Microprocessor control system for enterprise access

Students Name: Maksymets Bohdan Myroslavovych
Qualification Level: magister
Speciality: Computer Systems and Networks
Institute: Institute of Computer Technologies, Automation and Metrology
Mode of Study: full
Academic Year: 2021-2022 н.р.
Language of Defence: англійська
Abstract: Access control and management system (abbreviated ACS or ACS) is a set of hardware and software that regulates the entry/exit and movement of people or vehicles in protected areas for administrative monitoring and prevention of unauthorized intrusion. [1] Such systems are divided into: Network systems, Autonomous systems, Biometric systems. Areas of application of ACS are different: • company offices, business centers; • banks; • schools, technicians, universities; • parking lots, parking lots; • Private houses, residential complexes; • hotels; • public institutions Radio Frequency Identification (RFID) is a technology for contactless identification of objects using a radio frequency communication channel. RFID consists of two components: a transponder (label) and a card reader (receiver). Predecessors of modern RFID-tags appeared in the middle of the XX century in the development of technologies for transmission and recognition of signals in the military sphere [3]: 1973 - The first demonstration of modern RFID chips (915 MHz and 12-bit tags) at the Los Alamos Research Laboratory, USA; 1983 - The first patent for RFID is issued in the United States. Depending on the type of power RFID-tags are divided into [3]: Passive - transponders with an identification number without a built-in power source, transmit the signal by modulating the reflected carrier signal. The range of such labels is from 1 centimeter to 2 meters. Active - transponders of increased size with their own power supply, which do not depend on the energy of the meter and can be read at a distance of up to 300 meters. Active labels can generate a stronger output signal, and can be used not only in air but also in water, in human and animal bodies, in metals (ship containers, cars). Their disadvantage is the high price and limited operating time (up to 10 years), due to the installation of their own batteries. Semi-passive - small chips with their own battery. Their range depends only on the sensitivity of the receiver. By type of memory used [3]: RO (Read Only), data is recorded immediately at the time of manufacture. Such labels can only be used for identification and are virtually impossible to falsify; WORM (Write Once Read Many) - they have a unique identifier, they also contain a block of recordable memory; RW (Read and Write) - transponders with ID and memory block for multiple viewing and writing data. According to the operating frequencies RFID-tags are divided into [3]: Low frequency LF (125-134 kHz, standard ISO / IEC 18000-2: 2009) - passive systems are often used for subcutaneous chipping of animals. High-frequency HF (13.56 MHz, ISO / IEC 18000-3: 2010) - cheap, without environmental and licensing problems, supported by ISO 14443, have a wide range of solutions. Used in payment systems, logistics, identification Ultra-high frequency UHF (860-960 MHz, ISO / IEC 18000-63 (C)) is a powerful anti-collision mechanism that allows you to work over long distances. Fingerprint sensors These sensors include a DSP chip that processes the image, making the necessary calculations to match the recorded and current data. Inexpensive fingerprint sensors can hold up to 162 different fingerprints. All fingerprint scanners can be fooled by techniques that include fingerprinting, photo processing with special software, and printing copies of fingerprints with a 3D printer. [4] The method of capturing a fingerprint image depends on the type of scanner used: Optical sensor: These types of scanners mostly make a photocopy of your finger. Are quite common in the market. Capacitive sensor: Scanners use electricity instead of light to determine the fingerprint image. When the finger touches the touch surface, the device measures the charge; ridges show a change in capacity, and valleys do not change. Most smartphones with fingerprint scanners use capacitive sensors. Ultrasonic sensor: ultrasonic scanners work through sound waves. The ridges and valleys of the finger pattern reflect sound differently, such as ultrasound scanners, which can create a detailed 3D fingerprint map. Ultrasonic sensors are currently only tested on mobile devices. Benefits of fingerprint identification Constant characteristic. Fingerprints do not change over time and remain a permanent human signature. Uniqueness. Unlike traditional authentication methods, such as cards and passwords, a fingerprint is unique to each person and cannot be stolen or lost. Ease of banning resource sharing. Users cannot transfer their "passwords". Users do not need to worry about losing the key. The disadvantages are Insufficiently high accuracy and speed of work. Problems with registration of disabled people. People with physical disabilities or finger injuries may have problems with authentication. Dependence on noise caused by dirt and cuts. Authentication performance is highly dependent on fingerprint image quality. Short service life of sensors. Optical sensors have a short service life (approximately one year) and require constant maintenance (regular cleaning). Violation of user privacy. Fingerprint can be considered as personal information and confidential data. [2] Object of research - Access control and management system Subject of research - Features of RFID technology and fingerprint scanning technology. The purpose of the study - To develop a system of access control to the enterprise based on RFID and biometric identification Keywords - ACS, RFID, biometric scanner As a result of research, modern access systems and access control, their types. Types of readers, principles of their work and their features were considered. List of used literature sources. Wikipedia.org. (2021). Access control. [online] Available at: https://uk.wikipedia.org/wiki/Система_контролю_і_управління_доступом.(In Ukrainian) Dneprsecurity.com (2021) How does a fingerprint scanner work and why is it the future?[online] Available at: https://dneprsecurity.com/statji/kak-rabotaet-skaner-otpechatkov-palcev-i-pochemu-za-nim-budushhee.html Wikipedia.org. (2021). RFID [online] https://en.wikipedia.org/wiki/Radio-frequency_identification Forbes.com (2019) Hackers Claim Any[online] Available at: https://www.forbes.com/sites/daveywinder/2019/11/02/smartphone-security-alert-as-hackers-claim-any-fingerprint-lock-broken-in-20-minutes/?sh=5b9269f76853