
Another kind of Fingerprint System is the scanner using ultrasound. The process involves high frequency sound to identify a fingerprint. An advantage of ultrasound sensors is that they are not affected by external hindrances like dirt on a finger. Thermal Fingerprint Security System Scanners work by measuring temperature differences used for a variety of security and data-collection purposes, from identifying prisoners to allowing access to information or high-security areas (Ashbaugh, David R, 2003)[4].
1.2 OBJECTIVE OF THE PROJECT
The objective of this work is to construct a device that utilizes fingerprint recognition technology to allow access. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button.
1.3 SIGNIFICANCE OF THE PROJECT
- Fingerprint based security systemis most secured system as compared to other systems. Reason is that RFID card or Keys of lock can be stolen, password may be leaked. However thumbnail of every human being is unique, so lock will not open unless the same person is present to give the impression of fingerprint.
- No need to carry the keys to open the lock. Or even there is no need to remember the password or any Pin number.
- One of the main advantages is that this system remembers the stored password even if the power supply is turned off.
- Scientific research and studies have proved that fingerprints do not change as you grow up.
- Using Fingerprint saves time to gain access as compared to other methods like RFID card, Password or Key.
1.4 APPLICATIONS OF THE PROJECT
- Industrial application:“Fingerprint based security system” project can be used by the employees, staff or workers in various industries like Automobile industries, manufacturing industries, Software development companies.
- Home or domestic application: This project can be used to automate the door locking process at our home, so the user need not to carry the door lock keys along with him, he can just use his/her finger to open the door.
- Bank Lockers or security safes: Many of the banks use key based or password based locks for their lockers or safes. We can implement Fingerprint based bank locker system using this project.
1.5 SCOPE OF THE PROJECT
Personal Safes are revolutionary locking storage cases that open with just the touch of your finger. These products are designed as secure storage for medications, jewelry, weapons, documents, and other valuable or potentially harmful items. These utilize fingerprint recognition technology to allow access to only those whose fingerprints you choose. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked (Henry, Edward R., Sir (1900)[2].
1.6 PROBLEMS OF THE PROJECT
1) Using the fingerprint scanner does not take into consideration when a person physically changes.
A person’s finger changes sizes or form/pattern over time and the fingerprint scanner does not take this into consideration. When these changes occur, an individual can have difficulty identifying themselves and gaining access. The fingerprint scanner can have problems in capturing an accurate fingerprint image as well.
2) The cost of computer hardware and software programs can be expensive.
Certain speciality fingerprint scanners require computer hardware and software programs that
3) Using the fingerprint scanner can lead to false rejections.
This biometric device does not always read an individuals fingerprint accurately, and could therefore refuse access to an employee. In certain cases, an employee may have not placed their fingerprint in the right spot or placed the left finger instead of the right and visa versa. When this happens the fingerprint scanner falsely rejects the employees fingerprint (http://vzendran.blogspot.com.ng/2010/03/disadvantages-of-fingerprint-scanner.html)[8]
1.7 LIMITATIONS OF THE PROJECT
- There is a chance of misusing the technology by placing a fake finger print.
- Modules are sensitive and they need to be handled carefully.
1.8 DEFINITION OF TERMS
Algorithm A limited set of well-defined instructions to solve a task, which leads reliably from a given starting point to a corresponding identifiable end point. It can also be described as a systematic procedure for carrying out a calculation or solving a problem in a limited number of stages. Many algorithms can be implemented as computer programs. In biometric systems, specific algorithms are used, for example, to indicate how a smart card determines whether the input fingerprint matches the template stored on the card or in the database.
ANSI 378 Refers to interoperability standard for fingerprint templates developed by the American National Standards Institute (ANSI). The US governmental requires the use of ANSI 378 templates for Homeland Security Directive (HSPD-12) and Personal Identity Verification (PIV). The US Federal requirements for ANSI 378 are designed to ensure that all employees and contractors are able to use their badges for identification and access to all government facilities.
Automated Fingerprint Identification System (or AFIS) is a system to automatically match one or many unknown fingerprints against a database of known prints. This is done for miscellaneous reasons, not the least of which is because the person has committed a crime. With greater frequency in recent years, AFIS like systems have been used in civil identification projects. (Wikipedia.org)
Authentication Any systematic method of confirming the identity of an individual. Some methods are more secure than others. Simple authentication methods include user name and password, while more secure methods include token-based one-time passwords. The most secure authentication methods include layered or “multi-factor biometric procedures. This is independent of authorization.
Authorization The administration of person-specific rights, privileges, or access to data or corporate resources.
Bio metrics The automatic recognition of persons based on unique combinations of measurable physical or behavioral characteristics. Examples include fingerprints, iris scanning, face and voice recognition, or hand geometry. All of these bio metric techniques are differentiated by speed, durability, reliability, and cost effectiveness. Fingerprints are generally considered the most practical bio metric identifier in use today.
1.9 PROJECT WORK ORGANIZATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to this study. In this chapter, the background, significance, objective limitation and application of the study were discussed.
Chapter two is on literature review of the study. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
References
- Engert, Gerald J. (1964). “International Corner”. Identification News. 14 (1).
- Henry, Edward R., Sir (1900). “Classification and Uses of Finger Prints” (PDF). London: George Rutledge & Sons, Ltd.
- Conklin, Barbara Gardner, Robert Gardner, and Dennis Shortelle. Encyclopedia of Forensic Science: a Compendium of Detective Fact and Fiction. Westport, Conn.: Oryx, 2002. Print.
- Ashbaugh, David R. “Ridgeology” (PDF). Royal Canadian Mounted Police. Retrieved 2013-10-26.
- Zabell, Sandy. “Fingerprint Evidence” (PDF). Journal of Law and Policy.
- Johnson, P. Lee (1973). “Life of Latents”. Identification News. 23 (1).
- Fiebig, Tobias; Krissler, Jan; Hänsch, Ronny (August 2014). Security Impact of High Resolution Smartphone Cameras. Usenix Association. Retrieved 5 February 2015.
- http://vzendran.blogspot.com.ng/2010/03/disadvantages-of-fingerprint-scanner.html