SlideShare a Scribd company logo
Decision-Making Support in
Biometric-Based Physical Access
Control Systems
Presented by
Sahithi Kotha
Linga Srikanth Rohan
Department of Computer Science
Authors and venue
Authors: Svetlana N. Yanushkevich
Vlad P. Shmerko
Oleg Boulanov
Adrian Stoica
Venue: Research work was conducted at the Biometric Technologies
Laboratory of the University of Calgary, Canada; and at the Humanoid
Robotics Laboratory at the NASAJet Propulsion Laboratory, California
Institute of Technology.
Year: 2008
Agenda
1. Understanding Physical Access Security Systems
2. Exploring Different Types of PASS
3. The Crucial Role of Computer System Architecture
4. Architectural Details
5. Decision-Making Process
6. Decision Strategies
7. Analyzing Strengths and Weaknesses
8. Concluding Remarks
Physical Access Security Systems
Physical Access Security Systems (PASS) are security
solutions designed to manage and regulate access to
physical locations, buildings, rooms, or restricted areas.
They are used to ensure that only authorized individuals
can enter specific areas while preventing unauthorized
access. PASS employ various authentication methods
and technologies to achieve this
Types
1.Card – Based Systems
2.Biometric Systems
3.Keypad and PIN Systems
4.Biometric Door Locks
5.Mobile – Based Systems
Role of computer system architecture
1. It defines the hardware and software infrastructure that
enables biometric data processing, storage, and decision-
making.
2. It determines how efficiently and effectively these systems
operate. Computer system architecture influences the speed,
accuracy, and reliability of access control processes.
3. It also affects the integration of different security
components, such as sensors, databases, and decision-making
algorithms, ensuring a seamless and responsive security
environment.
Architecture
1.Structure of the Proposed PASS: The Physical
Access Control System (PASS) comprises various
components, including sensors like cameras in
visible and infrared bands, data processors, a
knowledge domain converter, a dialogue support
device, and a personal file generating module.
Three levels of surveillance are implemented: pre-
screening, monitoring during the transition from
pre-screened to screened areas, and surveillance
during the authorization process at the officer's
desk.
2.Personal File Construction: The creation of a
personal file involves gathering preliminary
information from surveillance in visible and infrared
bands. Additionally, information is extracted from
observations, conversations, and other available
sources.
3. Reconfiguration into Training System:
The PASS can be reconfigured into a
training system known as T-PASS. This
reconfiguration allows for real-world
training conditions and follows the
multitarget platform concept, emphasizing
modularity for aggregation and
reconfiguration.
4.Screening Process: The screening process
in social infrastructures involves three distinct
time intervals (T1, T2, and T3). T1 is the pre-
screening phase, T2 is for information
collection during movement, and T3 involves
document checks and authorization. The
physical distance between pre-screened and
screened areas can provide additional
information, such as gait biometrics, which
can indicate various physical and
psychological conditions.
5. Generic Model of PASS: The above
figure, illustrating three main data flows.
Loop 1 focuses on the professional skills of
personnel, while loops 2 and 3 handle
biometric data processing and automate
decisions related to pattern detection and
recognition. The results of biometric data
processing must be presented to officers in
a comprehensible and actionable format to
support dialogue and decision-making.
Decision making process
The devices gathered from the sensors and intelligent data processing
for the situational awareness are called decision-making support
assistants.
These assistants can be based on noninvasive metrics such as
1. Temperature measurement
2. Artificial accessory detection
3. Estimation of drug and alcohol intoxication
4. Estimation of blood pressure and pulse
The basic design paradigm of these decision support assistances is the
discriminative biometrics.
Temperature measurement
It involves using sensors to
determine the temperature
measurement is crucial in the
health screening process.
Artificial accessory detection
It is used to detect items like
masks, prosthetics, or other
accessories that may be
used to deceive or manipulate
security measures.
Estimation of drug and alcohol intoxication:
It involves assessing or measuring the level of influence or impairment
in a person caused by the consumption of drugs or alcohol, which can
impact their behavior, judgment, and physical abilities, particularly when
it comes to issues like safety and security.
Estimation of blood pressure and pulse:
It refers to the process of measuring and determining an individual's
blood pressure and pulse rate. These measurements are essential for
assessing a person's cardiovascular health and overall well-being
Decision Strategy
Averaging: In the preprocessing block of a decision support assistant,
data collected while observing a pre-screening individual can vary due
to factors like their pose, lighting conditions, and other variables. For
instance, taking the temperature of an individual may be delayed
because of their position in relation to the cameras. During this delay,
the equipment processes data from other available sources, like the ear.
However, this can sometimes lead to unreliable support decisions for the
officer. To address this, adaptive weighted averaging is used, involving
both numerical and linguistic averaging produce belief probabilities,
which are then converted into linguistic forms for more meaningful
representation and decision-making.
Decision-Making Support in Biometric-Based Physical Access Control Systems
Strengths
1.Enhanced Security: These systems provide a robust defense against
unauthorized access, theft, and security breaches, safeguarding
valuable assets and sensitive information.
2.Access Control: They offer precise control over who can enter
specific areas, ensuring only authorized individuals gain entry.
3.Audit Trail: Many systems maintain detailed logs, enabling
organizations to track access history and investigate security incidents.
4.Integration: They can be integrated with other security measures like
surveillance cameras and alarms for a comprehensive security
solution.
Weaknesses
1.Cost: Implementing and maintaining these systems can be expensive,
especially for larger facilities.
2.Human Error: Misuse of access cards or forgetting to secure access
points can lead to vulnerabilities.
3.Maintenance: Regular maintenance is essential to keep the system
functioning correctly; failures can lead to security gaps.
4.Vulnerability to Technical Failures: Systems can be vulnerable to
technical glitches or power outages, potentially causing disruptions in
security.
Applications
1. Corporate Security: Protecting office buildings, data centers, and
sensitive areas within corporate environments.
2. Airports and Transportation: Managing passenger access to
secure zones, boarding gates, and aircraft.
3. Healthcare: Ensuring controlled access to medical records, labs,
and pharmaceutical storage areas in hospitals and clinics.
4. Smart Homes: Enhancing residential security with biometric access
to smart locks and home automation.
5. Educational Institutions: Controlling access to classrooms, labs,
and dormitories on campuses.
6. Banking and Finance: Securing bank vaults, data centers, and
financial institutions' sensitive zones.
Conclusion
1. Physical access security systems are crucial for
safeguarding physical spaces.
2. They control who enters, preventing unauthorized access.
3. Biometrics and advanced technologies enhance security.
4. Challenges like insufficient information persist.
5. Multidisciplinary approaches are key.
6. These systems offer promising applications and strengths.
Thank You

More Related Content

PDF
Access control system
PDF
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PDF
access control systems.pdf Physical Security Domains
PPT
Chapter008
PDF
rowland proj
PDF
(2003) Securing the Biometric Model
PDF
WP82 Physical Security in Mission Critical Facilities
PDF
Focus on the World Electronic Access Control Systems Market
Access control system
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
access control systems.pdf Physical Security Domains
Chapter008
rowland proj
(2003) Securing the Biometric Model
WP82 Physical Security in Mission Critical Facilities
Focus on the World Electronic Access Control Systems Market

Similar to Decision-Making Support in Biometric-Based Physical Access Control Systems (20)

PDF
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
PDF
Access Control Presentation
PDF
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
PPTX
Network Security: Physical security
PDF
How Our Company Improved Security with a New Access Control System.pdf
PDF
Fingerprint Alert System A Solution for Effective Management System
PPTX
Biometric Systems and Security
PDF
Biometric attendance machine in Gurgaon call !7303455739
PDF
CISSP Prep: Ch 4. Security Engineering (Part 1)
PDF
(2006) Graduate Course Development Focusing on Security Issues in Manufacturing
PDF
Advancing Security The Biometric Access Control System.pdf
PPTX
Biometric Systems
PPTX
Physical access control
PDF
Case study on Usage of Biometrics (Cryptography)
DOCX
The solutions you wrote for meDr Palmer and his staff are ups.docx
DOCX
CST 610 RANK Achievement Education--cst610rank.com
PPS
Physical security.ppt
PDF
CISA-Exam-Prep-Domain-5-2019.pdf. CISA exam
PPT
Information Security Principles - Access Control
PPTX
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
Enhancing Security and Efficiency The Power of Biometric Access Control Systems
Access Control Presentation
THE THREE DIMENSION-BASED PHYSICAL ACCESS CONTROL DETECTION SYSTEM, THE NATUR...
Network Security: Physical security
How Our Company Improved Security with a New Access Control System.pdf
Fingerprint Alert System A Solution for Effective Management System
Biometric Systems and Security
Biometric attendance machine in Gurgaon call !7303455739
CISSP Prep: Ch 4. Security Engineering (Part 1)
(2006) Graduate Course Development Focusing on Security Issues in Manufacturing
Advancing Security The Biometric Access Control System.pdf
Biometric Systems
Physical access control
Case study on Usage of Biometrics (Cryptography)
The solutions you wrote for meDr Palmer and his staff are ups.docx
CST 610 RANK Achievement Education--cst610rank.com
Physical security.ppt
CISA-Exam-Prep-Domain-5-2019.pdf. CISA exam
Information Security Principles - Access Control
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
Ad

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Cloud computing and distributed systems.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
A Presentation on Artificial Intelligence
NewMind AI Weekly Chronicles - August'25-Week II
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Programs and apps: productivity, graphics, security and other tools
Cloud computing and distributed systems.
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Ad

Decision-Making Support in Biometric-Based Physical Access Control Systems

  • 1. Decision-Making Support in Biometric-Based Physical Access Control Systems Presented by Sahithi Kotha Linga Srikanth Rohan Department of Computer Science
  • 2. Authors and venue Authors: Svetlana N. Yanushkevich Vlad P. Shmerko Oleg Boulanov Adrian Stoica Venue: Research work was conducted at the Biometric Technologies Laboratory of the University of Calgary, Canada; and at the Humanoid Robotics Laboratory at the NASAJet Propulsion Laboratory, California Institute of Technology. Year: 2008
  • 3. Agenda 1. Understanding Physical Access Security Systems 2. Exploring Different Types of PASS 3. The Crucial Role of Computer System Architecture 4. Architectural Details 5. Decision-Making Process 6. Decision Strategies 7. Analyzing Strengths and Weaknesses 8. Concluding Remarks
  • 4. Physical Access Security Systems Physical Access Security Systems (PASS) are security solutions designed to manage and regulate access to physical locations, buildings, rooms, or restricted areas. They are used to ensure that only authorized individuals can enter specific areas while preventing unauthorized access. PASS employ various authentication methods and technologies to achieve this
  • 5. Types 1.Card – Based Systems 2.Biometric Systems 3.Keypad and PIN Systems 4.Biometric Door Locks 5.Mobile – Based Systems
  • 6. Role of computer system architecture 1. It defines the hardware and software infrastructure that enables biometric data processing, storage, and decision- making. 2. It determines how efficiently and effectively these systems operate. Computer system architecture influences the speed, accuracy, and reliability of access control processes. 3. It also affects the integration of different security components, such as sensors, databases, and decision-making algorithms, ensuring a seamless and responsive security environment.
  • 7. Architecture 1.Structure of the Proposed PASS: The Physical Access Control System (PASS) comprises various components, including sensors like cameras in visible and infrared bands, data processors, a knowledge domain converter, a dialogue support device, and a personal file generating module. Three levels of surveillance are implemented: pre- screening, monitoring during the transition from pre-screened to screened areas, and surveillance during the authorization process at the officer's desk. 2.Personal File Construction: The creation of a personal file involves gathering preliminary information from surveillance in visible and infrared bands. Additionally, information is extracted from observations, conversations, and other available sources.
  • 8. 3. Reconfiguration into Training System: The PASS can be reconfigured into a training system known as T-PASS. This reconfiguration allows for real-world training conditions and follows the multitarget platform concept, emphasizing modularity for aggregation and reconfiguration. 4.Screening Process: The screening process in social infrastructures involves three distinct time intervals (T1, T2, and T3). T1 is the pre- screening phase, T2 is for information collection during movement, and T3 involves document checks and authorization. The physical distance between pre-screened and screened areas can provide additional information, such as gait biometrics, which can indicate various physical and psychological conditions.
  • 9. 5. Generic Model of PASS: The above figure, illustrating three main data flows. Loop 1 focuses on the professional skills of personnel, while loops 2 and 3 handle biometric data processing and automate decisions related to pattern detection and recognition. The results of biometric data processing must be presented to officers in a comprehensible and actionable format to support dialogue and decision-making.
  • 10. Decision making process The devices gathered from the sensors and intelligent data processing for the situational awareness are called decision-making support assistants. These assistants can be based on noninvasive metrics such as 1. Temperature measurement 2. Artificial accessory detection 3. Estimation of drug and alcohol intoxication 4. Estimation of blood pressure and pulse The basic design paradigm of these decision support assistances is the discriminative biometrics.
  • 11. Temperature measurement It involves using sensors to determine the temperature measurement is crucial in the health screening process.
  • 12. Artificial accessory detection It is used to detect items like masks, prosthetics, or other accessories that may be used to deceive or manipulate security measures.
  • 13. Estimation of drug and alcohol intoxication: It involves assessing or measuring the level of influence or impairment in a person caused by the consumption of drugs or alcohol, which can impact their behavior, judgment, and physical abilities, particularly when it comes to issues like safety and security. Estimation of blood pressure and pulse: It refers to the process of measuring and determining an individual's blood pressure and pulse rate. These measurements are essential for assessing a person's cardiovascular health and overall well-being
  • 14. Decision Strategy Averaging: In the preprocessing block of a decision support assistant, data collected while observing a pre-screening individual can vary due to factors like their pose, lighting conditions, and other variables. For instance, taking the temperature of an individual may be delayed because of their position in relation to the cameras. During this delay, the equipment processes data from other available sources, like the ear. However, this can sometimes lead to unreliable support decisions for the officer. To address this, adaptive weighted averaging is used, involving both numerical and linguistic averaging produce belief probabilities, which are then converted into linguistic forms for more meaningful representation and decision-making.
  • 16. Strengths 1.Enhanced Security: These systems provide a robust defense against unauthorized access, theft, and security breaches, safeguarding valuable assets and sensitive information. 2.Access Control: They offer precise control over who can enter specific areas, ensuring only authorized individuals gain entry. 3.Audit Trail: Many systems maintain detailed logs, enabling organizations to track access history and investigate security incidents. 4.Integration: They can be integrated with other security measures like surveillance cameras and alarms for a comprehensive security solution.
  • 17. Weaknesses 1.Cost: Implementing and maintaining these systems can be expensive, especially for larger facilities. 2.Human Error: Misuse of access cards or forgetting to secure access points can lead to vulnerabilities. 3.Maintenance: Regular maintenance is essential to keep the system functioning correctly; failures can lead to security gaps. 4.Vulnerability to Technical Failures: Systems can be vulnerable to technical glitches or power outages, potentially causing disruptions in security.
  • 18. Applications 1. Corporate Security: Protecting office buildings, data centers, and sensitive areas within corporate environments. 2. Airports and Transportation: Managing passenger access to secure zones, boarding gates, and aircraft. 3. Healthcare: Ensuring controlled access to medical records, labs, and pharmaceutical storage areas in hospitals and clinics. 4. Smart Homes: Enhancing residential security with biometric access to smart locks and home automation. 5. Educational Institutions: Controlling access to classrooms, labs, and dormitories on campuses. 6. Banking and Finance: Securing bank vaults, data centers, and financial institutions' sensitive zones.
  • 19. Conclusion 1. Physical access security systems are crucial for safeguarding physical spaces. 2. They control who enters, preventing unauthorized access. 3. Biometrics and advanced technologies enhance security. 4. Challenges like insufficient information persist. 5. Multidisciplinary approaches are key. 6. These systems offer promising applications and strengths.