Access Control Using Fingerprint Authentication Processor and RFID
نویسنده
چکیده
A typical access control system uses two components. First component is a fingerprint reader that is connected to a database to match the pre stored fingerprints with the one obtained by the reader. The second component is an RFID card that transmits information about the person that requests an access. In this paper, a compact system that consists of a CMOS fingerprint sensor (FPC1011F1) is used with the FPC2020 power efficient fingerprint processor ; which acts as a biometric sub-system with a direct interface to the sensor as well as to an external flash memory for storing finger print templates. The small size and low power consumption enables this integrated device to fit in smaller portable and battery powered devices utilizing high performance identification speed. An RFID circuit is integrated with the sensor and fingerprint processor to create an electronic identification card (e-ID card). The e-ID card will pre-store the fingerprint of the authorized user. The RFID circuit is enabled to transmit data and allow access to the user, when the card is used and the fingerprint authentication is successful. Key-Words: Access control, RFID, Fingerprint processor, Fingerprint authentication, Biometrics.
منابع مشابه
Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملRecent Advancements in Biometrics: Vein and Fingerprint Authentication
Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas—or to enable them to use personal digital devices such as, computer, personal digital assistant (PDA), or mobile phone. Virtually all biometric methods are implemented using the follo...
متن کاملVein and Fingerprint Biometrics Authentication- Future Trends
Biometric signatures, or biometrics, are used to identify individuals by measuring certain unique physical and behavioral characteristics. Individuals must be identified to allow or prohibit access to secure areas—or to enable them to use personal digital devices such as, computer, personal digital assistant (PDA), or mobile phone. Virtually all biometric methods are implemented using the follo...
متن کاملMulti-domain Rfid Access Control Using Asymmetric Key Based Tag-reader Mutual Authentication
Multi-domain RFID applications, such as asset tracking across domains, shift the paradigm in business model and enable next-generation business processes for aviation industry. The increasing number of RFID applications also merits the consolidation of RFID tags so they can serve multiple purposes. However, the adoption of such multi-domain RFID applications depends on their ability to enforce ...
متن کاملEnhancing privacy of recent authentication schemes for low-cost RFID systems
Nowadays Radio Frequency Identification (RFID) systems have appeared in lots of identification and authentication applications. In some sensitive applications, providing secure and confidential communication is very important for end-users. To this aim, different RFID authentication protocols have been proposed, which have tried to provide security and privacy of RFID users. In this paper, we a...
متن کامل