Rfid with Bio-Smart Card in Linux



Download 6.56 Kb.
Date09.01.2017
Size6.56 Kb.
#8283

RFID with Bio-Smart Card in Linux

Asst. Prof. D. B. Kulkarni Suhas A Desai


Department Of Computer Science And Engineering,

Walchand College Of Engineering, Sangli, MS, India.


d_b_kulkarni@yahoo.com suhas_swan@yahoo.com

Abstract
Design and implementation of Linux based RF smart card protocol and application software is for providing biometrics security to identify employee in secured area. Use of Linux platform plays vital role in industrial premises with customization of infrastructure and highly encouraged networking solutions. RF ACCESS smart card is highly acceptable, reliable for reading and maintains entire database solutions on feasible Linux networks.

RF personalizer is to read and write in memory. The reader uses contactless smart card for its operation. The RF ACCESS Smart security Controller is ideal for rugged use at industrial premises. The RF ACCESS Smart Security Controller is accompanied with application Software developed on Linux platform in Java technology. Protocol designed allows the administrator to set various parameters of the Smart Security Controller like real time clock, PIN option, alarm options and reader delays. This protocol can upload card transaction data saved in the reader memory, access keyset to the reader and other operational data of the reader.


Card memory structure consists of 8 Kbit EEPROM memories and organized in securely separated 16 sectors supporting multiapplication use. Access to memory zones is flexible, user definable by a variety of access conditions.
For restricting in secured area and access the appropriate functionality for employees in infrastructure, biometrics security with their PIN and fingerprint recognition with RF ACCESS smart card are having provisions to read/write smart card. Appropriate functionality to employee will distribute by scheduler itself on screen. With biometric secured identification, information systems can cluster work. Java Technology made protocol can avail also for windows clients. In SSH, SSL, IPsec key is simply stored in a file on disk. Usually a key derived from a pass phrase provided by the user. With smart cards, we have a limited number of attempts to get the PIN right or either PIN will block by smart card itself to avoid misuse. Contactless smart cards with high communication speeds have enough memory to store a unique fingerprint template.
Having a smart ID device, which supports exiting authentication infrastructures and which can compare the biometric at the point of interaction, allows much more flexible identity authentication with less impact on privacy. A combined smart card and biometrics ID system also delivers the highest security, supporting two-factor authentication. A biometric template is an encrypted hash of the actual biometric itself. These smart cards have sufficient on-card memory to store these templates. Systems that can tolerate some degree of acceptable risk may instead support periodic updates to a list of revoked cards stored in the local readers. Security and information system implemented having two phases, biometric sensor for security and smart card for specifying instruction, information to maintain database server and details.
Download 6.56 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2024
send message

    Main page