Preview

Id System

Powerful Essays
Open Document
Open Document
2843 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Id System
SECURITY I.D.
AND
MONITORING SYSTEM

This thesis addresses the problem of helping the PUNP security system in implementing the deeper meaning of NO I.D. NO ENTRY policy by using this type of I.D. monitoring system. This monitoring system will avoid the bad behavior of some students who are borrowing different I.D. just to enter the PUNP campus and also to monitor the time when the student enters and leaves the campus. This system works by alternate reading of the machine time in and time out only. Otherwise, the system cannot read two or more consecutive of time in or time out. So the bad practice of some students who are giving their I.D. through the fence to another student that forgot their I.D. will not work anymore.

CHAPTER I
INTRODUCTION

BACKGROUND OF THE STUDY

This research study is descriptive and explanatory research endeavor. It seeks to inform the reader about the benefits and advantages of having more convenient and systematic ID system because indeed, high technology and security is related to each other.
Having convenience in all our tasks performed in our daily lives is very helpful using high technology equipment and gadgets. How about attaching this concept in terms of our security measures? The researchers will introduce a type of security system that will help a lot in terms of identifying students, faculties, staffs and visitors using the magnetic stripe card, sometimes called swipe card or magstripe. In many establishments and institutions, they are using stripe card.
The introduction of magnetic stripe based swipe card entry system was the first step in the direction of automatic access control. After that came smart cards and contactless smart cards. For even higher level of security in accessing secured areas, one can implement the biometric-based secure swipe card access systems as well. This project study is based and came from the following technologies that contributed a lot: Magnetic stripe based swipe card syste

You May Also Find These Documents Helpful

  • Powerful Essays

    Dexit is a new electronic payment system that designs for low-value transactions. Based on Radio Frequency Identification (RFID) technology, customers can use a small electronic tag to pay for goods and services without entering password on a specialized reader at the retail stores, which is obviously faster than any other payment methods, such as cash, debit cards and credit cards. With this high reliable and convenient payment system, customers can save much time on waiting queues and eliminate the troubles for carrying loose coins and exact change for small-money purchases. In addition, merchants will also benefit a lot from Dexit to increase their revenues by improving cashier efficiency, decreasing the cash-handing costs, reducing cash counting and depositing charges, as well as avoiding the bothers on checking for counterfeit money.…

    • 3130 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Qr Codes and Nursing

    • 1098 Words
    • 5 Pages

    Originally invented in 1994, by the Denso Wave Corporation in Japan, Quick response codes, or QR codes were intended to for the auto manufacturer Toyota as a means to track vehicles, as well as vehicle parts, during the manufacturing production stages of building their cars. The QR codes were designed to allow Toyota manufactures to identify parts by scanning a two dimensional barcode, or, QR code at high speed. Since its inception in 1994 QR codes have become one of the most popular types of barcode used in Japan. Used primarily through Smart phones, this technology quickly allows consumers to access information contained in the QR code. In recent years the QR barcodes have infiltrated the United States via consumer advertisers and packaging companies. QR codes can be found on direct mail from advertisers, billboards, buses, internet ads, and have even crossed boarders into the healthcare industry (Wikipedia, 2012). Even the Federal Government is adopting the use of QR codes to reduce the risks associated with mistaken personnel identification. The United States Department of Defense has also boosted identification (ID) security of employees by adopting smart ID cards, which are essentially QR codes. Instead of using the traditional ID card with employee photos, the Department of Defense has issued smart ID cards which act much like QR codes, however, they more are more expensive to produce, and require ongoing IT support. Although they are more expensive than a traditional ID card, The Smart ID cards allow for faster verification of personnel, and may ease some of the pressure on security officials who have to use their judgment based on an ID card flashed in their face. With one scan of the QR code, down to the minute, information can be displayed, which includes, authorizations for the employee, or their qualifications and, or credentials. The purpose of this communication is to explain the advantages and disadvantages of participating in a QR code pilot…

    • 1098 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometrics technology aims at utilizing major and distinctive characteristics such as behavioral or biological, for the sake of positively indentifying people. With the help of a combination of hardware and specific identifying sets of rules, a basic human attribute, automated biometric recognition mimics to distinguish and categorize other people as individual and unique. But the challenges surrounding biometrics are great as well.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    The raised letters and numbers on the plastic cards are now rarely used or even read. This then gave rise to “skimming” devices that could be used by some unscrupulous persons to electronically scan and save the information from many customers' cards. Techniques such as "skimming," in which criminals capture card information and personal-identification numbers, have existed for years, often on a small scale. A growing security concern with Skimming devices is the possible release of the user’s personal information or location to unauthorized parties. So, what is now needed is a way to increase the security of payment card use at merchant locations.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    ➢ Augmented security: The reliable rejection of imposters, who might attempt to gain access either by stealing or forging cards or by guessing or fraudulently obtaining passwords, becomes possible.…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Identity Recognition

    • 2203 Words
    • 9 Pages

    This is a personal matter involving values and beliefs that provide a purpose in our lives. While different individuals may have different views of what spiritualism is, it is generally considered to be the search for meaning and purpose in human existence, leading one to strive for a state of harmony with oneself and others while working to balance inner needs with the rest of the world. The National Wellness Institute says spiritual wellness follows the following tenets:…

    • 2203 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    E- Commerce

    • 881 Words
    • 4 Pages

    RFI, radio frequency identification and smart card device are tracking device combined with biometric technologies, such as retina scanners, finger print readers, to track more items and people in many different situation. These technologies are combined with each other and with communication systems that enable companies to communicate and share information with other such as customer demands, consumer behavior, inventory level and etc.…

    • 881 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The proposed study entitled “Parking Monitoring System Using Swipe Machine” will mechanize the recent Parking dilemma of SM Pampanga by providing an automated system that will help supervise the Parking Area. Using the Swipe Card technology, it will solve several problems encountered in a parking area of a mall. The proposed study will be able to provide an automated parking monitoring system that will organize numbered slots and will easily be implemented.…

    • 5710 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Krishnan et al (2004), there is still an on-going investigation research on the selection of efficient hardware that will correspond efficiently with the cryptography and its functions or modules, symmetric encryption and authenticating codes of messages thus improving random number generator which will improve RFID security. Lastly, contactless card readers contains microprocessors and memory that have the capacity to perform cryptographic…

    • 1331 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Smart Cards

    • 1204 Words
    • 5 Pages

    Although they resemble familiar ATM cards, each smart card is equipped with a computer chip instead of a black magnetic strip. Basic designs equipped with memory chips function simply as stored value cards that are loaded with money over the phone or at a cash machine. The cards can then be used to make purchases and pay for telephone calls. More sophisticated smart cards containing actual microprocessors are capable of carrying several different currencies(French francs, Deutsche marks, and British pounds, for example(in different electronic "pockets.”…

    • 1204 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This research paper seeks to study and analyse the Unique Identification Card project to bring out relevant aspects of the project which make it a unique project from Indian perspective, its benefits as also the current challenges/ barriers faced by the Indian government. The paper also seeks to develop a road map for its successful implementation in the Indian scenario.…

    • 616 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Rfid Secure Access

    • 6940 Words
    • 28 Pages

    RFID based Secured access system implemented on 8051 microcontroller . This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with AT89C51 to provide secured access. The relevant messages are also displayed on a 16x2 LCD. RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Keyfobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. In fact access based entrance and exits using access smart technology is rapidly becoming the way of the future for many businesses, government buildings, hospitals, museums and other establishments requiring secured but easy to control access solutions. Access based systems use either 125 kHz RFID or 13.56 MHz RFID readers, cards and keyfobs.…

    • 6940 Words
    • 28 Pages
    Powerful Essays
  • Powerful Essays

    This paper encloses the information regarding the ‘IMAGE PROCESSING’. And discussed one of the major application of image processing ‘BIOMETRICS’. Biometrics technology allows determination and verification of ones identity through physical characteristics. To put it simply, it turns your body in to your password. We discussed various biometric techniques like finger scan, retina scan, facial scan, hand scan etc. Two algorithms have been proposed by taking biometric techniques to authenticate an ATM account holder , enabling a secure ATM by image processing. Biometrics is now applied in various public and private sectors. No doubt, biometrics is going to be next generation’s powerful security tool…!…

    • 2367 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Final year projects

    • 348 Words
    • 2 Pages

    Electro8 AS is a leading supplier of software tools for the embedded and Automation industry. Electro8 offers innovative, user friendly and scalable solutions for companies using embedded systems in their daily operations or in their internal development cycles.…

    • 348 Words
    • 2 Pages
    Satisfactory Essays