SlideShare a Scribd company logo
Hearty Welcome!
Introduction
• Access control system protects and preserve Enterprise
   resources with the help of Computerized control
• Only authorized person is allowed to grant access to the
  system and denied all
• For Person authorization it first verifies the persons Identity
• Person Identity can be based on person Physiological or
   behavioral characteristics unique to that person
• The system based on person’s Physiological or behavioral
   characteristics for allowing or denying access to the system is
   known as Biometrics
Biometrics Technologies
Biometrics
Biometrics
 A Definition
• Biometrics is a branch of computer Security centering
  on Authenticating a person’s Identity based on some
  Physiological or Behavioral Characteristic Unique to that
  person
• Authentication System verifies the Identity of a User
  before allowing them access to the Internal System
Stages of Operation
• Enrollment
  Biometric Data is collected for a known Identity
  Reference template is created and stored
• Authentication
    Verification:
     Work with Id + Biometrics
     Fast Processing Involving only one Matching
     Direct go to ID and Matches the Finger Print Template
   Identification:
     Work with Biometrics and searches the Entire Database
     Processing Time depends upon the number of Finger Print Template
Stages of Operation
A Better Approach to Security…
Biometrics is seen as more secure than traditional
methods:
  • Passwords
  • Tokens

  “ Security Passwords and Tokens are used to
       Prove one's Identity Electronically ”
Types of Biometric Authentication
•Fingerprints
•Retina / Iris Scans
•Facial Recognition
•Hand Recognition
•DNA Matching
Finger Print
• Ridges vs. Valleys
• Scanning Mechanisms
    Optical Scanner
    Capacitance Scanner




                   Ridge


                    Valley
Retina Scans
• Small Surface
• Detailed Scan
• Uses Blood Vessels Pattern for Authentication
• Slow Scan and Compare Procedure
• Long Exposure to Scanner Light Emitted
Iris Scans
• More than 250 unique spots
• Compares Trabecular Meshwork (Area of Tissues
  in the Eyes) of the Iris
• Fast and distance Scans
• Requires a human Eye
Facial Recognition
• Uses a video Image to look at distances between
  Features and overall Structure
• Requires a human Face
Hand Recognition
• Hand Geometry, not as Unique as Fingerprints
• Uses hand features and Measurements increases
  Uniqueness
• Measures up to 90 different points on the hand
  including Characteristics of the Finger and
  features on the skin
DNA Matching
• Comparison of a sample of a user’s DNA with a
  Stored Sample of the real Person’s DNA
• DNA is Readily available to collect
• Comparison process is slow and not completely
  Automated
Basics of Finger Print
     Technology
Finger Print
• A Fingerprint pattern is comprised of a sequence
  of Ridges and Valleys
The dark lines In a Fingerprint Image is called Ridges
The Valleys are the areas between the Ridges
• The Finger Image is used to Authenticate person
   Identity


                       Ridge


                       Valley
Finger Print Readers

• Optical Scanner

• Capacitive Scanner
Finger Print Optical Scanner
Optical sensor
• The Optical Sensor is based on light Sensing method
• The CCD (Charge Couple Device) is used as light
  Sensing device
• The CCD Generate Inverted Image of the Finger
• Darker Areas represent more Reflected Light and Lighter
  Areas represent less Reflected Light
• According to the Light intensity, CCD generates an
  Analog signal
Finger Print Capacitive Scanner
Capacitive sensor
• In this method, the Finger skin is act as a plate of the Capacitor
• Measurement of the capacitance between the skin and the
  Sensor plates(Pixel)
• Where there is a Ridge or a Valley, the distance varies, as does
  the Capacitance
• Sensor Read the Capacitive value from conductive plates &
  send it to Integrator circuit for Analog to Digital converter to
  create Digital Image for the Finger
Basics of RFID Technology
Radio Frequency Identification
• A System that transmits the Identity (in the form of a
  unique serial number) of an object or person wirelessly,
  using radio waves

• Uses Tags (Cards), Readers, and Software to exchange
  Data over Electro-Magnetic waves in RF communication

• The Card uniquely Identifies the item it is attached to
Radio Frequency Identification
• The Reader sends out a radio signals, and the Card
  respond with a signal to Identify itself
• The Reader converts the radio waves returned form
  the Tag into Data

• The Data is send to Information processing system
  ( Host or Processing computer) for identification
  processing ( Filter, categorized and Analyze)

• System Grant or denied access to user based on the
  Information received
Component of RFID System
• RF tags ( Cards)
 Contain Chip and Antenna

• Readers (Interrogators)
 Contain RF Module (Transmitter and Receiver), Control Unit,
  Antenna and Several Interfaces (RS 232, RS 485, Ethernet etc.)

•   Host Computers
   Contains Application software, Database and Monitoring
    software
                                             Application,
                                            Database and
       Tag              Reader               Monitoring
                                              Software
Component of RFID System
                           Antenna
Card/Tag
                                            Reader

                                             Firmware
                        COMMANDS

 Controller
    Antenna             RESPONSES
                                                     Interface




                    Host
                                                     Power

              Application ,Controlling
              And Monitoring Software
                                Interface
Component of RFID System
RFID Cards
A Card is a Transponder which Receives a Radio
signal and in response to it sends out a radio signals

  Card contains an Antenna, and small Chip for storing
   small amount of Data
  Card can be Program at Manufacturer or on Installation
  Card can be battery feed or powered by the high power
   EM field generated by the Reader Antenna
  Field allows the Card Chip/Antenna to send the Signal
   containing the Data
Component of RFID System
RFID Card(tags)
•Tags can be attached to almost anything:
    – Items, cases or luggages of products, high value goods
    – vehicles, assets, personnel
•Passive Tags( Proximity card)
    – Do not require power – Draws power from Interrogator Field
    – Lower storage capacities (few bits to 1 KB)
    – Shorter read ranges (4 inches to 15 feet)
    – Usually Write-Once-Read-Many/Read-Only tags
    – Cost around 25 cents to few dollars
•Active Tags( Smart Card)
    – Battery powered
    – Higher storage capacities (512 KB)
    – Longer read range (300 feet)
    – Typically can be re-written by RF Interrogators
    – Cost around 50 to 250 dollars
RFID Card Construction
RFID Cards Construction
                                        A paper label
                                       with RFID inside




                                        an antenna,
                                      printed, etched
                                       or stamped ...


      … and a chip        … on a substrate
      attached to it       e.g. a plastic
                               foil ...
RFID Tag Memory
• Read-only tags
  – Tag ID is assigned at the factory during manufacturing
     • Can never be changed
     • No additional Data can be assigned to the tag
• Write once, read many (WORM) tags
  – Data written once, e.g., during packing or manufacturing
     • Tag is locked once Data is written
     • Similar to a compact disc or DVD
• Read/Write
  – Tag Data can be changed over time
     • Part or all of the Data section can be locked
RFID Readers
• Reader functions:
   – Remotely power tags
   – Establish a bidirectional Data link
   – Inventory tags, filter results
   – Communicate with networked server
• Readers (Interrogators) can be at a fixed point
  such as
   – Entrance/exit
   – Point of sale
• Readers can also be mobile/hand-held
How RFID Works?
          1




              2
Operational frequencies
Frequency         LF               HF            UHF             Microwave
Range             125 KHz          13.56 MHz     868-915 MHz     2.45GHz and 5.8
                                                                 GHz


Read Range        Shorter( 2.54cm-3 Short(5.08cm”- Medium(0.35m- Longest(0.35m-
                  0.48cm”)          60.96cm”)      3.48m’)       4.57m)

Tag Power         Passive Tag      Passive Tag   Active Tag      Active Tag
Source
Data Rate         Slower           Moderate      Fast            Faster

Ability to read   Better           Moderate      Poor            Worse
near metal or
wet surfaces
RFID applications
• Manufacturing and Processing
• Supply Chain Management
• Retail
• Security
• Location Tracking
• Traffic movement Control

More Related Content

PDF
RFID implementation in libraries
PPSX
Introduction to RFID
PPTX
Neal Thompson of Maritz at MPITechCon on RFID
PPTX
The Skinny on RFID and Automated Materials Handling in Library
PDF
MATRIX Biometrics Technology New
PDF
Rfid101 rfid introduction_lr
PPTX
RFID TECHNOLOGY
PPTX
rfid presentation
RFID implementation in libraries
Introduction to RFID
Neal Thompson of Maritz at MPITechCon on RFID
The Skinny on RFID and Automated Materials Handling in Library
MATRIX Biometrics Technology New
Rfid101 rfid introduction_lr
RFID TECHNOLOGY
rfid presentation

What's hot (20)

PPTX
Simple Introduction about RFID
PPTX
What is rfid
PDF
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
PPT
PPTX
Scanners by Amir Hamza Khan (SZABISTIAN)
PPTX
Rfid technology
PDF
RFID Library Automation - ETS RFID
PPTX
12206644 pps7
PPT
Radio Frequency Identification
PPTX
RFID attendance system
PPT
RFID (Radio Frequency Identification)
PPTX
Bar code VS RFID
PPTX
Presentation 1 rfid introduction
PPTX
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
PDF
Rfid based smart attendance system
PPT
Rfid presentation
PPTX
13251503 pss7
PPT
Rfid & its Implentation
DOC
Rfid seminar
PPTX
wireless technology
Simple Introduction about RFID
What is rfid
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Scanners by Amir Hamza Khan (SZABISTIAN)
Rfid technology
RFID Library Automation - ETS RFID
12206644 pps7
Radio Frequency Identification
RFID attendance system
RFID (Radio Frequency Identification)
Bar code VS RFID
Presentation 1 rfid introduction
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
Rfid based smart attendance system
Rfid presentation
13251503 pss7
Rfid & its Implentation
Rfid seminar
wireless technology
Ad

Similar to Biometrics Technology1 (20)

PPT
My best effort
PPT
RFID Technology
PPTX
12200786 pss7
PPTX
Rfid montaser hamza iraq
PPTX
12201731 PSS7
PPT
RFID Basics
PPTX
15209687 pss7
PDF
IRJET- RFID based Authentication and Access of Vehicles
PPTX
3D printing
PPTX
15251209 pss7.pptx
PPTX
Aidc technology
PPTX
RIFD Application
PDF
Rfid technology and applications
DOCX
Abstract Radio Frequency Identificatication
PPTX
13215221 pss7
PPTX
13215221 pss7
PPT
Radio Frequency Identification
PPTX
RFID Application
PPTX
Radio frequency identification
PPTX
15218473 pss7-ans
My best effort
RFID Technology
12200786 pss7
Rfid montaser hamza iraq
12201731 PSS7
RFID Basics
15209687 pss7
IRJET- RFID based Authentication and Access of Vehicles
3D printing
15251209 pss7.pptx
Aidc technology
RIFD Application
Rfid technology and applications
Abstract Radio Frequency Identificatication
13215221 pss7
13215221 pss7
Radio Frequency Identification
RFID Application
Radio frequency identification
15218473 pss7-ans
Ad

More from Gateway Business Solutions (19)

PDF
PDF
Matrix cosec presentation
PDF
Matrix cosec tam_presentation_v1_r1
PDF
Matrix cosec acm_presentation_v1_r1
PDF
Matrix sapex vs grandstream gxe502 x series
PPT
Matrix sapex ip pbx-presentation
PDF
Matrix setu ata211 ce_certificate
PDF
Matrix setu ata vs linksys spa3102
PDF
Matrix setu ata vs_linksys_pap2_t
PDF
Matrix setu ata brochure
PDF
Matrix pbx products catalogue
PDF
Matrix gateway products catalogue
PDF
Matrix Cosec Presentation
PDF
Matrix Cosec Brochure
PDF
Matrix Cosec Acm Presentation V1 R1
PDF
Matrix Cosec Tam Presentation V1 R1
PDF
MATRIX Cosec Introduction New
PDF
MATRIX License Comparison
Matrix cosec presentation
Matrix cosec tam_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1
Matrix sapex vs grandstream gxe502 x series
Matrix sapex ip pbx-presentation
Matrix setu ata211 ce_certificate
Matrix setu ata vs linksys spa3102
Matrix setu ata vs_linksys_pap2_t
Matrix setu ata brochure
Matrix pbx products catalogue
Matrix gateway products catalogue
Matrix Cosec Presentation
Matrix Cosec Brochure
Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
MATRIX Cosec Introduction New
MATRIX License Comparison

Biometrics Technology1

  • 2. Introduction • Access control system protects and preserve Enterprise resources with the help of Computerized control • Only authorized person is allowed to grant access to the system and denied all • For Person authorization it first verifies the persons Identity • Person Identity can be based on person Physiological or behavioral characteristics unique to that person • The system based on person’s Physiological or behavioral characteristics for allowing or denying access to the system is known as Biometrics
  • 5. Biometrics A Definition • Biometrics is a branch of computer Security centering on Authenticating a person’s Identity based on some Physiological or Behavioral Characteristic Unique to that person • Authentication System verifies the Identity of a User before allowing them access to the Internal System
  • 6. Stages of Operation • Enrollment Biometric Data is collected for a known Identity Reference template is created and stored • Authentication  Verification: Work with Id + Biometrics Fast Processing Involving only one Matching Direct go to ID and Matches the Finger Print Template  Identification: Work with Biometrics and searches the Entire Database Processing Time depends upon the number of Finger Print Template
  • 8. A Better Approach to Security… Biometrics is seen as more secure than traditional methods: • Passwords • Tokens “ Security Passwords and Tokens are used to Prove one's Identity Electronically ”
  • 9. Types of Biometric Authentication •Fingerprints •Retina / Iris Scans •Facial Recognition •Hand Recognition •DNA Matching
  • 10. Finger Print • Ridges vs. Valleys • Scanning Mechanisms  Optical Scanner  Capacitance Scanner Ridge Valley
  • 11. Retina Scans • Small Surface • Detailed Scan • Uses Blood Vessels Pattern for Authentication • Slow Scan and Compare Procedure • Long Exposure to Scanner Light Emitted
  • 12. Iris Scans • More than 250 unique spots • Compares Trabecular Meshwork (Area of Tissues in the Eyes) of the Iris • Fast and distance Scans • Requires a human Eye
  • 13. Facial Recognition • Uses a video Image to look at distances between Features and overall Structure • Requires a human Face
  • 14. Hand Recognition • Hand Geometry, not as Unique as Fingerprints • Uses hand features and Measurements increases Uniqueness • Measures up to 90 different points on the hand including Characteristics of the Finger and features on the skin
  • 15. DNA Matching • Comparison of a sample of a user’s DNA with a Stored Sample of the real Person’s DNA • DNA is Readily available to collect • Comparison process is slow and not completely Automated
  • 16. Basics of Finger Print Technology
  • 17. Finger Print • A Fingerprint pattern is comprised of a sequence of Ridges and Valleys The dark lines In a Fingerprint Image is called Ridges The Valleys are the areas between the Ridges • The Finger Image is used to Authenticate person Identity Ridge Valley
  • 18. Finger Print Readers • Optical Scanner • Capacitive Scanner
  • 19. Finger Print Optical Scanner Optical sensor • The Optical Sensor is based on light Sensing method • The CCD (Charge Couple Device) is used as light Sensing device • The CCD Generate Inverted Image of the Finger • Darker Areas represent more Reflected Light and Lighter Areas represent less Reflected Light • According to the Light intensity, CCD generates an Analog signal
  • 20. Finger Print Capacitive Scanner Capacitive sensor • In this method, the Finger skin is act as a plate of the Capacitor • Measurement of the capacitance between the skin and the Sensor plates(Pixel) • Where there is a Ridge or a Valley, the distance varies, as does the Capacitance • Sensor Read the Capacitive value from conductive plates & send it to Integrator circuit for Analog to Digital converter to create Digital Image for the Finger
  • 21. Basics of RFID Technology
  • 22. Radio Frequency Identification • A System that transmits the Identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves • Uses Tags (Cards), Readers, and Software to exchange Data over Electro-Magnetic waves in RF communication • The Card uniquely Identifies the item it is attached to
  • 23. Radio Frequency Identification • The Reader sends out a radio signals, and the Card respond with a signal to Identify itself • The Reader converts the radio waves returned form the Tag into Data • The Data is send to Information processing system ( Host or Processing computer) for identification processing ( Filter, categorized and Analyze) • System Grant or denied access to user based on the Information received
  • 24. Component of RFID System • RF tags ( Cards)  Contain Chip and Antenna • Readers (Interrogators)  Contain RF Module (Transmitter and Receiver), Control Unit, Antenna and Several Interfaces (RS 232, RS 485, Ethernet etc.) • Host Computers  Contains Application software, Database and Monitoring software Application, Database and Tag Reader Monitoring Software
  • 25. Component of RFID System Antenna Card/Tag Reader Firmware COMMANDS Controller Antenna RESPONSES Interface Host Power Application ,Controlling And Monitoring Software Interface
  • 26. Component of RFID System RFID Cards A Card is a Transponder which Receives a Radio signal and in response to it sends out a radio signals  Card contains an Antenna, and small Chip for storing small amount of Data  Card can be Program at Manufacturer or on Installation  Card can be battery feed or powered by the high power EM field generated by the Reader Antenna  Field allows the Card Chip/Antenna to send the Signal containing the Data
  • 27. Component of RFID System RFID Card(tags) •Tags can be attached to almost anything: – Items, cases or luggages of products, high value goods – vehicles, assets, personnel •Passive Tags( Proximity card) – Do not require power – Draws power from Interrogator Field – Lower storage capacities (few bits to 1 KB) – Shorter read ranges (4 inches to 15 feet) – Usually Write-Once-Read-Many/Read-Only tags – Cost around 25 cents to few dollars •Active Tags( Smart Card) – Battery powered – Higher storage capacities (512 KB) – Longer read range (300 feet) – Typically can be re-written by RF Interrogators – Cost around 50 to 250 dollars
  • 28. RFID Card Construction RFID Cards Construction A paper label with RFID inside an antenna, printed, etched or stamped ... … and a chip … on a substrate attached to it e.g. a plastic foil ...
  • 29. RFID Tag Memory • Read-only tags – Tag ID is assigned at the factory during manufacturing • Can never be changed • No additional Data can be assigned to the tag • Write once, read many (WORM) tags – Data written once, e.g., during packing or manufacturing • Tag is locked once Data is written • Similar to a compact disc or DVD • Read/Write – Tag Data can be changed over time • Part or all of the Data section can be locked
  • 30. RFID Readers • Reader functions: – Remotely power tags – Establish a bidirectional Data link – Inventory tags, filter results – Communicate with networked server • Readers (Interrogators) can be at a fixed point such as – Entrance/exit – Point of sale • Readers can also be mobile/hand-held
  • 32. Operational frequencies Frequency LF HF UHF Microwave Range 125 KHz 13.56 MHz 868-915 MHz 2.45GHz and 5.8 GHz Read Range Shorter( 2.54cm-3 Short(5.08cm”- Medium(0.35m- Longest(0.35m- 0.48cm”) 60.96cm”) 3.48m’) 4.57m) Tag Power Passive Tag Passive Tag Active Tag Active Tag Source Data Rate Slower Moderate Fast Faster Ability to read Better Moderate Poor Worse near metal or wet surfaces
  • 33. RFID applications • Manufacturing and Processing • Supply Chain Management • Retail • Security • Location Tracking • Traffic movement Control