0% found this document useful (0 votes)
20 views27 pages

Fingerprint Slide

Uploaded by

Unyime Eduok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views27 pages

Fingerprint Slide

Uploaded by

Unyime Eduok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

DESIGN AND IMPLEMENTATION OF A

MULTIFACTOR AUTHENTICATION DOOR


LOCK SYSTEM

BY

ARIKEWUYO, BOLANLE KAWTHAR 20/0630


EDUOK, UNYIME ANIEKAN 20/1084
EKOI, OTUEKONG 20/3418

SUPERVISED BY: DR. KUYORO SHADE


OUTLINE
• I.) INTRODUCTION
• II.) HOW IT WORKS
• III.) BENEFITS OF MULTIFACTOR
AUTHENTICATION DOOR LOCKS
• IV.) IMPLEMENTATION CONSIDERATIONS
• V.) REAL-WORLD APPLICATIONS
• VI.) CONCLUSION
• VII.) Q&A SESSION
BACKGROUND OF STUDY
Multifactor Authentication Door Lock System Overview of the problem of traditional door
locks being vulnerable to various threats Description of common types of traditional door
locks and their limitations.
Introduction of the multifactor authentication door lock system and its different
authentication factors Overview of existing research on the effectiveness of multifactor
authentication door locks Benefits of multifactor authentication door locks, including
increased security and customization options.
Implementation considerations, including cost, feasibility, and user training Call to action
for implementing multifactor authentication door locks to address the limitations and
vulnerabilities of traditional door locks.
STATEMENT OF THE PROBLEM

 The general trend of human nature is always longing for security


physically, mentally and socially. Fingerprint based security
access control and time attendance systems are used for all kinds
of office and service sector operations in the day-to-day
environment (Ibrahim and Zin, 2011).

 However, loopholes have ensued as a result of incessant hackings


all through the years and fingerprint based door lock systems are
getting susceptible to glitches, hence, the need to allay people’s
fear and construct the feature of getting a notification on one’s
mobile phone if an unauthorized person attempts to intrude or
place their fingers on the fingerprint sensors.
AIMS AND OBJECTIVES

 The Aim of this project is to construct a fingerprint-based door


lock system with multi-factor authentication

The specific objectives are to:

 To develop a secure locking system based on fingerprint scanning


with an interface circuit used for opening and closing lock, based
on finger print which is stored in the microcontroller itself.

 To implement the feature of getting a notification on one’s mobile


phone if an unauthorized person attempts to intrude or place their
fingers on the fingerprint sensors.
SIGNIFICANCE OF THE STUDY

 The fingerprint door lock system with


multifactor authentication is proposed mainly
for beefing up security and as a needed and
necessary upgrade to the current available
system.

 The presence of the notification feature will


help the personnel of this to have absolute
access to the building. It is also designed to
help the engineers in the future to perform
maintenance and upgrading work easily.
REVIEW OF RELATED WORKS

 Biometrics, from the Ancient Greek bios and metron, denotes the
recognizing of humans on the basis of intrinsic physical or behavioural
traits. Biometric systems differ from more traditional forms of security
by identifying the body alongside knowledge or possession tokens, such
as passwords or documents (Mohd, 2020).

 By the 2000s, hundreds of biometric authentication recognition


algorithms were functional and patented within the USA. Biometrics
were no longer being implemented in just large corporation or a
government setting. They were sold in commercial products (BC, 2021).

 Study of fingerprints for recognition and identification of the individuals


is scientifically called Dactylography. The main advantage of the
fingerprint recognition method is that each person has a unique
fingerprint pattern that remains the same and never changes
throughout life (Andrew and AP, 2018).
REVIEW OF RELATED WORKS

 Fingerprint scanner used in Azzad (2018), during experimental work, the


elements considered were the illumination and humans sweat that may appear
on an individual’s finger. Implementing the fingerprint scanner produce a less
time-consuming system as it can easily sense human fingerprint with a much
higher percentage of accuracy which is 70%.

 The benefit of using fingerprint scanner was also said by Zhu et al. (2019) in
their journal that fingerprint-verification overcome the issue of losing ID card
where in their project is car keys.

 Shoewu et al. (2019) explore the concept of Biometric Fingerprint and Iris
Recognition Technology for smart homes. Multi-biometrics system was
employed to enforce reliability.

 Hashem et al. (2020) worked on finger-vein-authentication as a method to


ensure security to life and property. Two applications were demonstrated for
door-access control. The techniques require users who want to access the door
to have identity number.
REVIEW OF RELATED WORKS CONT’D

AN OVERVIEW OF AN EXISTING SYSTEM USING ARDUINO UNO ATMEGA328P

Source: (AMMB, 2012)


METHODOLOGY

 Main blocks of this project are Microcontroller, Fingerprint


module, Buzzer, Relay, Keypad, LCD display and Motor. User
has to place his or her finger on the optical sensor part of
fingerprint module after which a notification is sent to the
customized user’s smart phone. We have seen Password
based security system RFID based security system.

 The main feature or specialty of fingerprint is that it is


unique. It gives this project the high-level security than other
security systems
IMPLEMENTATION
While implementing our multifactor authentication door lock
system, we conducted a security assessment to identify
potential vulnerabilities and risks. The system incorporates
multiple authentication factors, including fingerprint,
password, RFID, and SMS alert features, to prevent
unauthorized access. The system will use a fingerprint
scanner to authenticate users based on their unique biometric
data.
IMPLEMENTATION
Users will also be required to enter a password to further
authenticate their identity. An RFID card reader will be used
to verify the user's access level and grant access to authorized
individuals.
In case of a security breach or unauthorized access attempt,
an SMS alert feature will be activated to notify the system
administrator of the potential threat.
BLOCK DIAGRAM
COUPLING THE DEVICE
PLACE FINGERPRINT
ENTER PASSWORD
PLACE RFID CARD
NOTIFICATION ALERT
IMPLEMENTATION

The system was installed and configured properly, with all


necessary software and hardware components integrated
seamlessly. Several testing phases were conducted to ensure
the system is working as intended, with all authentication
factors functioning properly. System administrators and users
will be trained on how to use the system effectively and
securely.
IMPLEMENTATION
Finally, ongoing monitoring and maintenance will be required to
ensure the system continues to function properly and to detect
and address any potential issues or threats. By implementing a
multifactor authentication door lock system that includes
fingerprint, password, RFID, and SMS alert features, businesses
and individuals can significantly improve their security posture
and reduce the risk of security breaches and threats to their assets
and information.
AT COMPLETION
CONCLUSION
In conclusion, implementing a multifactor authentication door lock system
can provide a significant increase in security for both individuals and
businesses. The use of multiple authentication factors such as biometrics,
passwords, and smart cards can help to prevent unauthorized access, protect
sensitive data, and mitigate the risk of security breaches. However, it is
important to carefully consider the different factors involved in
implementing such a system, such as cost, planning, and maintenance, to
ensure that it is implemented effectively and efficiently.
RECOMMENDATION
Based on the benefits of multifactor authentication door lock systems and
the potential risks of not implementing them, we highly recommend that
businesses and individuals take action to implement such a system to protect
themselves against security breaches and threats. It is important to conduct a
security assessment to identify potential vulnerabilities, choose the right
system based on individual or business needs, plan for implementation
carefully, including creating a budget and resource plan, install and
configure the system properly, and monitor and maintain the system to
ensure continued security and functionality.
REFERENCES

Adafruit products (AP) (2012). http://www.adafruit.com/products/751 (Accessed 25 Oct, 2022).

Andrew, B. (2012). Comparing fingerprint. http://www.uh.edu/engines/epi2529.htm (Accessed 25 Oct,


2022).

Arduino Mega2560 Microcontroller Board (AMMB) (2012).


http://members.home.nl/bzijlstra/software/examples/wiz830/wiz830mj.htm (Accessed 25 Oct, 2022).

Azzad, F. Z. (2008). Electronic Combination Lock Using PIC, Final Year Project Report, Universiti
Teknikal Melaka.

Bioconnect. (2021). A brief history of biometrics. http:///FINGERPRINT/A%20Brief%20History%20of


%20Biometrics%20_%20BioConnect.mhtml. (Accessed 25 0ctober 2022)

Hashem, A., Yahya, A., Mohammed, A. and Mohammed, A. (2020). Enhanced Security Methods of
Door Locking Based Fingerprint. International Journal of Innovative Technology and Exploring
Engineering, 9(3): 2278-3075.
REFERENCES

Ibrahim, R. and Zin, Z. M. (2011). Study of automated face recognition system for office door access
control application, Communication Software and Networks (ICCSN), IEEE 3rd International
Conference, pp. 132-136.

Mohd, S.S. (2005). Prototype Security Door Access System. An M.sc thesis, Faculty of Computer
Science and Information Technology, University Pura Malaysia.
http://psasir.upm.edu.my/id/eprint/5861/1/FSKTM_2005_10(1-24).pdf (Accessed 25 Oct, 2022).

Shoewu, O, Olaniyi, O.M. and Lawson, A. (2011). Embedded Computer-Based Lecture Attendance
Management System. African Journal of Computing and ICT, 4(3): 27-36.

Zhu, Z. and Chen, F. (2011). Fingerprint recognition-based access controlling system for
automobiles, Image and Signal Processing (CISP), 4th International Congress, 4: 1899-1902.
QUESTION AND
ANSWER SESSION
THANKS FOR LISTENING

You might also like