Hearty Welcome!
Introduction• Access control system protects and preserve Enterprise   resources with the help of Computerized control• On...
Biometrics Technologies
Biometrics
Biometrics A Definition• Biometrics is a branch of computer Security centering  on Authenticating a person’s Identity base...
Stages of Operation• Enrollment  Biometric Data is collected for a known Identity  Reference template is created and sto...
Stages of Operation
A Better Approach to Security…Biometrics is seen as more secure than traditionalmethods:  • Passwords  • Tokens  “ Securit...
Types of Biometric Authentication•Fingerprints•Retina / Iris Scans•Facial Recognition•Hand Recognition•DNA Matching
Finger Print• Ridges vs. Valleys• Scanning Mechanisms    Optical Scanner    Capacitance Scanner                   Ridge ...
Retina Scans• Small Surface• Detailed Scan• Uses Blood Vessels Pattern for Authentication• Slow Scan and Compare Procedure...
Iris Scans• More than 250 unique spots• Compares Trabecular Meshwork (Area of Tissues  in the Eyes) of the Iris• Fast and ...
Facial Recognition• Uses a video Image to look at distances between  Features and overall Structure• Requires a human Face
Hand Recognition• Hand Geometry, not as Unique as Fingerprints• Uses hand features and Measurements increases  Uniqueness•...
DNA Matching• Comparison of a sample of a user’s DNA with a  Stored Sample of the real Person’s DNA• DNA is Readily availa...
Basics of Finger Print     Technology
Finger Print• A Fingerprint pattern is comprised of a sequence  of Ridges and ValleysThe dark lines In a Fingerprint Imag...
Finger Print Readers• Optical Scanner• Capacitive Scanner
Finger Print Optical ScannerOptical sensor• The Optical Sensor is based on light Sensing method• The CCD (Charge Couple De...
Finger Print Capacitive ScannerCapacitive sensor• In this method, the Finger skin is act as a plate of the Capacitor• Meas...
Basics of RFID Technology
Radio Frequency Identification• A System that transmits the Identity (in the form of a  unique serial number) of an object...
Radio Frequency Identification• The Reader sends out a radio signals, and the Card  respond with a signal to Identify itse...
Component of RFID System• RF tags ( Cards) Contain Chip and Antenna• Readers (Interrogators) Contain RF Module (Transmit...
Component of RFID System                           AntennaCard/Tag                                            Reader      ...
Component of RFID SystemRFID CardsA Card is a Transponder which Receives a Radiosignal and in response to it sends out a r...
Component of RFID SystemRFID Card(tags)•Tags can be attached to almost anything:    – Items, cases or luggages of products...
RFID Card ConstructionRFID Cards Construction                                        A paper label                        ...
RFID Tag Memory• Read-only tags  – Tag ID is assigned at the factory during manufacturing     • Can never be changed     •...
RFID Readers• Reader functions:   – Remotely power tags   – Establish a bidirectional Data link   – Inventory tags, filter...
How RFID Works?          1              2
Operational frequenciesFrequency         LF               HF            UHF             MicrowaveRange             125 KHz...
RFID applications• Manufacturing and Processing• Supply Chain Management• Retail• Security• Location Tracking• Traffic mov...
Upcoming SlideShare
Loading in …5
×

Biometrics Technology1

773 views

Published on

Gateway Business Solutions, A Solution provider in Telecom, Access Control, Time Attendance, Digital Security and Surviellance and Office automation. Pioneers in VOIP solutions like IP PBX, CALL CENTRE SOLUTIONS etc.
Description
Gateway Business Solution is a Distributor to M/S Matrix Comsec Pvt Ltd, for their Range of Telecom and Security Products and solutions. MATRIX Analog, Digital and IP Pbx solutions and Security products such as Door Access and Time Attendance Products (Proximity and Biometric)

Gateway is also Channel Partner for M/s Intellicon Pvt Ltd for their range of Telecom Products. Transtel, Karel, NEC IP EPABX systems and Radvision and Lifesize Video Conferencing Solutions.


Gateway is also a pioneer in offering VOIP solutions ranging from Soft IP PBX, Call Centre Solutions, Automatic Voice Campaigner etc.

Contact :

Gateway Business Solutions
2nd Flr, Sai Krupa, 33 Durga Nagar Colony
Punjagutta
Hyderabad 500 082
Ph: 93978 20222

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
773
On SlideShare
0
From Embeds
0
Number of Embeds
11
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Biometrics Technology1

  1. 1. Hearty Welcome!
  2. 2. Introduction• Access control system protects and preserve Enterprise resources with the help of Computerized control• Only authorized person is allowed to grant access to the system and denied all• For Person authorization it first verifies the persons Identity• Person Identity can be based on person Physiological or behavioral characteristics unique to that person• The system based on person’s Physiological or behavioral characteristics for allowing or denying access to the system is known as Biometrics
  3. 3. Biometrics Technologies
  4. 4. Biometrics
  5. 5. Biometrics A Definition• Biometrics is a branch of computer Security centering on Authenticating a person’s Identity based on some Physiological or Behavioral Characteristic Unique to that person• Authentication System verifies the Identity of a User before allowing them access to the Internal System
  6. 6. Stages of Operation• Enrollment Biometric Data is collected for a known Identity Reference template is created and stored• Authentication  Verification: Work with Id + Biometrics Fast Processing Involving only one Matching Direct go to ID and Matches the Finger Print Template  Identification: Work with Biometrics and searches the Entire Database Processing Time depends upon the number of Finger Print Template
  7. 7. Stages of Operation
  8. 8. A Better Approach to Security…Biometrics is seen as more secure than traditionalmethods: • Passwords • Tokens “ Security Passwords and Tokens are used to Prove ones Identity Electronically ”
  9. 9. Types of Biometric Authentication•Fingerprints•Retina / Iris Scans•Facial Recognition•Hand Recognition•DNA Matching
  10. 10. Finger Print• Ridges vs. Valleys• Scanning Mechanisms  Optical Scanner  Capacitance Scanner Ridge Valley
  11. 11. Retina Scans• Small Surface• Detailed Scan• Uses Blood Vessels Pattern for Authentication• Slow Scan and Compare Procedure• Long Exposure to Scanner Light Emitted
  12. 12. Iris Scans• More than 250 unique spots• Compares Trabecular Meshwork (Area of Tissues in the Eyes) of the Iris• Fast and distance Scans• Requires a human Eye
  13. 13. Facial Recognition• Uses a video Image to look at distances between Features and overall Structure• Requires a human Face
  14. 14. Hand Recognition• Hand Geometry, not as Unique as Fingerprints• Uses hand features and Measurements increases Uniqueness• Measures up to 90 different points on the hand including Characteristics of the Finger and features on the skin
  15. 15. DNA Matching• Comparison of a sample of a user’s DNA with a Stored Sample of the real Person’s DNA• DNA is Readily available to collect• Comparison process is slow and not completely Automated
  16. 16. Basics of Finger Print Technology
  17. 17. Finger Print• A Fingerprint pattern is comprised of a sequence of Ridges and ValleysThe dark lines In a Fingerprint Image is called RidgesThe Valleys are the areas between the Ridges• The Finger Image is used to Authenticate person Identity Ridge Valley
  18. 18. Finger Print Readers• Optical Scanner• Capacitive Scanner
  19. 19. Finger Print Optical ScannerOptical sensor• The Optical Sensor is based on light Sensing method• The CCD (Charge Couple Device) is used as light Sensing device• The CCD Generate Inverted Image of the Finger• Darker Areas represent more Reflected Light and Lighter Areas represent less Reflected Light• According to the Light intensity, CCD generates an Analog signal
  20. 20. Finger Print Capacitive ScannerCapacitive sensor• In this method, the Finger skin is act as a plate of the Capacitor• Measurement of the capacitance between the skin and the Sensor plates(Pixel)• Where there is a Ridge or a Valley, the distance varies, as does the Capacitance• Sensor Read the Capacitive value from conductive plates & send it to Integrator circuit for Analog to Digital converter to create Digital Image for the Finger
  21. 21. Basics of RFID Technology
  22. 22. Radio Frequency Identification• A System that transmits the Identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves• Uses Tags (Cards), Readers, and Software to exchange Data over Electro-Magnetic waves in RF communication• The Card uniquely Identifies the item it is attached to
  23. 23. Radio Frequency Identification• The Reader sends out a radio signals, and the Card respond with a signal to Identify itself• The Reader converts the radio waves returned form the Tag into Data• The Data is send to Information processing system ( Host or Processing computer) for identification processing ( Filter, categorized and Analyze)• System Grant or denied access to user based on the Information received
  24. 24. Component of RFID System• RF tags ( Cards) Contain Chip and Antenna• Readers (Interrogators) Contain RF Module (Transmitter and Receiver), Control Unit, Antenna and Several Interfaces (RS 232, RS 485, Ethernet etc.)• Host Computers Contains Application software, Database and Monitoring software Application, Database and Tag Reader Monitoring Software
  25. 25. Component of RFID System AntennaCard/Tag Reader Firmware COMMANDS Controller Antenna RESPONSES Interface Host Power Application ,Controlling And Monitoring Software Interface
  26. 26. Component of RFID SystemRFID CardsA Card is a Transponder which Receives a Radiosignal and in response to it sends out a radio signals  Card contains an Antenna, and small Chip for storing small amount of Data  Card can be Program at Manufacturer or on Installation  Card can be battery feed or powered by the high power EM field generated by the Reader Antenna  Field allows the Card Chip/Antenna to send the Signal containing the Data
  27. 27. Component of RFID SystemRFID Card(tags)•Tags can be attached to almost anything: – Items, cases or luggages of products, high value goods – vehicles, assets, personnel•Passive Tags( Proximity card) – Do not require power – Draws power from Interrogator Field – Lower storage capacities (few bits to 1 KB) – Shorter read ranges (4 inches to 15 feet) – Usually Write-Once-Read-Many/Read-Only tags – Cost around 25 cents to few dollars•Active Tags( Smart Card) – Battery powered – Higher storage capacities (512 KB) – Longer read range (300 feet) – Typically can be re-written by RF Interrogators – Cost around 50 to 250 dollars
  28. 28. RFID Card ConstructionRFID Cards Construction A paper label with RFID inside an antenna, printed, etched or stamped ... … and a chip … on a substrate attached to it e.g. a plastic foil ...
  29. 29. RFID Tag Memory• Read-only tags – Tag ID is assigned at the factory during manufacturing • Can never be changed • No additional Data can be assigned to the tag• Write once, read many (WORM) tags – Data written once, e.g., during packing or manufacturing • Tag is locked once Data is written • Similar to a compact disc or DVD• Read/Write – Tag Data can be changed over time • Part or all of the Data section can be locked
  30. 30. RFID Readers• Reader functions: – Remotely power tags – Establish a bidirectional Data link – Inventory tags, filter results – Communicate with networked server• Readers (Interrogators) can be at a fixed point such as – Entrance/exit – Point of sale• Readers can also be mobile/hand-held
  31. 31. How RFID Works? 1 2
  32. 32. Operational frequenciesFrequency LF HF UHF MicrowaveRange 125 KHz 13.56 MHz 868-915 MHz 2.45GHz and 5.8 GHzRead Range Shorter( 2.54cm-3 Short(5.08cm”- Medium(0.35m- Longest(0.35m- 0.48cm”) 60.96cm”) 3.48m’) 4.57m)Tag Power Passive Tag Passive Tag Active Tag Active TagSourceData Rate Slower Moderate Fast FasterAbility to read Better Moderate Poor Worsenear metal orwet surfaces
  33. 33. RFID applications• Manufacturing and Processing• Supply Chain Management• Retail• Security• Location Tracking• Traffic movement Control

×