Security Management Access Control System

Abstract

Authenticating a legitimate user is a trivial task, which is involved in a door lock system, safe lock and also in ATM transactions while accessing bank accounts to secure personal information. Security is a major concern due to large number of criminal and malicious activities. For better understanding let's consider the security feature of an ATM machine which uses the access card along with its PIN for verification. Now this basic level of security provided by the PIN can be enhanced along with fingerprint verification. In the proposed system we have ingrained the Global System for Mobile Communications (GSM) modem that connects to the core controller. It generates a one-time password (four digit) that is sent to the primary user’s mobile number when the user (primary user or secondary user) enrolls the fingerprint. The fingerprints of the secondary user along with the cardholder (primary user) are saved inside the database. Every fingerprint entered is validated by the database. The four digit PIN should be enrolled using a keypad. Further, the transaction is completed on entering the exact information. In case the cardholder is unable to do the transaction the system also provides a facility for fingerprint identification of the nominee. Since biometric features are unique; the proposed system will solve the issue of account security. This system can be designed using ARM7 LPC2148 as a core controller. It also uses SM630 fingerprint module to capture fingerprints, which consists of an optical sensor and DSP processor. This system can be integrated with any application because of the uniqueness provided with fingerprints. Additional convenience is provided with low power requirement alongside portability.

Authors and Affiliations

Ajinkya M. Ghadge, Taruna V. Hingorani

Keywords

Related Articles

Study of Clustering Approach in Data Mining and Machine Knowledge

Data mining alludes to the investigation of the expansive amounts of information that are put away in PCs. Information mining has been called exploratory information examination, not to mention a variety of other things...

PTP Approach in Network Security for Misbehaviour Detection

A PTP approach in network security for misbehaviour detection system present a method for detecting malicious misbehaviour activity within networks. Along with the detection, it also blocks the malicious system within t...

Reduce Handoff Call Drop Rate in Mobile Communication Networks a Survey

In wireless communication networks handoff is used to provide the communication everywhere to moving user. Many researchers proposed various handoff algorithm to reduce call drop rate. These algorithms have many disadva...

A Secure Image and Text Steganography Technique

Steganography is the art or practice of hiding image data or file within another image data or file. The aim of steganography is to insert secret data inside a piece of impressionable information. The outcome of stegano...

slugPower Efficient Location Based Routing

In wireless ad - hoc networks, there are several characteristics different among wired networks. The differences are varying of network topology, limited resources like bandw idth and energy...

Download PDF file
  • EP ID EP21830
  • DOI -
  • Views 300
  • Downloads 5

How To Cite

Ajinkya M. Ghadge, Taruna V. Hingorani (2016). Security Management Access Control System. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(3), -. https://europub.co.uk./articles/-A-21830