DEVELOPMENT OF FINGERPRINT DOOR ACCESS CONTROL SYSTEM

CONSTRUCTION OF FINGERPRINT DOOR ACCESS CONTROL SYSTEM

EMBEDDED SYSTEMS AND BIOMETRICS.


ABSTRACT

Security has been playing a key role in many of our places like offices, institutions, libraries, laboratories etc. in order to keep our data confidentially so that no other unauthorized person could have an access on them. Nowadays, at every point of time, we need security systems for protection of valuable data and even money. This paper presents a fingerprint based door opening system which provides security which can be used for institutions and various organizations etc..,. There are other methods of verifying authentication through password, RFID but this method is most efficient and reliable. To provide perfect security to the door access and to make the work easier, this project is taking help of two different technologies viz. EMBEDDED SYSTEMS and BIOMETRICS. Unauthorized access is prohibited by designing a lock that stores the fingerprints of one or more authorized users. Fingerprint is sensed by sensor and is validated for authentication. If the fingerprint matches, the door will be opened automatically otherwise the buzzer connected to an audio amplifier will be activated so that the people near the surroundings will get an alert.

 

TABLE OF CONTENT

                                                                                                                                                  Pages                                                                                                                 

Title Page

Certification

Dedication

Acknowledgement

Abstract

CHAPTER ONE

INTRODUCTION                                                                                                                          

1.1Background to the study

1.2 Statement of the problem

1.3 Aims and Objective of the study

1.4 Scope and Limitations of the study

1.5 Significance of the study

1.9 Operational definition of terms

CHAPTER TWO

Literature Review                                                                                                                        

2.1 Introduction

2.2 Overview of Access Control

2.2.1    Types of Access Control

2.2.2. Multi-factors of Access Control

2.3 Related Works

2.4 Adaptive Biometric Systems

2.4.1    History Of Biometrics

2.6       Biometric techniques

2.6.1    Fingerprint technologies

2.8       Advantages And Disadvantages Of Biometrics

2.9       Implementation of Biometrics

CHAPTER THREE                                                                                                 

Research Methodology

3.1 Construction Methodology

3.2 Design Analysis and Component

3.3 Circuit Diagram and Processing/Control Unit

3.4 Description of Major Components Used

CHAPTER FOUR

Result Analysis

4.1 Mode of Operation

4.2 Construction Procedure And Testing

4.3 Construction of the Finger Print Reader System

4.4 Performance and Evaluation

4.5 Economic Benefit of the Project

4.6 System Training

4.7 Project Maintainability

4.8 Summary Discussion

CHAPTER FIVE

5.1 Conclusion

5.2 Recommendation

5.3 References                                                                                                           

 

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF STUDY

Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. The use of fingerprint for identification has been employed in law enforcement for about a century. A much broader application of fingerprint is for personal authentication, for instance to access a computer, a network, an ATM machine, a car or a home.

Electronic lock using fingerprint recognition system is a process of verifying the fingerprint image to open the electronic lock. This project highlights the development of fingerprint verification. Verification is completed by comparing the data of authorized fingerprint image with incoming fingerprint image. Then the information of incoming fingerprint image will undergo the comparison process to compare with authorized fingerprint image.

Access control is a fundamental issue of any security system, and it is mainly devoted to checking the truthfulness of users’ claimed identity, in order to both verify personal access rights and support tracing and logging services. Access control implies authorization, and it strongly relies on identity analysis and authentication. Within a company structure, the requirements and rules that preside over the access control may differ with respect to different locations, expected actions, and functions of principals. Moreover, they can vary over time. The main focus of this paper is authentication (i.e., the process of confirming the identity of an entity), and its deployment in a real context within a company security system where it should be responsible for regulating the main access and the transit to the different zones inside the company itself.

Authentication involves the verification of the validity of at least one form of identification (e.g., documents, digital certificate, biometric identifiers, etc.). The most interesting approach for identity assessment falls into the category “checking something that the user is or does” as the factors of authentication, known as inherence factors. Examples of inherence factors are static or dynamic Biometric parameters like face, fingerprint, iris, retinal pattern, signature, voice, etc. These biometric identifiers are distinctive and measurable characteristics which can be used to label and describe individuals in an almost unique way. There are several advantages in using biometrics: they cannot be lost or forgotten, and they require the person under recognition to be present at the check point.

The general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity (according to Engert, Gerald J., 1964).

Fingerprint Security Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their “Class Characteristics”.

Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags (Johnson, P. Lee 1973[3]). 

1.2   AIMS AND OBJECTIVE OF THE PROJECT

The aim of this research is to construct a fingerprint Access Control System.

The objectives of this research are; 

  • To construct a device that utilizes fingerprint recognition technology to allow access
  • To develop a program that will work with a biometric device and increase accuracy in information access.
  • To ensure an advanced technology in security, risk management, reduced cost etc.
  • Software that will increase the level of data integrity.
  • To enable dissemination of information among system constitutes.
  • To increase     accuracy in information security. 

CHAPTER THREE

3.0       RESEARCH METHODOLOGY

The listed below are the components used in the construction:

3.1       MATERIAL USED FOR FINGERPRINT ASSESS CONTROL SYSTEM
  • Rectifier
  • Transistor
  • Diode
  • Regulator
  • Resistor
  • Capacitor
  • Display LCD (Liquid Crystal Display )
  • Finger Print Module
  • Micro-Controller
  • Arduino Uno
  • Crystal
  • Power Supply
  • Preset
  • Silicon Diode
  • Vero Board
4.2      CONSTRUCTION PROCEDURE AND TESTING
4.3    CONSTRUCTION OF THE FINGER PRINT READER SYSTEM

Initial display on LCD when power is turned on.

Step 1: When power is supplied to the board, the first displays on the LCD.

Fig.4.3.1 Experimental observation

Step 2: LCD display the welcome note scan fingerprint.

Fig.4.3.2 Indication to scan the finger

Fig.4.3.3 scanning the finger

4.4       Performance and Evaluation

This was conducted to determine how the system responds to inputs from the sensors to see its performance. Figures 6-9 show the pictures of the implemented work being tested.

Figure 6 shows the initial stage with the door locked with the LCD displaying “INSERT FINGERPRINT ON SENSOR”. When a finger was placed on the fingerprint scanner, and it was recognized, the LCD displayed “ACCESS GRANTED” as shown in Figure 7. Figure 8 shows the system granting access to a registered user by displaying “ACCESS GRANTED” together with the name of the registered user. At the same time, the door slides open when the fingerprint sensor senses the registered fingerprint. The buzzer also makes a sound during this period. Figure 9 shows the system denying access to an unrecognized fingerprint.

Figure 6: Picture of the system at its initial state

 DOWNLOAD FULL PAPER

ALEX RAJI

Thank You

Remember to Subscribe to Our Post:

 368 total views,  1 views today

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.