SlideShare a Scribd company logo
Hearty Welcome!
Topics to be Covered
• An Overview of the Technology

• COSEC Introduction :
    Architecture of the System
    Product Variants
    Specifications

• Hardware Features

• COSEC Configuration :
    Software Installation
    Software Configuration
Introduction
• Access control system protects and preserve Enterprise
   resources with the help of Computerized control
• Only authorized person is allowed to grant access to the
  system and denied all
• For Person authorization it first verifies the persons Identity
• Person Identity can be based on person Physiological or
   behavioral characteristics unique to that person
• The system based on person’s Physiological or behavioral
   characteristics for allowing or denying access to the system is
   known as Biometrics
Biometrics
What is Biometrics?
• Biometrics is a branch of computer Security
centering on Authenticating a person’s Identity based
on some Physiological or Behavioral Characteristic
Unique to that person before allowing them access to
the Internal System

• Authentication System verifies the Identity of a User
Stages of Operation
• Enrollment
  Biometric Data is collected for a known Identity
  Reference template is created and stored
• Authentication
    Verification:
     Work with Id + Biometrics
     Fast Processing Involving only one Matching
     Direct go to ID and Matches the Finger Print Template

   Identification:
     Work with Biometrics and searches the Entire Database
     Processing Time depends upon the number of Finger Print Template
Stages of Operation
A Better Approach to Security…
Biometrics is seen as more secure than traditional
methods:
  • Passwords
  • Tokens

  “ Security Passwords and Tokens are used to
       Prove one's Identity Electronically ”
Types of Biometric Authentication
•Fingerprints
•Retina / Iris Scans
•Facial Recognition
•Hand Recognition
•DNA Matching
Basics of Finger Print
     Technology
Finger Print
• A Fingerprint pattern is comprised of a sequence
  of Ridges and Valleys
The dark line In a Fingerprint Image is called a
  Ridge(absorbs/randomly scatter the optical signal)
The Valleys(protruded portion) are the areas between
  the Ridges(reflects the optical signal)


                       Ridge


                       Valley
Finger Scanner - Block Diagram

 Sensor reads the pattern on the
finger surface
 Analog to Digital converter
converts the analog reading into
the digital format
 Interface module is responsible
for communicating with the
external devices
Biometric Performance Standards
• FRR(False Rejection Rate): probability of a
  registered user being wrongly rejected by the
  biometric system.
• FAR(False Acceptance Rate):the probability of
  an intruder being wrongly authorised by the
  biometric system.
• EER (Equal Error Rate or crossover rate):
  reflects the probability of the FAR and the
  FRR being (nearly) the same.
Scanning Technologies

• Optical Scanner (Used in COSEC)

• Solid State Scanner -
   o Capacitive (Used in COSEC)
   o Thermal
   o Electric field
   o Piezoelectric

• Ultrasound scanner
Finger Print- Optical Scanner
Optical sensing Principle:

• The ridges absorb the light ,so they appear dark and
valleys reflect the light so ,they appear bright.

• The CCD Generate Inverted Image of the Finger
• According to the Light intensity, CCD generates an
 Analog signal
Finger Print –Capacitive Scanner
• Composed of 2D array of microcapacitor plates
  embedded in a Silicon chip.
• Other plate of each microcapacitor is the finger skin
  itself.
• Electrical charges are created between the finger
  surface and the Silicon plates.
• The distance variation of ridges and valleys with
  respect to plates leads to a pattern of distinguished
  capacitances.
Technical Evaluation Parameters-Scanner

• Resolution : denotes the number of dots/pixels
  per inch . Higher the resolution , finer the
  details extracted from the image.
   standard one is 500 dpi.
• Size of Sensing Area: determines size of
  fingerprint portion acquired by the scanner;
  range is 1x1 -0.38x0.38 sq. inches;
   {size of an average fingerprint is 0.5x0.7 sq.
  inches}
Optical Vs. Capacitive(solid state)

• Accuracy is less for solid state sensors due to limitation in
  sensing area
• Due to direct contact of solid state surface with finger ; its
  more prone to mechanical damages / electrostatic charges.
• Adjustment in electrical parameters , will be reliable for the
  non ideal skin conditions , so solid state scan is better
• Moreover, solid state scanner needs a three dimensional
  surface and so cannot be deceived by a photograph/printed
  image
COSEC -Scanner Specifications
• Capacitive Scanner:
   Sensing area: 12.8x18.0mm(0.5x0.7 sq. inches)
   Resolution :508 dpi
   Enrollment & Verification time < 1 sec.
   EER < 0.1%
   FAR <0.001%
   FRR <0.01%
• Optical Scanner:
  Sensing Area: 15.9x 17.9 mm(0.62x0.7 sq. inches)
  Resolution: 500 dpi
  Enrollment & Verification time: 800 mS.
Basics of RFID Technology
Radio Frequency Identification
• The Reader sends out a radio signals, and the Card
  respond with a signal to Identify itself
• The Reader converts the radio waves returned form
  the Tag into Data

• The Data is send to Information processing system
  ( Host or Processing computer) for identification
  processing ( Filter, categorized and Analyze)

• System Grant or deny access to user based on the
  Information received
Component of RFID System
                            Antenna
Card/Tag
                                              Reader

                                               Firmware
                         COMMANDS
  Controller
   Antenna               RESPONSES
                                                       Interface




                     Host
                                                       Power

               Application ,Controlling
               And Monitoring Software
                                  Interface
Components of RFID System

• A Tag(transponder)-composed of a semi conductor
  chip , an antenna and battery(optional)
• An Interrogator: reader or read/write device
  composed of an antenna, an RF electronic module
  and a control electronics module
• Controller/host : PC/workstation running database
  and control (middleware)
Component of RFID System
• 3 Components
  Transceiver – Tag/Card Reader
  Transponder – RFID Tag/Card
                                  IC or microprocessor
  Antenna


    Transceiver
                                   RFID
    Tag Reader
                                    Tag
                   Antenna




                                   antenna
Range Support
• Proximity card(125 KHz) read range:
      5-12 cm(2”-5”)
     Typical read range- 8cm(3”)

• Smart cards(13.56 MHz) read /write range:
    Maximum range - 9.5 cm.

 COSEC supports both the above frequency
 ranges.
Types of Tags
• Passive Tags
   – No battery
   – Low cost
• Active Tags
   – On-board transceiver
   – Battery – must be replaced
   – Longer range
   – High cost
RFID Card Construction
RFID Cards Construction
                                        A paper label
                                       with RFID inside




                                         an antenna,
                                       printed, etched
                                        or stamped ...


      … and a chip        … on a substrate
      attached to it       e.g. a plastic
                              foil ...
How RFID Works?
          1




              2
RFID applications
• Manufacturing and Processing
• Supply Chain Management
• Retail
• Security
• Location Tracking
• Traffic movement Control
THANK YOU
        MATRIX COMSEC PVT. LTD.
         394 -G.I.D.C, MAKARPURA
        VADODARA – 390 010 (INDIA)

Phone : +91 265 2630555 Fax : +91 265 2636598
     E-mail : support@matrixcomsec.com
        URL     : www.matrixcomsec.com

More Related Content

What's hot

Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
Schneider Electric
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
Sam Bowne
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
Satish Chavan
 
Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
Saurabh Kulkarni
 
ReqView / Volere Requirements Specification Template
ReqView / Volere Requirements Specification TemplateReqView / Volere Requirements Specification Template
ReqView / Volere Requirements Specification Template
Eccam
 
Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)
MD. IFTEKARUL ALAM
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
jpubal
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IBM Sverige
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
WSO2
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
NCS Computech Ltd.
 
Sharing and setting in salesforce
Sharing and setting in salesforceSharing and setting in salesforce
Sharing and setting in salesforce
Vishesh Singhal
 
Beyond Pass Words
Beyond Pass WordsBeyond Pass Words
Beyond Pass Words
FIDO Alliance
 
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Cloud Computing Wire
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
Happiest Minds Technologies
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
Josep Bardallo
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
Karthikeyan Dhayalan
 
Risk Management for CAPA Decision 1
Risk Management for CAPA Decision 1Risk Management for CAPA Decision 1
Risk Management for CAPA Decision 1
Tarek Elneil
 
3-CMMI Continuous And Staged
3-CMMI Continuous And Staged3-CMMI Continuous And Staged
3-CMMI Continuous And Staged
Chris Lazaris
 
Enterprise system implementation strategies and phases
Enterprise system implementation strategies and phasesEnterprise system implementation strategies and phases
Enterprise system implementation strategies and phases
John Cachat
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 

What's hot (20)

Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...Industrial Control System Cyber Security and the Employment of Industrial Fir...
Industrial Control System Cyber Security and the Employment of Industrial Fir...
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
Sharing and security in Salesforce
Sharing and security in SalesforceSharing and security in Salesforce
Sharing and security in Salesforce
 
ReqView / Volere Requirements Specification Template
ReqView / Volere Requirements Specification TemplateReqView / Volere Requirements Specification Template
ReqView / Volere Requirements Specification Template
 
Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)Data Center Infrastructure Management(DCIM)
Data Center Infrastructure Management(DCIM)
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Enterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use CasesEnterprise Identity and Access Management Use Cases
Enterprise Identity and Access Management Use Cases
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Sharing and setting in salesforce
Sharing and setting in salesforceSharing and setting in salesforce
Sharing and setting in salesforce
 
Beyond Pass Words
Beyond Pass WordsBeyond Pass Words
Beyond Pass Words
 
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
Data Center Tiers : Tier 1, Tier 2, Tier 3 and Tier 4 data center tiers expla...
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Risk Management for CAPA Decision 1
Risk Management for CAPA Decision 1Risk Management for CAPA Decision 1
Risk Management for CAPA Decision 1
 
3-CMMI Continuous And Staged
3-CMMI Continuous And Staged3-CMMI Continuous And Staged
3-CMMI Continuous And Staged
 
Enterprise system implementation strategies and phases
Enterprise system implementation strategies and phasesEnterprise system implementation strategies and phases
Enterprise system implementation strategies and phases
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 

Similar to MATRIX Biometrics Technology New

Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
Gateway Business Solutions
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
12207284‐pss7
12207284‐pss712207284‐pss7
12207284‐pss7
kamiyung
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
Mouhanad Alkhaldi
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
rajeshplacherikunnel
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
Venkat Alagarsamy
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
ILA SHARMA
 
Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
Anant Patel
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
tigertsang
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
kayi0920
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
kayi0920
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss6
15251810
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
sweta dargad
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
blkirkwood
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
Arunkumar Kubasad
 
Automatic Data Capture.pptx
Automatic Data Capture.pptxAutomatic Data Capture.pptx
Automatic Data Capture.pptx
HarikrishnanLakshmin1
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ans
Tung Ko
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Chi Chung Chan
 

Similar to MATRIX Biometrics Technology New (20)

Biometrics Technology1
Biometrics Technology1Biometrics Technology1
Biometrics Technology1
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
12207284‐pss7
12207284‐pss712207284‐pss7
12207284‐pss7
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Smart cards & RFID-Anant Patel
Smart cards & RFID-Anant PatelSmart cards & RFID-Anant Patel
Smart cards & RFID-Anant Patel
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss6
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
Automatic Data Capture.pptx
Automatic Data Capture.pptxAutomatic Data Capture.pptx
Automatic Data Capture.pptx
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

More from Gateway Business Solutions

Cosec reports
Cosec reportsCosec reports
Matrix cosec presentation
Matrix cosec presentationMatrix cosec presentation
Matrix cosec presentation
Gateway Business Solutions
 
Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1
Gateway Business Solutions
 
Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1
Gateway Business Solutions
 
Matrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x seriesMatrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x series
Gateway Business Solutions
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
Gateway Business Solutions
 
Matrix setu ata vs linksys spa3102
Matrix  setu ata vs linksys spa3102Matrix  setu ata vs linksys spa3102
Matrix setu ata vs linksys spa3102
Gateway Business Solutions
 
Matrix setu ata vs_linksys_pap2_t
Matrix  setu ata vs_linksys_pap2_tMatrix  setu ata vs_linksys_pap2_t
Matrix setu ata vs_linksys_pap2_t
Gateway Business Solutions
 
Matrix setu ata brochure
Matrix setu ata brochureMatrix setu ata brochure
Matrix setu ata brochure
Gateway Business Solutions
 
Matrix pbx products catalogue
Matrix pbx products catalogueMatrix pbx products catalogue
Matrix pbx products catalogue
Gateway Business Solutions
 
Matrix gateway products catalogue
Matrix gateway products catalogueMatrix gateway products catalogue
Matrix gateway products catalogue
Gateway Business Solutions
 
Why Matrix
Why MatrixWhy Matrix
Matrix Cosec Presentation
Matrix Cosec PresentationMatrix Cosec Presentation
Matrix Cosec Presentation
Gateway Business Solutions
 
Matrix Cosec Brochure
Matrix Cosec BrochureMatrix Cosec Brochure
Matrix Cosec Brochure
Gateway Business Solutions
 
Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1
Gateway Business Solutions
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
Gateway Business Solutions
 
MATRIX Cosec Introduction New
MATRIX Cosec Introduction NewMATRIX Cosec Introduction New
MATRIX Cosec Introduction New
Gateway Business Solutions
 
MATRIX License Comparison
MATRIX License ComparisonMATRIX License Comparison
MATRIX License Comparison
Gateway Business Solutions
 

More from Gateway Business Solutions (19)

Cosec reports
Cosec reportsCosec reports
Cosec reports
 
Matrix cosec presentation
Matrix cosec presentationMatrix cosec presentation
Matrix cosec presentation
 
Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1
 
Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1
 
Matrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x seriesMatrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x series
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
 
Matrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificateMatrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificate
 
Matrix setu ata vs linksys spa3102
Matrix  setu ata vs linksys spa3102Matrix  setu ata vs linksys spa3102
Matrix setu ata vs linksys spa3102
 
Matrix setu ata vs_linksys_pap2_t
Matrix  setu ata vs_linksys_pap2_tMatrix  setu ata vs_linksys_pap2_t
Matrix setu ata vs_linksys_pap2_t
 
Matrix setu ata brochure
Matrix setu ata brochureMatrix setu ata brochure
Matrix setu ata brochure
 
Matrix pbx products catalogue
Matrix pbx products catalogueMatrix pbx products catalogue
Matrix pbx products catalogue
 
Matrix gateway products catalogue
Matrix gateway products catalogueMatrix gateway products catalogue
Matrix gateway products catalogue
 
Why Matrix
Why MatrixWhy Matrix
Why Matrix
 
Matrix Cosec Presentation
Matrix Cosec PresentationMatrix Cosec Presentation
Matrix Cosec Presentation
 
Matrix Cosec Brochure
Matrix Cosec BrochureMatrix Cosec Brochure
Matrix Cosec Brochure
 
Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
 
MATRIX Cosec Introduction New
MATRIX Cosec Introduction NewMATRIX Cosec Introduction New
MATRIX Cosec Introduction New
 
MATRIX License Comparison
MATRIX License ComparisonMATRIX License Comparison
MATRIX License Comparison
 

MATRIX Biometrics Technology New

  • 2. Topics to be Covered • An Overview of the Technology • COSEC Introduction :  Architecture of the System  Product Variants  Specifications • Hardware Features • COSEC Configuration :  Software Installation  Software Configuration
  • 3. Introduction • Access control system protects and preserve Enterprise resources with the help of Computerized control • Only authorized person is allowed to grant access to the system and denied all • For Person authorization it first verifies the persons Identity • Person Identity can be based on person Physiological or behavioral characteristics unique to that person • The system based on person’s Physiological or behavioral characteristics for allowing or denying access to the system is known as Biometrics
  • 5. What is Biometrics? • Biometrics is a branch of computer Security centering on Authenticating a person’s Identity based on some Physiological or Behavioral Characteristic Unique to that person before allowing them access to the Internal System • Authentication System verifies the Identity of a User
  • 6. Stages of Operation • Enrollment Biometric Data is collected for a known Identity Reference template is created and stored • Authentication  Verification: Work with Id + Biometrics Fast Processing Involving only one Matching Direct go to ID and Matches the Finger Print Template  Identification: Work with Biometrics and searches the Entire Database Processing Time depends upon the number of Finger Print Template
  • 8. A Better Approach to Security… Biometrics is seen as more secure than traditional methods: • Passwords • Tokens “ Security Passwords and Tokens are used to Prove one's Identity Electronically ”
  • 9. Types of Biometric Authentication •Fingerprints •Retina / Iris Scans •Facial Recognition •Hand Recognition •DNA Matching
  • 10. Basics of Finger Print Technology
  • 11. Finger Print • A Fingerprint pattern is comprised of a sequence of Ridges and Valleys The dark line In a Fingerprint Image is called a Ridge(absorbs/randomly scatter the optical signal) The Valleys(protruded portion) are the areas between the Ridges(reflects the optical signal) Ridge Valley
  • 12. Finger Scanner - Block Diagram  Sensor reads the pattern on the finger surface  Analog to Digital converter converts the analog reading into the digital format  Interface module is responsible for communicating with the external devices
  • 13. Biometric Performance Standards • FRR(False Rejection Rate): probability of a registered user being wrongly rejected by the biometric system. • FAR(False Acceptance Rate):the probability of an intruder being wrongly authorised by the biometric system. • EER (Equal Error Rate or crossover rate): reflects the probability of the FAR and the FRR being (nearly) the same.
  • 14. Scanning Technologies • Optical Scanner (Used in COSEC) • Solid State Scanner - o Capacitive (Used in COSEC) o Thermal o Electric field o Piezoelectric • Ultrasound scanner
  • 15. Finger Print- Optical Scanner Optical sensing Principle: • The ridges absorb the light ,so they appear dark and valleys reflect the light so ,they appear bright. • The CCD Generate Inverted Image of the Finger • According to the Light intensity, CCD generates an Analog signal
  • 16. Finger Print –Capacitive Scanner • Composed of 2D array of microcapacitor plates embedded in a Silicon chip. • Other plate of each microcapacitor is the finger skin itself. • Electrical charges are created between the finger surface and the Silicon plates. • The distance variation of ridges and valleys with respect to plates leads to a pattern of distinguished capacitances.
  • 17. Technical Evaluation Parameters-Scanner • Resolution : denotes the number of dots/pixels per inch . Higher the resolution , finer the details extracted from the image. standard one is 500 dpi. • Size of Sensing Area: determines size of fingerprint portion acquired by the scanner; range is 1x1 -0.38x0.38 sq. inches; {size of an average fingerprint is 0.5x0.7 sq. inches}
  • 18. Optical Vs. Capacitive(solid state) • Accuracy is less for solid state sensors due to limitation in sensing area • Due to direct contact of solid state surface with finger ; its more prone to mechanical damages / electrostatic charges. • Adjustment in electrical parameters , will be reliable for the non ideal skin conditions , so solid state scan is better • Moreover, solid state scanner needs a three dimensional surface and so cannot be deceived by a photograph/printed image
  • 19. COSEC -Scanner Specifications • Capacitive Scanner: Sensing area: 12.8x18.0mm(0.5x0.7 sq. inches) Resolution :508 dpi Enrollment & Verification time < 1 sec. EER < 0.1% FAR <0.001% FRR <0.01% • Optical Scanner: Sensing Area: 15.9x 17.9 mm(0.62x0.7 sq. inches) Resolution: 500 dpi Enrollment & Verification time: 800 mS.
  • 20. Basics of RFID Technology
  • 21. Radio Frequency Identification • The Reader sends out a radio signals, and the Card respond with a signal to Identify itself • The Reader converts the radio waves returned form the Tag into Data • The Data is send to Information processing system ( Host or Processing computer) for identification processing ( Filter, categorized and Analyze) • System Grant or deny access to user based on the Information received
  • 22. Component of RFID System Antenna Card/Tag Reader Firmware COMMANDS Controller Antenna RESPONSES Interface Host Power Application ,Controlling And Monitoring Software Interface
  • 23. Components of RFID System • A Tag(transponder)-composed of a semi conductor chip , an antenna and battery(optional) • An Interrogator: reader or read/write device composed of an antenna, an RF electronic module and a control electronics module • Controller/host : PC/workstation running database and control (middleware)
  • 24. Component of RFID System • 3 Components Transceiver – Tag/Card Reader Transponder – RFID Tag/Card IC or microprocessor Antenna Transceiver RFID Tag Reader Tag Antenna antenna
  • 25. Range Support • Proximity card(125 KHz) read range: 5-12 cm(2”-5”) Typical read range- 8cm(3”) • Smart cards(13.56 MHz) read /write range: Maximum range - 9.5 cm. COSEC supports both the above frequency ranges.
  • 26. Types of Tags • Passive Tags – No battery – Low cost • Active Tags – On-board transceiver – Battery – must be replaced – Longer range – High cost
  • 27. RFID Card Construction RFID Cards Construction A paper label with RFID inside an antenna, printed, etched or stamped ... … and a chip … on a substrate attached to it e.g. a plastic foil ...
  • 29. RFID applications • Manufacturing and Processing • Supply Chain Management • Retail • Security • Location Tracking • Traffic movement Control
  • 30. THANK YOU MATRIX COMSEC PVT. LTD. 394 -G.I.D.C, MAKARPURA VADODARA – 390 010 (INDIA) Phone : +91 265 2630555 Fax : +91 265 2636598 E-mail : support@matrixcomsec.com URL : www.matrixcomsec.com