USECASE 1:
SMART BADGING
SOLUTION
AGENDA
PROJECT TITLE
DESCRIPTION
OBJECTIVE
PROBLEM STATEMENT
RESEARCH METHODOLOGY
SOLUTION
TAKEAWAYS
SMART BADGING SOLUTION:
DESCRIPTION:
A touchless smart badging solution provides seamless, contactless
access control, allowing employees to enter secured areas without
physical contact, enhancing security and convenience.
OBJECTIVE:
The goal is to implement a secure, efficient, and hygienic access
control system that streamlines entry and exit processes, reduces
unauthorized access, and accurately tracks personnel movement.
PROBLEM STATEMENT:
Traditional access systems requiring physical contact or
proximity can cause hygiene issues and inefficiencies,
especially in high-traffic areas. They may also struggle with
managing multiple entries and preventing unauthorized
access.
To develop a touchless solution addresses these challenges
by offering reliable, contactless access management.
RESEARCH METHODOLOGY
CURRENT IMPLEMENTATION: HID cards are ID cards that use proximity
technology, such as 125 kHz RFID, to enable functions like access control,
public transportation, and employee ID
As this is not touchless integration, after researching the better options from
this, there are three ways like,
1.NFC(near Field Communication)
2.RFID(Radio Frequency Identification)
3.BLE(Bluetooth Low Energy)
Out of this nfc offers more secured way of access control
since,
NFC tends to be more secure than BLE or RFID, as
it operates on a shorter range allowing for a more stable connection.
Therefore, NFC tends to be a better solution for crowded and busy places,
where a lot of different devices are trying to communicate with each other,
creating signal interference.
General Components:
Touchless Access Control Systems
Two of the most effective methods of touchless access control are proximity
readers and touchless exit buttons. Of course, even with a touchless system
like a proximity reader, visitors are still going to have to physically open the
door. Pair a touchless access control system with a door opener and your
visitors will never have to touch a dirty doorknob or latch again.
Proximity Readers
Proximity readers are installed on entryways and can allow or deny access to
visitors. Unlike keypads and biometric scanners, which require physical
touching, these entry devices can read keycards or even smartphones — via
NFC or Bluetooth — to validate visitors from a distance. Simply pull out your
keycard or phone and hold it near (not touching) the sensor. The sensor will
read your credentials and allow access to the building or room.
Touchless Exit Buttons
People who enter your building must also leave at some point. When thinking
about touchless access control, it’s easy to forget that there’s just as much
physical interaction with doors when leaving a building as there is to get in.
Touchless exit buttons work similarly to touchless hand dryers in most
restrooms. Simply wave your hand over the sensor and the door unlocks,
allowing you to exit. It completely removes the necessity to touch a dirty
doorknob or latch. Touchless exit buttons are easy to install and can be used
on both interior and exterior doors.
Door Opener Systems
Even if you have a proximity reader, visitors are still going to have to
physically open the door once they’re granted access. A door opener
system is a type of access control that opens and closes doors mechanically,
without interaction. Visitors simply wave their credentials in front of the
proximity sensor — or their hand for touchless exit buttons — and the door
will automatically open, allowing them to enter or exit without physically
touching anything.
EXPLORED IDEAS FOR TOUCHLESS SMART BADGING
SOLUTIONS:
1.Mobile Credentials
Mobile access control systems use a smartphone application as user
credentials. Administrators assign user IDs within the app. Then, individuals
simply need to wave their smartphones near access control points, where
the phone’s short-range wireless antenna communicates their credentials.
2.Fingerprints
Fingerprints are unique to each individual and stay consistent throughout our
lives. That makes them an easy, permanent biometric record for access
control. A fingerprint reader compares stored print records to the fingerprint
a user scans.
3.Facial Recognition
Facial recognition scanners use pattern-matching software similar to those
used in fingerprint scanners to match the shape of a user’s face against
scanned records. But unlike fingerprint scanners, this is a non-contact form
of biometric authentication. As a result, they are also very difficult for
attackers to bypass.
4.Iris Eye Scans
Much like fingerprints, the irises in a person's eye hold a unique pattern that
remains stable throughout life. A scanner can detect that pattern and match
it against access control records. Iris eye scans are highly accurate and
difficult for an attacker to defeat. They are also fast and easy to use,
scanning from several inches to several feet away in seconds.
5.Retinal Scans
This method employs infrared light to capture and identify the unique
pattern of blood vessels in a person's eye. Retinal scanning is the most
secure form of biometric authentication, with an almost non-existent failure
rate. It's also fast, making it ideal for places with high traffic. However,
certain individuals may find the retinal scanning process somewhat invasive
and uncomfortable.
6.Voice Recognition
Voice recognition access control compares spoken passphrases with high-
quality digital recordings. These systems can be more user-friendly than eye
or facial scanning technologies, which typically need to be installed at a
specific height. Moreover, they require much less user training than other
biometric authentication methods.
7.Swipe Cards
These ID cards come with an embedded magnetic strip that stores
identification information that can be read by swiping through a reader.
Magnetic swipe cards represent the most cost-effective physical token
solution, typically costing only a few cents each. Furthermore, replacement
cards and related materials are readily available .
8.Smart Tokens
Smart tokens have many form factors, including ID cards and key fobs, but
they utilize an embedded computer chip to store credential information
instead of a magnetic strip. The information transferred from the token to
the access control solution is encrypted, which makes this method a
better option in high-threat settings.
9.RFID Tokens
Radio Frequency Identification (RFID) tokens are battery-less.
They operate within a short distance, typically up to 6 inches (15cm). They
are typically small, and RFID readers can scan several tokens at once,
speeding traffic through congested access points.
SOLUTION
IDEA 1:
Use of touchless fingerprint scanners
Touchless Fingerprint Recognition
This is a contactless fingerprint solution scans and verifies through a
fully touchless hand wave gesture.
Requirements
Database containing fingerprints and the necessary details of the
person.
High resolution scanners
MorphoWave™ SP - Simplified Profile
up to 10K user records
simplified user interface via multicolor LED indicators
MorphoWave™ XP - eXtended Performance biometric reader
up to 100K user records in 1 : n mode,
up to 60 people per minute
large color tactile screen for user interaction
work efficiently with wet, dry, dirty hands or even damaged
fingerprints.
Advantages
Fast
The contactless fingerprint solution scans and verifies 16
fingerprints in less than 1 second, through a fully touchless hand wave
gesture.
Accuracy
Secure
No need of Identity Proofs
Unique Identity
Technology
Artificial Intelligence
Fast Searching Algorithms
Company – INDEMIA
Cost
MorphoWave™ Compact SP $2,287.00
MorphoWave™ Compact XP $4,123.00
Reference Link - https://youtu.be/86cK0hXpFUQ?si=ytNIQnlsAPSdlE2w
Research by IIT Bombay and UDAI (Unique Identification Authority of
India)
UIDAI and IIT Bombay have partnered to create a touchless fingerprint
biometric capture system that can capture fingerprints without physical
contact. The system will include built-in liveness detection and support
biometric authentication using multiple fingers simultaneously. In addition,
the technology will be integrated into the Aadhaar ecosystem, making
biometric authentication more accessible and user-friendly.
Idea 2: Use of RFID in smart card (COST EFFECTIVE)
RFID
RFID – Radio Frequency Identification
RFID is a form of wireless communication that make use of
electromagnetic or electrostatic coupling in the radio frequency to uniquely
identify the objects.
The communication between the reader and the tag is one-way. The
reader initiates communication by emitting radio waves, and the tag
responds with the stored data.
Passive RFID
The passive RFID devices do not have in-built power supply, it receives
its power from the reading antenna. The communication happens over a long
range – upto 10 meter with ultrahigh frequency (UHF) band at 865–867 MHz.
Components of RFID device
Coil/Antenna – to receive power from the reader.
Low power chip – to save the ideal data and send the data back to the
reader.
Working
The reader sends a continuous electromagnetic radio frequency for a
specific range to sense any device is nearby.
The reader acts as power source to get data from the device.
When the RFID device detects the frequency, the electromagnetic or
electrostatic coupling takes places which creates negligible amount of
power.
Then data is transferred to the reader to get access.
Advantages
No battery is needed.
No charging is required.
We can send power whenever we need.
Reads faster.
Data Security.
Simultaneous scanning is possible.
Wider Range can be up to 100m – LF/HF/UHF.
Disadvantages
Depends on Reader.
High Cost
Unauthorized people can access.
Other Application
Toll gates
Contactless Payment
Inventory management.
Tracking
Idea 3: Use of face Recognition along with Liveness detection
Face Recognition in smart badging
Face Recognition is a technique used to recognize the people for
verification of their identity to record the attendance and location in the
office.
Challenge of Face Recognition
Photo Attack
Video Attack
Mask Attack
Solution
Liveness Detection or Anti spoofing
This technology verifies a user’s physical presence and ensures they
are not a fake image or video attempting to impersonate someone else.
Algorithms used for Face Recognition
Deep Learning Convolutional Neural Networks (CNNs)
Neural networks are well-suited for image classification tasks. They
learn to extract features from images and use those features to classify
faces into distinct categories.
Computer Vision Algorithms
The algorithm process visual data, enabling the system to detect,
recognize, and verify faces in digital images or videos.
Liveness detection
Motion Based Detection
Analyses the natural facial movements and expressions like
eyeball, eyebrow, etc.
Texture based Detection.
Focuses on the skin’s texture to differentiate human face.
Temperature Detection
Based on the body temperature real human can be identified.
3D Detection
Utilizes depth camera to capture a 3D image of the face and
analyses the presence of depth.
AI/ML Detection
Detects the minute variation in expression, pupil movement, etc.
Technologies used for face detection.
OpenCV
MATLAB
TensorFlow
Neural Networks.
Advantages
Faster verification
Enhances Security
Fraud Prevention
Improves Privacy
Disadvantages
Face occlusion
If a face is hidden by hair, a hat, a hand, glasses, or a scarf, it may
result in a false negative.
Complex background
When many objects are present in an image, face detection’s
accuracy is reduced.
Too many faces
If there is a large number of human faces in an image, face
detection software may have a hard time distinguishing between some of
them.
Low resolution
If an image’s resolution is poor, it is more difficult to detect
faces.
Huge storage requirements
Machine learning technology requires powerful data storage.
Aging
Changes in facial features over time, such as wrinkles or
alterations in face shape, can impact recognition accuracy.
Idea 4: Use of NFC Mobile Phones
NFC
Near Filed Communications
The communication happens over a short range – 0.2 meter with
frequency 13.56 MHz
NFC mobile has one another major advantage i.e. faster connectivity.
It uses inductive coupling (i.e. the absence of manual pairing) which
takes less than one tenth of a second to establish a connection between two
devices.
Unlike Wi-Fi or Bluetooth, NFC’s interaction range is extremely short,
making it ideal for secure, short-range applications.
Principle
The principle of NFC is sending information over radio waves.
Advantages
Low Power consumption
Faster Connectivity
Cost Efficient
Disadvantages
Low data transfer
Short Range
Not Secure
Other Applications
Contactless Payment via Mobile
Watches
Smart Home and office
Handling the edge cases of Security:
1.Tailgating:Using Turnstile for the entrance prevent the unauthorized
person entry. Even inside the office for the restricted areas the protection
can be enabled using the 3D sensor that uses MLI (Modulated Light
Intensity) technology.
Provides the ideal technology to collect images of objects at a distance in
real time.
Unit emits a modulated infrared light that is reflected on the objects in a
given visual field, while an array of specific sensors measure the reflected
light and provides a 3D image of the monitored area. This sensor does not
require two cameras or special processes to generate 3D images.
Refer this: https://www.youtube.com/watch?v=Rh507tqliy0&t=259s
2.Shifting Smart badges:If an employee shift the d cards and tries to
enter into unpermitted area for him/her,it should be prevented by face
recognization or touchless fingerprint approach . Implement Face recognition
only in that area.
Integrating face recognition or touchless fingerprint sensor in specific
secured area,will help to control the unauthorized access and control the
cost.
Final Idea:
Efficient idea: The touchless fingerprint approach proves to be superior to
other methods for several reasons:
Personal Identity Verification: It ensures reliable and precise
identification of individuals.
Convenience: There is no need to carry physical identity proof or
material.
Speed: The process is quick, allowing for efficient verification.
Accuracy: The technology provides highly accurate results, minimizing
errors.
Security: It enhances security by reducing the risk of identity theft
and unauthorized access.
KEY TAKEAWAYS:
Real-World Application: Gained practical knowledge on deploying
touchless smart badging solutions in a corporate environment,
improving both user experience and security.
Cost-Benefit Analysis: Understood the cost implications and benefits
of various access control methods, aiding in selecting the most
effective and economical solution.
Interdisciplinary Collaboration: Learned the importance of
collaboration across different fields such as IT, security, and facility
management to implement effective solutions.
Understanding Access Control Systems: Gained insights into
various access control technologies and their applications, including
NFC, RFID, BLE, and biometric systems.