Smart badging solution
Smart badging solution
Smart badging solution
SMART BADGING
SOLUTION
AGENDA
PROJECT TITLE
DESCRIPTION
OBJECTIVE
PROBLEM STATEMENT
RESEARCH METHODOLOGY
SOLUTION
TAKEAWAYS
SMART BADGING SOLUTION:
DESCRIPTION:
OBJECTIVE:
PROBLEM STATEMENT:
RESEARCH METHODOLOGY
CURRENT IMPLEMENTATION: HID cards are ID cards that use proximity
technology, such as 125 kHz RFID, to enable functions like access control,
public transportation, and employee ID
As this is not touchless integration, after researching the better options from
this, there are three ways like,
General Components:
Touchless Access Control Systems
Two of the most effective methods of touchless access control are proximity
readers and touchless exit buttons. Of course, even with a touchless system
like a proximity reader, visitors are still going to have to physically open the
door. Pair a touchless access control system with a door opener and your
visitors will never have to touch a dirty doorknob or latch again.
Proximity Readers
Proximity readers are installed on entryways and can allow or deny access to
visitors. Unlike keypads and biometric scanners, which require physical
touching, these entry devices can read keycards or even smartphones — via
NFC or Bluetooth — to validate visitors from a distance. Simply pull out your
keycard or phone and hold it near (not touching) the sensor. The sensor will
read your credentials and allow access to the building or room.
1.Mobile Credentials
Mobile access control systems use a smartphone application as user
credentials. Administrators assign user IDs within the app. Then, individuals
simply need to wave their smartphones near access control points, where
the phone’s short-range wireless antenna communicates their credentials.
2.Fingerprints
Fingerprints are unique to each individual and stay consistent throughout our
lives. That makes them an easy, permanent biometric record for access
control. A fingerprint reader compares stored print records to the fingerprint
a user scans.
3.Facial Recognition
Facial recognition scanners use pattern-matching software similar to those
used in fingerprint scanners to match the shape of a user’s face against
scanned records. But unlike fingerprint scanners, this is a non-contact form
of biometric authentication. As a result, they are also very difficult for
attackers to bypass.
5.Retinal Scans
This method employs infrared light to capture and identify the unique
pattern of blood vessels in a person's eye. Retinal scanning is the most
secure form of biometric authentication, with an almost non-existent failure
rate. It's also fast, making it ideal for places with high traffic. However,
certain individuals may find the retinal scanning process somewhat invasive
and uncomfortable.
6.Voice Recognition
Voice recognition access control compares spoken passphrases with high-
quality digital recordings. These systems can be more user-friendly than eye
or facial scanning technologies, which typically need to be installed at a
specific height. Moreover, they require much less user training than other
biometric authentication methods.
7.Swipe Cards
These ID cards come with an embedded magnetic strip that stores
identification information that can be read by swiping through a reader.
Magnetic swipe cards represent the most cost-effective physical token
solution, typically costing only a few cents each. Furthermore, replacement
cards and related materials are readily available .
8.Smart Tokens
Smart tokens have many form factors, including ID cards and key fobs, but
they utilize an embedded computer chip to store credential information
instead of a magnetic strip. The information transferred from the token to
the access control solution is encrypted, which makes this method a
better option in high-threat settings.
9.RFID Tokens
Radio Frequency Identification (RFID) tokens are battery-less.
They operate within a short distance, typically up to 6 inches (15cm). They
are typically small, and RFID readers can scan several tokens at once,
speeding traffic through congested access points.
SOLUTION
IDEA 1:
Use of touchless fingerprint scanners
Requirements
Advantages
Fast
Technology
Artificial Intelligence
Fast Searching Algorithms
Company – INDEMIA
Cost
RFID
Passive RFID
The passive RFID devices do not have in-built power supply, it receives
its power from the reading antenna. The communication happens over a long
range – upto 10 meter with ultrahigh frequency (UHF) band at 865–867 MHz.
Working
No battery is needed.
No charging is required.
We can send power whenever we need.
Reads faster.
Data Security.
Simultaneous scanning is possible.
Wider Range can be up to 100m – LF/HF/UHF.
Disadvantages
Depends on Reader.
High Cost
Unauthorized people can access.
Other Application
Toll gates
Contactless Payment
Inventory management.
Tracking
Photo Attack
Video Attack
Mask Attack
Solution
Temperature Detection
3D Detection
AI/ML Detection
OpenCV
MATLAB
TensorFlow
Neural Networks.
Advantages
Faster verification
Enhances Security
Fraud Prevention
Improves Privacy
Disadvantages
Face occlusion
Complex background
When many objects are present in an image, face detection’s
accuracy is reduced.
Too many faces
If there is a large number of human faces in an image, face
detection software may have a hard time distinguishing between some of
them.
Low resolution
If an image’s resolution is poor, it is more difficult to detect
faces.
Huge storage requirements
Machine learning technology requires powerful data storage.
Aging
Changes in facial features over time, such as wrinkles or
alterations in face shape, can impact recognition accuracy.
NFC
NFC mobile has one another major advantage i.e. faster connectivity.
Advantages
Disadvantages
Other Applications
Final Idea:
Efficient idea: The touchless fingerprint approach proves to be superior to
other methods for several reasons:
KEY TAKEAWAYS:
Real-World Application: Gained practical knowledge on deploying
touchless smart badging solutions in a corporate environment,
improving both user experience and security.
Cost-Benefit Analysis: Understood the cost implications and benefits
of various access control methods, aiding in selecting the most
effective and economical solution.
Interdisciplinary Collaboration: Learned the importance of
collaboration across different fields such as IT, security, and facility
management to implement effective solutions.
Understanding Access Control Systems: Gained insights into
various access control technologies and their applications, including
NFC, RFID, BLE, and biometric systems.