Gateway Business Solutions, A Solution provider in Telecom, Access Control, Time Attendance, Digital Security and Surviellance and Office automation. Pioneers in VOIP solutions like IP PBX, CALL CENTRE SOLUTIONS etc.
Description
Gateway Business Solution is a Distributor to M/S Matrix Comsec Pvt Ltd, for their Range of Telecom and Security Products and solutions. MATRIX Analog, Digital and IP Pbx solutions and Security products such as Door Access and Time Attendance Products (Proximity and Biometric)
Gateway is also Channel Partner for M/s Intellicon Pvt Ltd for their range of Telecom Products. Transtel, Karel, NEC IP EPABX systems and Radvision and Lifesize Video Conferencing Solutions.
Gateway is also a pioneer in offering VOIP solutions ranging from Soft IP PBX, Call Centre Solutions, Automatic Voice Campaigner etc.
Contact :
Gateway Business Solutions
2nd Flr, Sai Krupa, 33 Durga Nagar Colony
Punjagutta
Hyderabad 500 082
Ph: 93978 20222
2. Introduction
• Access control system protects and preserve Enterprise
resources with the help of Computerized control
• Only authorized person is allowed to grant access to the
system and denied all
• For Person authorization it first verifies the persons Identity
• Person Identity can be based on person Physiological or
behavioral characteristics unique to that person
• The system based on person’s Physiological or behavioral
characteristics for allowing or denying access to the system is
known as Biometrics
5. Biometrics
A Definition
• Biometrics is a branch of computer Security centering
on Authenticating a person’s Identity based on some
Physiological or Behavioral Characteristic Unique to that
person
• Authentication System verifies the Identity of a User
before allowing them access to the Internal System
6. Stages of Operation
• Enrollment
Biometric Data is collected for a known Identity
Reference template is created and stored
• Authentication
Verification:
Work with Id + Biometrics
Fast Processing Involving only one Matching
Direct go to ID and Matches the Finger Print Template
Identification:
Work with Biometrics and searches the Entire Database
Processing Time depends upon the number of Finger Print Template
8. A Better Approach to Security…
Biometrics is seen as more secure than traditional
methods:
• Passwords
• Tokens
“ Security Passwords and Tokens are used to
Prove one's Identity Electronically ”
10. Finger Print
• Ridges vs. Valleys
• Scanning Mechanisms
Optical Scanner
Capacitance Scanner
Ridge
Valley
11. Retina Scans
• Small Surface
• Detailed Scan
• Uses Blood Vessels Pattern for Authentication
• Slow Scan and Compare Procedure
• Long Exposure to Scanner Light Emitted
12. Iris Scans
• More than 250 unique spots
• Compares Trabecular Meshwork (Area of Tissues
in the Eyes) of the Iris
• Fast and distance Scans
• Requires a human Eye
13. Facial Recognition
• Uses a video Image to look at distances between
Features and overall Structure
• Requires a human Face
14. Hand Recognition
• Hand Geometry, not as Unique as Fingerprints
• Uses hand features and Measurements increases
Uniqueness
• Measures up to 90 different points on the hand
including Characteristics of the Finger and
features on the skin
15. DNA Matching
• Comparison of a sample of a user’s DNA with a
Stored Sample of the real Person’s DNA
• DNA is Readily available to collect
• Comparison process is slow and not completely
Automated
17. Finger Print
• A Fingerprint pattern is comprised of a sequence
of Ridges and Valleys
The dark lines In a Fingerprint Image is called Ridges
The Valleys are the areas between the Ridges
• The Finger Image is used to Authenticate person
Identity
Ridge
Valley
19. Finger Print Optical Scanner
Optical sensor
• The Optical Sensor is based on light Sensing method
• The CCD (Charge Couple Device) is used as light
Sensing device
• The CCD Generate Inverted Image of the Finger
• Darker Areas represent more Reflected Light and Lighter
Areas represent less Reflected Light
• According to the Light intensity, CCD generates an
Analog signal
20. Finger Print Capacitive Scanner
Capacitive sensor
• In this method, the Finger skin is act as a plate of the Capacitor
• Measurement of the capacitance between the skin and the
Sensor plates(Pixel)
• Where there is a Ridge or a Valley, the distance varies, as does
the Capacitance
• Sensor Read the Capacitive value from conductive plates &
send it to Integrator circuit for Analog to Digital converter to
create Digital Image for the Finger
22. Radio Frequency Identification
• A System that transmits the Identity (in the form of a
unique serial number) of an object or person wirelessly,
using radio waves
• Uses Tags (Cards), Readers, and Software to exchange
Data over Electro-Magnetic waves in RF communication
• The Card uniquely Identifies the item it is attached to
23. Radio Frequency Identification
• The Reader sends out a radio signals, and the Card
respond with a signal to Identify itself
• The Reader converts the radio waves returned form
the Tag into Data
• The Data is send to Information processing system
( Host or Processing computer) for identification
processing ( Filter, categorized and Analyze)
• System Grant or denied access to user based on the
Information received
24. Component of RFID System
• RF tags ( Cards)
Contain Chip and Antenna
• Readers (Interrogators)
Contain RF Module (Transmitter and Receiver), Control Unit,
Antenna and Several Interfaces (RS 232, RS 485, Ethernet etc.)
• Host Computers
Contains Application software, Database and Monitoring
software
Application,
Database and
Tag Reader Monitoring
Software
25. Component of RFID System
Antenna
Card/Tag
Reader
Firmware
COMMANDS
Controller
Antenna RESPONSES
Interface
Host
Power
Application ,Controlling
And Monitoring Software
Interface
26. Component of RFID System
RFID Cards
A Card is a Transponder which Receives a Radio
signal and in response to it sends out a radio signals
Card contains an Antenna, and small Chip for storing
small amount of Data
Card can be Program at Manufacturer or on Installation
Card can be battery feed or powered by the high power
EM field generated by the Reader Antenna
Field allows the Card Chip/Antenna to send the Signal
containing the Data
27. Component of RFID System
RFID Card(tags)
•Tags can be attached to almost anything:
– Items, cases or luggages of products, high value goods
– vehicles, assets, personnel
•Passive Tags( Proximity card)
– Do not require power – Draws power from Interrogator Field
– Lower storage capacities (few bits to 1 KB)
– Shorter read ranges (4 inches to 15 feet)
– Usually Write-Once-Read-Many/Read-Only tags
– Cost around 25 cents to few dollars
•Active Tags( Smart Card)
– Battery powered
– Higher storage capacities (512 KB)
– Longer read range (300 feet)
– Typically can be re-written by RF Interrogators
– Cost around 50 to 250 dollars
28. RFID Card Construction
RFID Cards Construction
A paper label
with RFID inside
an antenna,
printed, etched
or stamped ...
… and a chip … on a substrate
attached to it e.g. a plastic
foil ...
29. RFID Tag Memory
• Read-only tags
– Tag ID is assigned at the factory during manufacturing
• Can never be changed
• No additional Data can be assigned to the tag
• Write once, read many (WORM) tags
– Data written once, e.g., during packing or manufacturing
• Tag is locked once Data is written
• Similar to a compact disc or DVD
• Read/Write
– Tag Data can be changed over time
• Part or all of the Data section can be locked
30. RFID Readers
• Reader functions:
– Remotely power tags
– Establish a bidirectional Data link
– Inventory tags, filter results
– Communicate with networked server
• Readers (Interrogators) can be at a fixed point
such as
– Entrance/exit
– Point of sale
• Readers can also be mobile/hand-held
32. Operational frequencies
Frequency LF HF UHF Microwave
Range 125 KHz 13.56 MHz 868-915 MHz 2.45GHz and 5.8
GHz
Read Range Shorter( 2.54cm-3 Short(5.08cm”- Medium(0.35m- Longest(0.35m-
0.48cm”) 60.96cm”) 3.48m’) 4.57m)
Tag Power Passive Tag Passive Tag Active Tag Active Tag
Source
Data Rate Slower Moderate Fast Faster
Ability to read Better Moderate Poor Worse
near metal or
wet surfaces
33. RFID applications
• Manufacturing and Processing
• Supply Chain Management
• Retail
• Security
• Location Tracking
• Traffic movement Control