Security Management Access Control System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Authenticating a legitimate user is a trivial task, which is involved in a door lock system, safe lock and also in ATM transactions while accessing bank accounts to secure personal information. Security is a major concern due to large number of criminal and malicious activities. For better understanding let's consider the security feature of an ATM machine which uses the access card along with its PIN for verification. Now this basic level of security provided by the PIN can be enhanced along with fingerprint verification. In the proposed system we have ingrained the Global System for Mobile Communications (GSM) modem that connects to the core controller. It generates a one-time password (four digit) that is sent to the primary user’s mobile number when the user (primary user or secondary user) enrolls the fingerprint. The fingerprints of the secondary user along with the cardholder (primary user) are saved inside the database. Every fingerprint entered is validated by the database. The four digit PIN should be enrolled using a keypad. Further, the transaction is completed on entering the exact information. In case the cardholder is unable to do the transaction the system also provides a facility for fingerprint identification of the nominee. Since biometric features are unique; the proposed system will solve the issue of account security. This system can be designed using ARM7 LPC2148 as a core controller. It also uses SM630 fingerprint module to capture fingerprints, which consists of an optical sensor and DSP processor. This system can be integrated with any application because of the uniqueness provided with fingerprints. Additional convenience is provided with low power requirement alongside portability.
Authors and Affiliations
Ajinkya M. Ghadge, Taruna V. Hingorani
Prime Numbers and Modular Exponentiation in Encryption and Decryption
The Number theory is one of purest branches of mathematics, but it is also becoming a powerful tool when it comes to computer security. When we shop online, the Number theory helps to protect sensitive data such as cred...
Domain Based Categorization Using Adaptive Preprocessing
As the number users accessing network for various purposes increases and simultaneously size of the Network and Internet traffic increase so, there is need for categorization web pages according to domain for easy acces...
Modified Hill Cipher Based Image Encryption Technique
In the present advancing technology, data transmission of different multimedia like sensitive images, video, text is very important and security plays a dominant role in the fields of medical, commercial and military fi...
A Review - Effect on Strength and Durability Properties of Cement Mortar Replaced By Metakaolin and Flyash as Fine Aggregate
In this paper, the effect of metakaolin and fly ash on strength and durability properties of cement mortar was investigated. Different types of replacement of metakaolin and flyash (0%, 8%, 16%, and 24%) in cement of ce...
Network Security: A Study Using Cryptography Techniques
We are study Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required...