Security Management Access Control System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Authenticating a legitimate user is a trivial task, which is involved in a door lock system, safe lock and also in ATM transactions while accessing bank accounts to secure personal information. Security is a major concern due to large number of criminal and malicious activities. For better understanding let's consider the security feature of an ATM machine which uses the access card along with its PIN for verification. Now this basic level of security provided by the PIN can be enhanced along with fingerprint verification. In the proposed system we have ingrained the Global System for Mobile Communications (GSM) modem that connects to the core controller. It generates a one-time password (four digit) that is sent to the primary user’s mobile number when the user (primary user or secondary user) enrolls the fingerprint. The fingerprints of the secondary user along with the cardholder (primary user) are saved inside the database. Every fingerprint entered is validated by the database. The four digit PIN should be enrolled using a keypad. Further, the transaction is completed on entering the exact information. In case the cardholder is unable to do the transaction the system also provides a facility for fingerprint identification of the nominee. Since biometric features are unique; the proposed system will solve the issue of account security. This system can be designed using ARM7 LPC2148 as a core controller. It also uses SM630 fingerprint module to capture fingerprints, which consists of an optical sensor and DSP processor. This system can be integrated with any application because of the uniqueness provided with fingerprints. Additional convenience is provided with low power requirement alongside portability.
Authors and Affiliations
Ajinkya M. Ghadge, Taruna V. Hingorani
Designing Parameters and Study of 8 KW Solar PV Grid Connected System (A Case Study)
The purpose of this paper is to provide the real information about 8KW Solar Photo Voltaic System. The conventional energy sources like coal, petroleum and fossil fuels are limited in nature. About 55% of energy is prod...
ASelf or Manual Destruction of Data and its Secure Migration among Different Clouds
As user’s store personal information in cloud, the information in cloud must be such that it is available at any point of time for different purposes. However, in a cloud-wide storage network, the servers are easily und...
slugComparison between the best online suites
The battle to be the best online suite in the cloud has never been more hotly contested. It’s not as straightforward as it seems either. This paper gives the introduction to Office Software Suite, core feature, cloud i...
Immobilization of Lead Contaminated Low Plastic Clay
We Indians are living in an age of industrialism where our soils may become contaminated by the accumulation of heavy metals through emissions from the rapidly expanding industrial areas, land application of fertilizers...
Providing Virtual Servers of Amazon EC2 through Parallels
Amazon Elastic Compute Cloud is a web service that provides virtual servers in the cloud. This package allows resellers to offer Amazon EC2 instances through parallel PA server. The end users can select from available E...