An analytic scheme for fingerprint identification of biometric identification technology for authentication

Source: Internet
Author: User

fingerprint identification technology is the most convenient, reliable, non-invasive and inexpensive solution for the identification of many biometric technologies used in authentication . .

Fingerprints are unique features of the human body, with the characteristics of being portable, unique, non-replicable, absolute confidentiality, and their complexity is sufficient to provide sufficient characteristics for identification; if we want to increase reliability, we just need to register more fingerprints and identify more fingers. Ideal developed a fingerprint module performance excellence, scanning fingerprint speed, the use of very convenient; When you read a fingerprint, the user only needs to contact the finger with the fingerprint, and contact with the fingerprint head directly is the most reliable way to read the human biological characteristics.

Second, Access lock

In daily life, people everywhere must use a variety of access locks. From the control mode of access lock, there are key, password, magnetic card and IC card.

With the improvement of people's living standard, the indispensable equipment of access lock has brought a lot of troubles to life. Everyone has a lost key (or forget) experience, every day to remind themselves to put the key to the brain, a large set of keys for people who want to light is undoubtedly a painful thing ...

And from the current control mode of access locks, there is a certain security risks, keys, passwords and magnetic cards are easy to copy, steal; IC card

The whole sex is higher, but it is also easy to lose. Therefore, now people in the mind of the door lock must have a convenient, safe, beautiful and so on.

Three, fingerprint access control system overview

Access control system is based on modern electronic and information technology, in the building inside and outside the entrance to install smart card Electronic automatic recognition system, through the holding of non-contact cards to the people (or things) in and out of the implementation of the operation of release, rejection, record and other operations of intelligent management system for the door access controls, attendance management, intelligent building Systems, High-security entry and exit management, securities trading management safe and convenient access control, the purpose is to effectively control the entry and exit of personnel (items), and record all the details of access, to achieve the safety management of the entrance and exit.

In the access control system to register a person who has access to the fingerprint of the channel, only fingerprint verification through into, only to enter, the confidential department of access to strict control, to ensure the safety of materials and property. In the backstage access control software to assign the user fingerprint data to the corresponding access control machine, also can upload the access record in real-time, generate access control report, provide the basis for the accident tracing.

Four, fingerprint access control system architecture

4.1 Fingerprint access control system composition

From the core products, fingerprint access control system is composed of ideal fingerprint processing module, user's original controller module, door opener and power supply system.

4.2 Ideal Fingerprint Processing module description

The ideal fingerprint module consists of high-performance digital signal processor DSP, high-capacity flash and 300,000-megapixel color CMOS. Fingerprint terminal product manufacturers do not need to understand the specific principles of fingerprint processing and recognition, only need to directly use the ideal fingerprint module, MCU through the communication interface to send instructions, fingerprint module can complete the corresponding fingerprint input, fingerprint processing, finger spinning verification and fingerprint matching function.

Fingerprint access control system only the original access control system password or IC card verification method to the current fashion fingerprint verification method. Let the user in the case of low investment, do not change any function of their products and improve their performance, greatly improving the cost-effective products.

4.2.1 Fingerprint acquisition Head

The fingerprint acquisition head utilizes the principle of total reflection of miniature prism, and the light source is reflected from the prism to the optical sensor. When a person's fingers are pressed on the surface of the glass, the surface of the miniature prism is changed by the pressure of the ridges and valleys of the fingerprint, and the reflected light is obtained by the miniature prism, and the amount of reflected light depends on the depth of the ridges and valleys pressed on the surface of the glass and the grease between the skin and the glass. The fingerprint image is formed by image preprocessing, digitizing, grayscale processing and image enhancement.

The corresponding technical indicators of the sensor:

① Surface hard Coated glass

② 300,000 megapixel color CMOS

③ sensor resolution 500DPI;

④ sensor surface Anti-impact and anti-destructive ability: 4H pencil in the 20cm range of continuous impact 1000 times without damage.

4.2.2 DSP Board

Communication between 4.2.3 pc and ideal fingerprint processing module

Five, fingerprint access control system features

5.1 Security

The invariance and uniqueness of fingerprints determines that fingerprints are the cheapest and most reliable form of identification , so it is safer to use fingerprints to open doors.

5.2 Accuracy

Users simply tap their fingers to open the door in time and accuracy.

5.3 High stability

Independent continuous operation, good stability.

5.4 Flexibility

Support multi-user, multi-group combination door;

5.5 Scientific Management

Time management, so that the management of more scientific;

5.6 Hints

Do not close the door to remind, power off the alarm function;

5.7 Alarm fingers can be set

If someone is forced to open the door, use the alarm finger to alarm. In order to protect the collective and personal life and property security.

5.8 Remote Control

You can manage it anytime you want.

5.9 System uses hierarchical management: managers and users.

Set up administrative authority in the manager. The user's fingerprint is collected centrally in the central management host and stored in the central management host. According to the user's opening permission, the user fingerprint is transferred to the corresponding access control machine.

Six, the Fingerprint access control system extensibility

The access control machine can be operated either offline or networked. Access management According to the different communication methods can be divided into a networked access control system and non-networked access control system. Networked Intelligent access control system consists of computer, communication converter, card reader, controller, card, electric lock (or infrared to shoot, three-roll brake), according to customer demand can be installed TCP/IP protocol module to solve the large-scale access control system project.

An analytic scheme for fingerprint identification of biometric identification technology for authentication

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.