Access Control: Presented By, Bency P Oommen Archit Mishra
Access Control: Presented By, Bency P Oommen Archit Mishra
Presented by,
Bency P Oomme
Archit mishra
Working Principle
The RFID module is interfaced with the micro controller and when the
card is inserted into the reader, it reads the data in the card. If the
data in the card is matched with the data stored in the program memory,
then it displays authorized message, if the data is not matched it
displays unauthorized as per the code logic.
For authorized message, the door will be opened and closes automatically
after a small delay. If it is an unauthorized person it alerts the persons
through a buzzer. The smart card reader alerts the buzzer whenever it
reads the data from the smart card.
Token device
Software hardware hybrid object used
to verify an identity in an
authentication process.
Token device, or password generator, is
usually a handheld device that has an
LCD display and possibly a keypad
Limitations
Human error
Battery limitation
Token itself (Environmental factors)
Asynchronous Token
A token device using an asynchronous token generating method
employs a challenge/response scheme to authenticate a user.
Synchronous Token
Memory Card
Holds information but cannot process
A memory card can hold a user's authentication information, so that
the user only needs to type in a UserID or PIN.
Smart Card
Holds and processes information
After a threshold of failed login attempts, it can render
itself unusable
PIN or password unlocks smart card functionality
Smart card could be used for:
Holding biometric data in template
Responding to challenge
Holding private key
Contactless
Requires only close proximity to a reader
Both the reader and the card have antenna and it is via this
contactless link that two communicate
Micro-probing techniques
Eavesdropping techniques
Trojan Horse attacks
Social engineering attacks
Biometric System
A characteristic based system
Includes all the hardware, associated software and
interconnecting infrastructure to enable the
identification/authentication process
Fingerprints
Every person's fingerprint is
unique
Most affordable and convenient
method of verifying a
person's identity
The lines that create a
fingerprint pattern are called
ridges and the spaces between
ridges are called valleys.
Retina Scan
Accurate
Many people are hesitant to use the device
Iris Scan
Scans the iris or the
colored portion of the eye
For authentication the
subject looks at the video
camera
from a distance of 3-10
inches
The entire enrollment
process is less than 20
seconds, and
subsequent identification
takes 1-2 seconds.
Hand Geometry
Measures specific characteristics of a
person's hand such
as length of fingers and thumb, widths, and
depth.
Takes over 90 measurements of the
length, width, thickness, and surface
area of a person's hand and fingers.
Hand measurements occur with
amazing speed, almost
within one second.
A charge coupled device (CCD) digital
camera is used to record the hand's three
dimensional shape.
Keyboard Dynamics
Looks at the way a person types at a
keyboard
Also called Typing Rhythms!
Keyboard dynamics measures two
distinct variables:
Dwell time: The amount of time one holds
a particular key
Flight time: The amount of time one
moves between the keys
Voice Print
A voice reference template is constructed
To construct, an individual must speak a set of phrases several
times as the system builds the template.
Voice identification systems incorporate several variables
including pitch, dynamics, and waveform.
Facial Scan
Incorporates two significant methods:
Detection
Recognition
Biometric Performance
Biometric performance is most commonly measured in
two ways:
False Rejection Rate (FRR) Type1
False Acceptance Rate (FAR) Type 2
Thank You!