SlideShare a Scribd company logo
KENYATTA UNIVERSITY
SCHOOL OF ENGINEERING AND TECHNOLOGY
ELECTRICAL AND ELECTRONICS DEPARTMENT
PROJECT TITLE: ACCESS CONTROL AND AUTHENTICATION USING RFID AND
FINGERPRINT
NAME: SIMON CHEGE
REG. NO.: J174/1706/2011
SUPERVISOR: A. MBUGUA
• System components: microcontroller, RFID reader, Fingerprint scanner
and LCD.
• Application: Industries, Companies and Offices
• Features measured: face, fingerprints, hand geometry, handwriting,
iris, retinal, vein, and voice.
• Algorithm cannot be reconverted to an image, so no one can’t
duplicate your fingerprints.
INTRODUCTION & BACKGROUND OVERVIEW
PROBLEM STATEMENT & JUSTIFICATION
• Security is a matter of concern to every company or public sector
• Check:
What you have
What you know
Who you are
• unique, physical attribute
harder to fake.
You can't guess.
You can't misplace.
You can't forget.
OBJECTIVES
• Main objective: Combine the “what you have” and “who you are”
concept.
• The specific objectives include:
User friendly system
Authenticate and validate access
LITERATURE REVIEW
• [3] presents a radio-frequency identification (RFID)-enabled
traceability system for the management of consignment and high
value products requiring item level traceability in a hospital
environment.
• An Ambient Intelligence platform, NIGHT Care, for remote monitoring
and control of overnight living environment is proposed by Cecilia in
their paper [4]
METHODOLOGY
• BLOCK DIAGRAM
GSM MODEM
FINGERPRINT SCANNER
RFID READER
POWER SUPPLY
DC MOTORDRIVER AND RELAY UNIT
LCD DISPLAYMICRO CONTROLLER
IMPLEMENTATION AND OBSERVATION
• INVALD TAG
IMPLEMENTATION AND OBSERVATION
• VALD TAG
RESULTS ANALYSIS
• Invalid tags: Message display, Tag number, door closed, initialize
system.
• Valid tags: message display, Tag number, Owner, Door open, warning
timeout, door close
• Idle: door closed
CONCLUSION AND RECOMMENDATION
• CONCLUSION
The system can be used in wide applications for verification, validation
and authentication of use of different facilities.
• RECOMMENDATION
The system can be improved if higher level of security is required by
using GSM for monitoring.
The Fingerprint part can be implemented later when the right
hardware is available.
END

More Related Content

What's hot

IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET Journal
 
GAJJAR DHARMESH1
GAJJAR DHARMESH1GAJJAR DHARMESH1
GAJJAR DHARMESH1
Dharmesh Gajjar
 
Cover page
Cover pageCover page
Cover page
ErmiyasSolomon2
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
Sufiyan Arab
 
Worldleading fingerprint technolopgy
Worldleading fingerprint technolopgyWorldleading fingerprint technolopgy
Worldleading fingerprint technolopgy
AneesaArif1
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
yasmeenreem
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
'Atikah Khalil
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
Mohamed Safraz
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric system
dominichilton98
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
gerogepatton
 
BoSh Technology, Maharashtra
BoSh Technology, MaharashtraBoSh Technology, Maharashtra
BoSh Technology, Maharashtra
IndiaMART InterMESH Limited
 
4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...
Hamed Raza
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
Chirag Agarwal
 
Biometric Course Overview - Purdue ICBR
Biometric Course Overview - Purdue ICBRBiometric Course Overview - Purdue ICBR
Biometric Course Overview - Purdue ICBR
International Center for Biometric Research
 
Eic ppt
Eic pptEic ppt
Importance of-Electronics Engineering
Importance of-Electronics Engineering Importance of-Electronics Engineering
Importance of-Electronics Engineering
neenupattath
 
Cv
CvCv
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
Ahmed+Yousef
Ahmed+YousefAhmed+Yousef
Ahmed+Yousef
Ahmed Yousef
 

What's hot (20)

IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...IRJET-  	  Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
 
GAJJAR DHARMESH1
GAJJAR DHARMESH1GAJJAR DHARMESH1
GAJJAR DHARMESH1
 
Cover page
Cover pageCover page
Cover page
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Worldleading fingerprint technolopgy
Worldleading fingerprint technolopgyWorldleading fingerprint technolopgy
Worldleading fingerprint technolopgy
 
Biometric systems last1
Biometric systems last1Biometric systems last1
Biometric systems last1
 
Ict Biometrics & Authentication
Ict Biometrics & AuthenticationIct Biometrics & Authentication
Ict Biometrics & Authentication
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Bio metric security
Bio metric securityBio metric security
Bio metric security
 
Keep secure data with biometric system
Keep secure data with biometric systemKeep secure data with biometric system
Keep secure data with biometric system
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 
BoSh Technology, Maharashtra
BoSh Technology, MaharashtraBoSh Technology, Maharashtra
BoSh Technology, Maharashtra
 
4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...
 
Ece ppt[1]
Ece ppt[1]Ece ppt[1]
Ece ppt[1]
 
Biometric Course Overview - Purdue ICBR
Biometric Course Overview - Purdue ICBRBiometric Course Overview - Purdue ICBR
Biometric Course Overview - Purdue ICBR
 
Eic ppt
Eic pptEic ppt
Eic ppt
 
Importance of-Electronics Engineering
Importance of-Electronics Engineering Importance of-Electronics Engineering
Importance of-Electronics Engineering
 
Cv
CvCv
Cv
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Ahmed+Yousef
Ahmed+YousefAhmed+Yousef
Ahmed+Yousef
 

Similar to PROJECT POWERPOINT

ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
Dakshthakur9
 
Biometrics
BiometricsBiometrics
Biometrics
Don Caeiro
 
Biometric AIT
Biometric AITBiometric AIT
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
Mayank Raiborde
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
ssuserb46d43
 
Access controls
Access controlsAccess controls
Emerging Technologies in Global Business Environment Unit 2.pdf
Emerging Technologies in Global Business Environment  Unit 2.pdfEmerging Technologies in Global Business Environment  Unit 2.pdf
Emerging Technologies in Global Business Environment Unit 2.pdf
shailendrashakya001
 
CV YG Knowledge and competencies
CV YG Knowledge and competenciesCV YG Knowledge and competencies
CV YG Knowledge and competencies
Yves GREGOIRE
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
Ankan Biswas
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 
abhi
abhiabhi
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
Sagar Verma
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Io t Training
Io t TrainingIo t Training
Io t Training
Jiya Verma
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
Jeffrey Funk
 
FPTS
FPTSFPTS
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
BhavanaKs10
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
 

Similar to PROJECT POWERPOINT (20)

ppt minor project.pptx
ppt minor project.pptxppt minor project.pptx
ppt minor project.pptx
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric AIT
Biometric AITBiometric AIT
Biometric AIT
 
Biometrics 2.pptx
Biometrics 2.pptxBiometrics 2.pptx
Biometrics 2.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Access controls
Access controlsAccess controls
Access controls
 
Emerging Technologies in Global Business Environment Unit 2.pdf
Emerging Technologies in Global Business Environment  Unit 2.pdfEmerging Technologies in Global Business Environment  Unit 2.pdf
Emerging Technologies in Global Business Environment Unit 2.pdf
 
CV YG Knowledge and competencies
CV YG Knowledge and competenciesCV YG Knowledge and competencies
CV YG Knowledge and competencies
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
abhi
abhiabhi
abhi
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
Io t Training
Io t TrainingIo t Training
Io t Training
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
FPTS
FPTSFPTS
FPTS
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 

PROJECT POWERPOINT

  • 1. KENYATTA UNIVERSITY SCHOOL OF ENGINEERING AND TECHNOLOGY ELECTRICAL AND ELECTRONICS DEPARTMENT PROJECT TITLE: ACCESS CONTROL AND AUTHENTICATION USING RFID AND FINGERPRINT NAME: SIMON CHEGE REG. NO.: J174/1706/2011 SUPERVISOR: A. MBUGUA
  • 2. • System components: microcontroller, RFID reader, Fingerprint scanner and LCD. • Application: Industries, Companies and Offices • Features measured: face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. • Algorithm cannot be reconverted to an image, so no one can’t duplicate your fingerprints. INTRODUCTION & BACKGROUND OVERVIEW
  • 3. PROBLEM STATEMENT & JUSTIFICATION • Security is a matter of concern to every company or public sector • Check: What you have What you know Who you are • unique, physical attribute harder to fake. You can't guess. You can't misplace. You can't forget.
  • 4. OBJECTIVES • Main objective: Combine the “what you have” and “who you are” concept. • The specific objectives include: User friendly system Authenticate and validate access
  • 5. LITERATURE REVIEW • [3] presents a radio-frequency identification (RFID)-enabled traceability system for the management of consignment and high value products requiring item level traceability in a hospital environment. • An Ambient Intelligence platform, NIGHT Care, for remote monitoring and control of overnight living environment is proposed by Cecilia in their paper [4]
  • 6. METHODOLOGY • BLOCK DIAGRAM GSM MODEM FINGERPRINT SCANNER RFID READER POWER SUPPLY DC MOTORDRIVER AND RELAY UNIT LCD DISPLAYMICRO CONTROLLER
  • 9. RESULTS ANALYSIS • Invalid tags: Message display, Tag number, door closed, initialize system. • Valid tags: message display, Tag number, Owner, Door open, warning timeout, door close • Idle: door closed
  • 10. CONCLUSION AND RECOMMENDATION • CONCLUSION The system can be used in wide applications for verification, validation and authentication of use of different facilities. • RECOMMENDATION The system can be improved if higher level of security is required by using GSM for monitoring. The Fingerprint part can be implemented later when the right hardware is available.
  • 11. END