Smart badging solution

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

USECASE 1:

SMART BADGING
SOLUTION

AGENDA
 PROJECT TITLE
 DESCRIPTION
 OBJECTIVE
 PROBLEM STATEMENT
 RESEARCH METHODOLOGY
 SOLUTION
 TAKEAWAYS
SMART BADGING SOLUTION:
DESCRIPTION:

A touchless smart badging solution provides seamless, contactless


access control, allowing employees to enter secured areas without
physical contact, enhancing security and convenience.

OBJECTIVE:

The goal is to implement a secure, efficient, and hygienic access


control system that streamlines entry and exit processes, reduces
unauthorized access, and accurately tracks personnel movement.

PROBLEM STATEMENT:

 Traditional access systems requiring physical contact or


proximity can cause hygiene issues and inefficiencies,
especially in high-traffic areas. They may also struggle with
managing multiple entries and preventing unauthorized
access.
 To develop a touchless solution addresses these challenges
by offering reliable, contactless access management.

RESEARCH METHODOLOGY
CURRENT IMPLEMENTATION: HID cards are ID cards that use proximity
technology, such as 125 kHz RFID, to enable functions like access control,
public transportation, and employee ID

As this is not touchless integration, after researching the better options from
this, there are three ways like,

1.NFC(near Field Communication)

2.RFID(Radio Frequency Identification)

3.BLE(Bluetooth Low Energy)

Out of this nfc offers more secured way of access control


since,
NFC tends to be more secure than BLE or RFID, as
it operates on a shorter range allowing for a more stable connection.
Therefore, NFC tends to be a better solution for crowded and busy places,
where a lot of different devices are trying to communicate with each other,
creating signal interference.

General Components:
Touchless Access Control Systems
Two of the most effective methods of touchless access control are proximity
readers and touchless exit buttons. Of course, even with a touchless system
like a proximity reader, visitors are still going to have to physically open the
door. Pair a touchless access control system with a door opener and your
visitors will never have to touch a dirty doorknob or latch again.

Proximity Readers
Proximity readers are installed on entryways and can allow or deny access to
visitors. Unlike keypads and biometric scanners, which require physical
touching, these entry devices can read keycards or even smartphones — via
NFC or Bluetooth — to validate visitors from a distance. Simply pull out your
keycard or phone and hold it near (not touching) the sensor. The sensor will
read your credentials and allow access to the building or room.

Touchless Exit Buttons


People who enter your building must also leave at some point. When thinking
about touchless access control, it’s easy to forget that there’s just as much
physical interaction with doors when leaving a building as there is to get in.

Touchless exit buttons work similarly to touchless hand dryers in most


restrooms. Simply wave your hand over the sensor and the door unlocks,
allowing you to exit. It completely removes the necessity to touch a dirty
doorknob or latch. Touchless exit buttons are easy to install and can be used
on both interior and exterior doors.

Door Opener Systems


Even if you have a proximity reader, visitors are still going to have to
physically open the door once they’re granted access. A door opener
system is a type of access control that opens and closes doors mechanically,
without interaction. Visitors simply wave their credentials in front of the
proximity sensor — or their hand for touchless exit buttons — and the door
will automatically open, allowing them to enter or exit without physically
touching anything.
EXPLORED IDEAS FOR TOUCHLESS SMART BADGING
SOLUTIONS:

1.Mobile Credentials
Mobile access control systems use a smartphone application as user
credentials. Administrators assign user IDs within the app. Then, individuals
simply need to wave their smartphones near access control points, where
the phone’s short-range wireless antenna communicates their credentials.

2.Fingerprints
Fingerprints are unique to each individual and stay consistent throughout our
lives. That makes them an easy, permanent biometric record for access
control. A fingerprint reader compares stored print records to the fingerprint
a user scans.

3.Facial Recognition
Facial recognition scanners use pattern-matching software similar to those
used in fingerprint scanners to match the shape of a user’s face against
scanned records. But unlike fingerprint scanners, this is a non-contact form
of biometric authentication. As a result, they are also very difficult for
attackers to bypass.

4.Iris Eye Scans


Much like fingerprints, the irises in a person's eye hold a unique pattern that
remains stable throughout life. A scanner can detect that pattern and match
it against access control records. Iris eye scans are highly accurate and
difficult for an attacker to defeat. They are also fast and easy to use,
scanning from several inches to several feet away in seconds.

5.Retinal Scans
This method employs infrared light to capture and identify the unique
pattern of blood vessels in a person's eye. Retinal scanning is the most
secure form of biometric authentication, with an almost non-existent failure
rate. It's also fast, making it ideal for places with high traffic. However,
certain individuals may find the retinal scanning process somewhat invasive
and uncomfortable.

6.Voice Recognition
Voice recognition access control compares spoken passphrases with high-
quality digital recordings. These systems can be more user-friendly than eye
or facial scanning technologies, which typically need to be installed at a
specific height. Moreover, they require much less user training than other
biometric authentication methods.

7.Swipe Cards
These ID cards come with an embedded magnetic strip that stores
identification information that can be read by swiping through a reader.
Magnetic swipe cards represent the most cost-effective physical token
solution, typically costing only a few cents each. Furthermore, replacement
cards and related materials are readily available .

8.Smart Tokens
Smart tokens have many form factors, including ID cards and key fobs, but
they utilize an embedded computer chip to store credential information
instead of a magnetic strip. The information transferred from the token to
the access control solution is encrypted, which makes this method a
better option in high-threat settings.

9.RFID Tokens
Radio Frequency Identification (RFID) tokens are battery-less.
They operate within a short distance, typically up to 6 inches (15cm). They
are typically small, and RFID readers can scan several tokens at once,
speeding traffic through congested access points.

SOLUTION
IDEA 1:
Use of touchless fingerprint scanners

Touchless Fingerprint Recognition

This is a contactless fingerprint solution scans and verifies through a


fully touchless hand wave gesture.

Requirements

Database containing fingerprints and the necessary details of the


person.
High resolution scanners

 MorphoWave™ SP - Simplified Profile


up to 10K user records

simplified user interface via multicolor LED indicators

 MorphoWave™ XP - eXtended Performance biometric reader

up to 100K user records in 1 : n mode,

up to 60 people per minute

large color tactile screen for user interaction

work efficiently with wet, dry, dirty hands or even damaged


fingerprints.

Advantages

 Fast

The contactless fingerprint solution scans and verifies 16


fingerprints in less than 1 second, through a fully touchless hand wave
gesture.
 Accuracy
 Secure
 No need of Identity Proofs
 Unique Identity

Technology

 Artificial Intelligence
 Fast Searching Algorithms

Company – INDEMIA

 Cost

MorphoWave™ Compact SP $2,287.00

MorphoWave™ Compact XP $4,123.00

Reference Link - https://youtu.be/86cK0hXpFUQ?si=ytNIQnlsAPSdlE2w

Research by IIT Bombay and UDAI (Unique Identification Authority of


India)

UIDAI and IIT Bombay have partnered to create a touchless fingerprint


biometric capture system that can capture fingerprints without physical
contact. The system will include built-in liveness detection and support
biometric authentication using multiple fingers simultaneously. In addition,
the technology will be integrated into the Aadhaar ecosystem, making
biometric authentication more accessible and user-friendly.

Idea 2: Use of RFID in smart card (COST EFFECTIVE)

RFID

RFID – Radio Frequency Identification

RFID is a form of wireless communication that make use of


electromagnetic or electrostatic coupling in the radio frequency to uniquely
identify the objects.
The communication between the reader and the tag is one-way. The
reader initiates communication by emitting radio waves, and the tag
responds with the stored data.

Passive RFID

The passive RFID devices do not have in-built power supply, it receives
its power from the reading antenna. The communication happens over a long
range – upto 10 meter with ultrahigh frequency (UHF) band at 865–867 MHz.

Components of RFID device

 Coil/Antenna – to receive power from the reader.


 Low power chip – to save the ideal data and send the data back to the
reader.

Working

 The reader sends a continuous electromagnetic radio frequency for a


specific range to sense any device is nearby.
 The reader acts as power source to get data from the device.
 When the RFID device detects the frequency, the electromagnetic or
electrostatic coupling takes places which creates negligible amount of
power.
 Then data is transferred to the reader to get access.
Advantages

 No battery is needed.
 No charging is required.
 We can send power whenever we need.
 Reads faster.
 Data Security.
 Simultaneous scanning is possible.
 Wider Range can be up to 100m – LF/HF/UHF.

Disadvantages

 Depends on Reader.
 High Cost
 Unauthorized people can access.

Other Application

 Toll gates
 Contactless Payment
 Inventory management.
 Tracking

Idea 3: Use of face Recognition along with Liveness detection

Face Recognition in smart badging

Face Recognition is a technique used to recognize the people for


verification of their identity to record the attendance and location in the
office.
Challenge of Face Recognition

 Photo Attack
 Video Attack
 Mask Attack

Solution

Liveness Detection or Anti spoofing

This technology verifies a user’s physical presence and ensures they


are not a fake image or video attempting to impersonate someone else.

Algorithms used for Face Recognition

 Deep Learning Convolutional Neural Networks (CNNs)

Neural networks are well-suited for image classification tasks. They


learn to extract features from images and use those features to classify
faces into distinct categories.

 Computer Vision Algorithms

The algorithm process visual data, enabling the system to detect,


recognize, and verify faces in digital images or videos.
Liveness detection

 Motion Based Detection

Analyses the natural facial movements and expressions like


eyeball, eyebrow, etc.

 Texture based Detection.

Focuses on the skin’s texture to differentiate human face.

 Temperature Detection

Based on the body temperature real human can be identified.

 3D Detection

Utilizes depth camera to capture a 3D image of the face and


analyses the presence of depth.

 AI/ML Detection

Detects the minute variation in expression, pupil movement, etc.

Technologies used for face detection.

 OpenCV
 MATLAB
 TensorFlow
 Neural Networks.

Advantages

 Faster verification
 Enhances Security
 Fraud Prevention
 Improves Privacy

Disadvantages
 Face occlusion

If a face is hidden by hair, a hat, a hand, glasses, or a scarf, it may


result in a false negative.

 Complex background
When many objects are present in an image, face detection’s
accuracy is reduced.
 Too many faces
If there is a large number of human faces in an image, face
detection software may have a hard time distinguishing between some of
them.
 Low resolution
If an image’s resolution is poor, it is more difficult to detect
faces.
 Huge storage requirements
Machine learning technology requires powerful data storage.
 Aging
Changes in facial features over time, such as wrinkles or
alterations in face shape, can impact recognition accuracy.

Idea 4: Use of NFC Mobile Phones

NFC

Near Filed Communications

The communication happens over a short range – 0.2 meter with


frequency 13.56 MHz

NFC mobile has one another major advantage i.e. faster connectivity.

It uses inductive coupling (i.e. the absence of manual pairing) which


takes less than one tenth of a second to establish a connection between two
devices.

Unlike Wi-Fi or Bluetooth, NFC’s interaction range is extremely short,


making it ideal for secure, short-range applications.
Principle

The principle of NFC is sending information over radio waves.

Advantages

 Low Power consumption


 Faster Connectivity
 Cost Efficient

Disadvantages

 Low data transfer


 Short Range
 Not Secure

Other Applications

 Contactless Payment via Mobile


 Watches
 Smart Home and office

Handling the edge cases of Security:


1.Tailgating:Using Turnstile for the entrance prevent the unauthorized
person entry. Even inside the office for the restricted areas the protection
can be enabled using the 3D sensor that uses MLI (Modulated Light
Intensity) technology.

Provides the ideal technology to collect images of objects at a distance in


real time.
Unit emits a modulated infrared light that is reflected on the objects in a
given visual field, while an array of specific sensors measure the reflected
light and provides a 3D image of the monitored area. This sensor does not
require two cameras or special processes to generate 3D images.

Refer this: https://www.youtube.com/watch?v=Rh507tqliy0&t=259s

2.Shifting Smart badges:If an employee shift the d cards and tries to


enter into unpermitted area for him/her,it should be prevented by face
recognization or touchless fingerprint approach . Implement Face recognition
only in that area.

Integrating face recognition or touchless fingerprint sensor in specific


secured area,will help to control the unauthorized access and control the
cost.

Final Idea:
Efficient idea: The touchless fingerprint approach proves to be superior to
other methods for several reasons:

 Personal Identity Verification: It ensures reliable and precise


identification of individuals.
 Convenience: There is no need to carry physical identity proof or
material.
 Speed: The process is quick, allowing for efficient verification.
 Accuracy: The technology provides highly accurate results, minimizing
errors.
 Security: It enhances security by reducing the risk of identity theft
and unauthorized access.

KEY TAKEAWAYS:
 Real-World Application: Gained practical knowledge on deploying
touchless smart badging solutions in a corporate environment,
improving both user experience and security.
 Cost-Benefit Analysis: Understood the cost implications and benefits
of various access control methods, aiding in selecting the most
effective and economical solution.
 Interdisciplinary Collaboration: Learned the importance of
collaboration across different fields such as IT, security, and facility
management to implement effective solutions.
 Understanding Access Control Systems: Gained insights into
various access control technologies and their applications, including
NFC, RFID, BLE, and biometric systems.

You might also like