Loading...
Menu
Ebooks   ➡  Fiction  ➡  Western

ATTENDANCE SYSTEM USING BIOMETRICS AUTHENTICAT ION YARCO COMPANY

p))))))))))<>{color:#351c75;}.

ATTENDANCE

SYSTEM

USING

BIOMETRICS

AUTHENTICAT

ION YARCO

COMPANY

Aisha alsubaie

ATTENDA

NCE

SYSTEM

USING

BIOMETR

ICS AUTHENT

ICATION

YARCO

COMPAN

Y

fingerprint

Aisha alsubaie

Booktype

 

Aisha alsubaie 2

Introduction 2

Marketing management 3

Weakness of using RFIDAuthentication Protocols 5

Pictures 10

footprint 11

Published by Booktype, In many institutions and organization, the attendance is very important factor for various purposes and its one of the important criteria that is to follow for students and organization employees., 28/11/2016

ISBN: booktype:attendance-system-using-biometrics-authentication-yarco-company

© 28/11/2016 Booktype. © All Rights Reserved

This book was created with Booktype.

For more information, please visit: www.booktype.pro

 

Theoretical

[] Introduction

In many institutions and organization, the attendance is very important factor for various purposes and its one of the important criteria that is to follow for students and organization employees. The previous approach in which manually taking and maintains the attendance records was very inconvenient task. After having these issues in mind we develop an automatic attendance system which automates the whole process of taking attendance and maintaining it. We already know about some commonly used biometric techniques are used for objective identification, verification are like iris recognition, voice identification, fingerprint identification, DNA recognition, etc. Biometrics techniques are widely used in various areas like building security, etc. A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin. These are sometimes known as “epidermal ridges” which caused by the underlying interface between the dermal papillae of the dermis A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin. These are sometimes known as “epidermal ridges” which caused by the underlying interface between the dermal papillae of the dermis The term fingerprint is refers impressions transferred from the pad last joint of fingers and thumbs, though fingerprint cards also typically record portions of lower joint areas of the fingers (which are also used to make identifications) [6]. It is believed that no two people have identical fingerprint in world, so the fingerprint verification and identification is most popular way to verify the authenticity or identity of a person wherever the security is a problematic question. The reason for popularity of fingerprint technique is uniqueness of person arises from his behavior; personal characteristics are like, for instance uniqueness, which indicates that each and every fingerprint is unique, different from one other. Universality, that means every person hold the individual characteristics of fingerprint. The three basic patterns of fingerprint ridges are the arch, loop, and whorl:

Yarco Company:

Yarco Company, Inc located in USA, Yarco’s story began in 1923 when two entrepreneurial brothers-in-law, Harry Cohn and Norman Yarmo, saw a need for professional property management services for market-rate apartment buildings. Yarco Company has nearly 1000 employee and distributed on 11 states on USA.

Yarco Company [https://www.yarco.com/aboutyarco.asp]

[] Marketing management

About Yarco

Many employees of Yarco were manually input their time work into tradition paper time sheet s, the payroll department want to collect the attendance from 100 different locations and they want to entered to separated excel sheets. this entire process takes at least weekend to completed.

On the top of that the time sheets were faxed over to the payroll department and were very often hard to read. to make matters even worse, there was no formal review process

put into place to approve all of the timesheets .as a result, all of the timesheets submitted by employees were assumed to be legitimate no matter what, thus further exacerbating the problem of buddy punching.

Yarco co already implement RFID to open the doors for offices mangers its using RFID-Authentication Protocols for authenticate access to open the doors only of mangers offices.

The RFID (radio frequency identification) is a technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, animal, or person

Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and small size that are driving the technology, a tag has limited computational capabilities and resources. These limitations constrain the use of conventional encryption algorithms and security protocols to prevent cloning and counterfeiting of an RFID tag.

the multiple components that are linked to each other in a certain way

(See figure1). The components are:

-tags.

-antenna.

-reader.

RFID tags can be classified based on the power supply to three types:

1. Active RFID tags

Active RFID tags are equipped with an on-board power source (battery) to power the tag’s chip and transmit a signal to a reader’s antenna. The read range (the distance from which the reader can read the tag) can reach (100 M) or more.

1. Passive RFID tags

Passive RFID tags do not include an on-board power source. Instead, they completely depend on the RFID reader as their power source. The read range can reach (3 M). These tags have a small data storage (128 Byte). The life of passive tags is unlimited since they do not include an on-board power source. The passive tags have a low cost.

1. Battery Assisted Passive (BAP) or Semi-passive RFID tags

Semi-passive tags fill the gap between passive tags and active tags. Semi-passive tags are incapable of broadcasting a signal until the RFID reader emits one first. The on-board power source eliminates the need for generating power from the incoming signal, which is why the semi-passive tags

response faster than the passive tags. These tags have a Moderate read range up to (100M).

[] Read only tags

Information of these tags are added during manufacturing and cannot be manipulated, the cost of these tags is low.

1. Write Once Read Many (WORM) tags

Information can be written on these tags only one by the RFID reader, but can be read many times.

1. Read-Write tags

Information of these tags can be updated as required without constraints.

[] RFID reader (interrogator)

The RFID reader is an important component for any RFID system to function. Its task is to read RFID tags wirelessly via antenna. The reader transforms the received signal from the RFID tag into digital information, and then transports the transformed information to a computer system that can utilize it. Indeed, some readers can write information to tags wirelessly through antenna. RFID readers include built in anti-collision processes, which enables the reader to communicate with multiple tags simultaneously.

2.2.1.4 RFID Frequencies

“Radio waves are transmitted as a series of cycles, one after another. “The number of cycles per unit of time is called the frequency. For convenience, frequency is most often measured in cycles per second (cps) or the interchangeable Hertz (Hz).” It is important to taken into account the frequency in which RFID components will communicate.

[] Weakness of using RFIDAuthentication Protocols

Unauthorized tag altering – these attacks can have even worse implications as disabling, for example if the product codes for drugs are exchanged, human lives can become endangered.

Unauthorized tag cloning – tags can be accessed by distant readers and the information gained from them can be used to create a tag that sends identical information upon request. Tag cloning most likely would be used to overcome RFID enabled counterfeit protection. Thus, companies must pay close attention on how to secure their tags against cloning. Otherwise, the tag would be just another component to add for the perfect counterfeit.

Unauthorized tag tracking – these attacks have different goals than the previously mentioned. Instead of attacking the data integrity, tags are used to gather information about their users or owners. A person’s movements or even choices can be analyzed by associating a tags ID with this person and analyzing where and when the tag has been scanned or what other information has been associated with it.

Most of the attacks can be practically prevented if cryptographically secure mutual authentication between the tag and the reader is provided. Security never comes free and adding cryptographically enabled mutual authentication features to a tag will require more calculation power than is available in the cheapest tags, this means once more a cost increase. To reduce the cost to a minimum a crypto algorithm must be selected that is secure enough so that it is not feasible for the attacker to spend his time and energy to crack it.

Suggest system:

Using biometrics to verify identity means using a physical characteristic such as face, voice or fingerprints to authenticate an individual’s claimed identity. Fingerprint matching is by far the most successful biometric technology because of its ease of use, no intrusiveness and reliability. Fingerprints consist of ridges and valleys formed in complex patterns that are unique for every person and thereby provide an optimal verification method. This article discusses two main algorithm families commonly used to recognize fingerprints: minutia based and pattern based matching. These two methods evaluate fingerprint images in different ways; minutia matching compares specific details within the fingerprint ridges while pattern matching compares the overall characteristics of the fingerprints.

The fingerprint using for matching one of this algorithm (Minutia Matching, Pattern Matching, Finger Tec Matching Algorithm) dependent of the device used.

What is the fingerprint?

“A fingerprint is the pattern of ridges and valleys on the surface of a fingerprint. The end points and crossing points of ridges are called minutiae. It is a widely accepted assumption that the minutiae pattern of each finger is unique and does not change during one’s life. Ridge endings are the points where the ridge curve terminates, and bifurcations are where a ridge splits from a single path to two paths at a Y-junction. Figure 5 illustrates an example of a ridge ending and a bifurcation. In this example, the black pixels correspond to the ridges, and the white pixels correspond to the valleys”. [9]

The system’s key parts

Fingerprints Reader

The reader device is considered one of the most important parts in the system. Where the fingerprints reader work is to provide an identification of a unique patterns and ridges in a fingerprint [10].

Database

The purpose of the database is to store various fingerprints in a record inside the database

The system working mechanism

The fingerprint system work is based on two processes:

Registration Process:

Is the process of entering user’s fingerprint to the system for the first time. In this process, the reader scans the fingerprint, and then determines the distinctive characteristics of the fingerprint and then the distinctive characteristics of the fingerprint will be stored in the form of a record in the database.

Verification Process:

This process is aimed to find a matched fingerprint from the database to the entered fingerprint. If a matched fingerprint is found, then the verification process’s result will be (acceptable) otherwise, the result of verification will be (rejected).

Advantaged of using fingerprint system

Advantages

Fingerprint is unique for every person.

Implementation of this system is cheap, easy and accurate.

Fingerprint does not change. Secure to use.

3 – Propose a working plan to improve the situation

To remedy this problem, and to save the company from the bur-gaining costs of payroll processing, we advise Yarco co, to implement VPR into their business.

the company has a VPR system installed at each of their apartment complexes, for a total of more than 100 VPR systems. They also implement a central server that houses all of employee and payroll information and data the benefits that were realized by Yarco as result of implementing VPR technology has been immense:

#
p<>{color:#351c75;}. 1.A 90% increase in efficacy in payroll administration using VPR versususing traditional methods.

#
p<>{color:#351c75;}. Total eliminate of manually entering the time worked for each employeeonto spreadsheets.

#
p<>{color:#351c75;}. A 50% reeducation in the administrative overhead devoted to payrollprocess.

#
p<>{color:#351c75;}. Total wipe out of buddy punching.

#
p<>{color:#351c75;}. A central system with web-based software application that allows staff andmanagement to review payroll records quickly and easily

#
p<>{color:#351c75;}. All that is needed on the part of the employee is their unique vein patterneverything else is calculated very easily and within minutes.

Pictures

h1<>{color:#000;}.

[] footprint

The system working mechanism

The fingerprint system work is based on two processes:

Registration Process:

Is the process of entering user’s fingerprint to the system for the first time. In this process, the reader scans the fingerprint, and then determines the distinctive characteristics of the fingerprint and then the distinctive characteristics of the fingerprint will be stored in the form of a record in the database.

Verification Process:

This process is aimed to find a matched fingerprint from the database to the entered fingerprint. If a matched fingerprint is found, then the verification process’s result will be (acceptable) otherwise, the result of verification will be (rejected).


ATTENDANCE SYSTEM USING BIOMETRICS AUTHENTICAT ION YARCO COMPANY

  • Author: aisha11467
  • Published: 2016-12-15 12:20:35
  • Words: 2176
ATTENDANCE SYSTEM USING BIOMETRICS AUTHENTICAT ION YARCO COMPANY ATTENDANCE SYSTEM USING BIOMETRICS AUTHENTICAT ION YARCO COMPANY