Security Management Access Control System

Abstract

Authenticating a legitimate user is a trivial task, which is involved in a door lock system, safe lock and also in ATM transactions while accessing bank accounts to secure personal information. Security is a major concern due to large number of criminal and malicious activities. For better understanding let's consider the security feature of an ATM machine which uses the access card along with its PIN for verification. Now this basic level of security provided by the PIN can be enhanced along with fingerprint verification. In the proposed system we have ingrained the Global System for Mobile Communications (GSM) modem that connects to the core controller. It generates a one-time password (four digit) that is sent to the primary user’s mobile number when the user (primary user or secondary user) enrolls the fingerprint. The fingerprints of the secondary user along with the cardholder (primary user) are saved inside the database. Every fingerprint entered is validated by the database. The four digit PIN should be enrolled using a keypad. Further, the transaction is completed on entering the exact information. In case the cardholder is unable to do the transaction the system also provides a facility for fingerprint identification of the nominee. Since biometric features are unique; the proposed system will solve the issue of account security. This system can be designed using ARM7 LPC2148 as a core controller. It also uses SM630 fingerprint module to capture fingerprints, which consists of an optical sensor and DSP processor. This system can be integrated with any application because of the uniqueness provided with fingerprints. Additional convenience is provided with low power requirement alongside portability.

Authors and Affiliations

Ajinkya M. Ghadge, Taruna V. Hingorani

Keywords

Related Articles

Prime Numbers and Modular Exponentiation in Encryption and Decryption

The Number theory is one of purest branches of mathematics, but it is also becoming a powerful tool when it comes to computer security. When we shop online, the Number theory helps to protect sensitive data such as cred...

Domain Based Categorization Using Adaptive Preprocessing

As the number users accessing network for various purposes increases and simultaneously size of the Network and Internet traffic increase so, there is need for categorization web pages according to domain for easy acces...

Modified Hill Cipher Based Image Encryption Technique

In the present advancing technology, data transmission of different multimedia like sensitive images, video, text is very important and security plays a dominant role in the fields of medical, commercial and military fi...

A Review - Effect on Strength and Durability Properties of Cement Mortar Replaced By Metakaolin and Flyash as Fine Aggregate

In this paper, the effect of metakaolin and fly ash on strength and durability properties of cement mortar was investigated. Different types of replacement of metakaolin and flyash (0%, 8%, 16%, and 24%) in cement of ce...

Network Security: A Study Using Cryptography Techniques

We are study Network Security refers to all hardware and software functions, characteristics, features, operational procedures, accountability, measures, access control, and administrative and management policy required...

Download PDF file
  • EP ID EP21830
  • DOI -
  • Views 319
  • Downloads 5

How To Cite

Ajinkya M. Ghadge, Taruna V. Hingorani (2016). Security Management Access Control System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://europub.co.uk/articles/-A-21830