Security Management Access Control System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Authenticating a legitimate user is a trivial task, which is involved in a door lock system, safe lock and also in ATM transactions while accessing bank accounts to secure personal information. Security is a major concern due to large number of criminal and malicious activities. For better understanding let's consider the security feature of an ATM machine which uses the access card along with its PIN for verification. Now this basic level of security provided by the PIN can be enhanced along with fingerprint verification. In the proposed system we have ingrained the Global System for Mobile Communications (GSM) modem that connects to the core controller. It generates a one-time password (four digit) that is sent to the primary user’s mobile number when the user (primary user or secondary user) enrolls the fingerprint. The fingerprints of the secondary user along with the cardholder (primary user) are saved inside the database. Every fingerprint entered is validated by the database. The four digit PIN should be enrolled using a keypad. Further, the transaction is completed on entering the exact information. In case the cardholder is unable to do the transaction the system also provides a facility for fingerprint identification of the nominee. Since biometric features are unique; the proposed system will solve the issue of account security. This system can be designed using ARM7 LPC2148 as a core controller. It also uses SM630 fingerprint module to capture fingerprints, which consists of an optical sensor and DSP processor. This system can be integrated with any application because of the uniqueness provided with fingerprints. Additional convenience is provided with low power requirement alongside portability.
Authors and Affiliations
Ajinkya M. Ghadge, Taruna V. Hingorani
Securing Operating System
One of the fundamental concerns in the security of cyberspace and e-commerce is the security of operating systems that are the core piece of software running in all information systems, such as network devices (routers,...
Impact of Mechanical Properties & Microstructures on Aluminium Alloys (aa6061- aa7075) by using Friction Ftir Welding Process
Recently many reports on Friction Stir Welding (FSW) of various dissimilar systems such as Aluminium alloys AA6061 and AA7075, has been reported. FSW of Aluminium alloys has captured important attention from manufacturi...
Assessment of Works under Jalyukta Shivar Campaign – A Case Study of Pusad Region
JYS is the Government of Maharashtra’s program to provide water for all and make villages scarcity-free. Maharashtra has been witnessing increasing agricultural and drinking water stress in recent years. Maharashtra gov...
To maintain data consistency in Cooperative Caching Based Energy Efficient Protocol in WSN
A sensor node commonly consists of sensors, actuators, memory, a processor and they also have communication ability. There is an issue of energy efficiency in Wireless Sensor Networks. First of all cooperative caching i...
Efficient Filteration of Unwanted Messages in Social Networking Sites
Social networking sites that facilitate communication of information between users allow users to post messages as an important function. Unnecessary posts could spam a user’s wall, which is the page where posts are dis...