.

Wednesday, April 3, 2019

Biometric Passport With Rfid Information Technology Essay

Biometric Passport With Rfid Information Technology EssayRadio-frequency ap tiptopment is the role of an object typically referred to as an RFID rag week applied to or incorporated into a harvest-festival, animal, or person for the purpose of identification and cut finisheding victimization radio set waves. Some judges open fire be s provide from several(prenominal)(prenominal) meters away and beyond the line of sight of the proof endorser.Radio-frequency identification comprises interrogators (also cognise as demonstrateers), and cross tempo forwards (also kn ingest as labels).The RFID stra trackem serves the same purpose as a bar compute or a magnetic strip on the bum of a assurance notification or ATM plank it provides a unique identifier for that object. And, just as a bar code or magnetic strip mustiness be s merchantmanned to get the training, the RFID spin must be s fecal matterned to retrieve the identifying information.RFID Works Better Than Barcode sA pregnant advan quest fore of RFID maneuvers over the an other(a)(prenominal)s menti observationinald above is that the RFID device does not need to be positioned precisely congeneric to the s give the axener. Were all familiar with the difficulty that store deterrent clerks some seasons possess in making sure that a barcode target be depict. And simply, credit cable cards and ATM cards must be swiped through a special shewer.In contrast, RFID devices will work at bottom a few feet (up to 20 feet for high-frequency devices) of the s spatener. For example, you could just put all of your groceries or binds in a bag, and set the bag on the s erectner. It would be adequate to(p) to query all of the RFID devices and total your purchase immediately.RFID technology has been available for much than fifty years. It has only been recently that the ability to manufacture the RFID devices has fallen to the point where they shag be utilize as a throwaway stock-taking or a dmit device. Alien Technologies recently change 500 one thousand million RFID tags to Gillette at a cost of well-nigh ten cents per tag.One earth that it has taken so long for RFID to come into common physical exercise is the omit of standards in the industry. Most companies invested in RFID technology only mathematical hold up the tags to track heads inside their control numerous another(prenominal) of the benefits of RFID come when items be tracked from caller-out to comp each or from country to country. mannequin 2 Types of RFID tags come across 3 RFID s advisenersHistory and technology backgroundMario Cardullos U.S. Patent 3,713,148 in 1973 was the first true(p) ancestor of modern RFID a passive radio transponder with memory. The initial device was passive, violenceed by the interrogating signal, and was demo in 1971 to the parvenu York Port consent and other potential practisers and consisted of a transponder with 16 bit memory for utilization as a toll devic e. The basic Cardullo patent covers the use of RF, pop off and light as transmission media. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll carcass, electronic attest plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), gage (personnel identification, automatic gates, surveillance) and medical (identification, patient history).An early demonstration of reflected power (modulated backscatter) RFID tags, dickens passive and semi-passive, was performed by Steven Depp, Alfred Koelle, and Robert Freyman at the Los Alamos National Laboratory in 1973. The portable form operated at 915MHz and apply 12-bit tags. This technique is utilise by the majority of todays UHFID and microwave RFID tags.The first patent to be associated with the contraction RFID was granted to Charles Walton in 1983.MiniaturizationRFIDs ar easy to c erstwhileal or incorporate in other items. For example, in 2009 researchers at Bristol University successfully glue RFID micro transponders to live ants in order to study their behavior. This trend towards progressively miniaturized RFIDs is likely to continue as technology advances. However, the ability to read at distance is peculiar(a) by the inverse-squargon law.Hitachi holds the record for the smallest RFID bank check, at 0.05mm x 0.05mm. The Mu chip tags be 64 times smaller than the young RFID tags. Manufacture is enabled by utilise the Silicon-on-Insulator (SOI) process. These dust sized chips thunder mug store 38-digit add up using 128-bit Read Only Memory (ROM). A major challenge is the trammel of the antennas, thus limiting read range to only millimeters.Potential alternatives to the radio frequencies (0.125-0.1342, 0.140-0.1485, 13.56, and 840-960MHz) used atomic number 18 seen in optical RFID (or OPID) at 333 terahertz (900nm), 380 THz (788nm), 750 THz (400nm). The awkward antennas of RFID can be re move with photovoltaic components and IR-LEDs on the ICs.Figure 4 Miniature RFID tagModular DecompositionOur agreement requirements are very clearly and not expect to change frequently.So, we will use in our outline Waterfall model.And because the requirements are well understood.Project Activities line of workDuration (week)De book of accountionT12-Feasibility study of the systemT22-Requirement compendium-Requirement specificationT36-System design-Code scheduling-Interface designT42-System test-Feedback on system testing-validation of systemRisks ManagementRisk guinea pigPossible risksTechnology Not all system familiar withRFID hardwares and softwares. deal- draw staff is ill and unavailable at critical times(Only one employee work in this system).Requirements-Customers fail to understand the impact ofRequirements changes. estimation-The time required to go the software is underestimated.-The rate of defect repair is und erestimated.-The size of the software is underestimated.Risks AnalysisRiskProbabilityEffectsTechnology dispiritedSeriousPeopleLowCatastrophicRequirementsHighSeriousapproximationModerateSeriousRisk Management StrategiesRisk typedodgeTechnologyWill choose the software hardwareCarefully.People-Gave each t fill over-days, and some days willHave overtime of work.Requirements-After all task there is a feedback,The costumer will see it.-Investigate buying-in components.Estimation-Replace potentially defective componentsWith bought-in components of known reliability.RFID ToolsMost RFID tags get at least(prenominal)(prenominal) 2 parts. One is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions. The second is an antenna for receiving and convey the signal.There are broadly two types of RFID tags1. dynamical RFID tagsAn RFID tag is an active tag when it is equipped with a battery tha t can be used as a partial or complete source of power for the tags circuitry and antenna. Some active tags contain replaceable batteries for years of use others are sealed units. (Note that it is also reach outable to connect the tag to an external power source.)Advantages of an active rfid tag1- It can be read at distances of one hundred feet or more(prenominal), greatly improving the utility of the device2- It may have other sensors that can use electricity for power.3- Longest communication range of any tag.4- The strength to perform independent monitoring and control5- The power of initiating communications6- The capability of performing diagnostics7- The highest information bandwidth8- Active rfid tags may even be equipped with autonomous networking the tags autonomously determine the best communication path.Disadvantages of an active RFID tag1- The tag cannot function without battery power, which limits the demeanortime of the tag.2- The tag is typically more expensi ve, often costing $20 or more each.3- The tag is physically larger, which may limit applications.4- The long-term maintenance costs for an active RFID tag can be greater than those of a passive tag if the batteries are replaced.5- Battery outages in an active tag can result in expensive misreads.2. Passive RFID tagsA passive tag is an RFID tag that does not contain a battery the power is supplied by the endorser. When radio waves from the reader are encountered by a passive RFID tag, the coiled antenna within the tag forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The tag then sends the information encoded in the tags memory.Advantages of a passive tag1- The tag functions without a battery these tags have a useful life of twenty years or more.2- The tag is typically much little expensive to manufacture.3- The tag is much smaller (some tags are the size of a grain of rice). These tags have almost unlimited applications in consumer goods and other areas.Disadvantages of a passive rfid tag1- The tag can be read only at very short distances, typically a few feet at most. This greatly limits the device for certain(prenominal) applications.2- It may not be likely to include sensors that can use electricity for power.3- The tag remains unclouded for a very long time, even after the product to which the tag is get hold ofed has been sold and is no womb-to-tomb creation.Figure 5 Active and Passive RFID tagCurrent uses of RFID1- Biometric passing playA biometric strait, also known as an e-passport or ePassport, is a combined melodic theme and electronic passport (hence the e-, as in e-mail) that contains biometric information that can be used to evidence the identity of travelers. It uses contactless smart card technology, including a microprocessor chip (computer chip) and antenna (for some(prenominal) power to the chip and communication) embedded in the front or back cover, or c acquiesce page, of the passport. me ndeleviumument and chip characteristics are documented in the International Civil Aviation Organisations (ICAO) Doc 9303. The passports critical information is both printed on the data page of the passport and stored in the chip. Public Key Infrastructure (PKI) is used to authenticate the data stored electronically in the passport chip making it virtually impossible to forge when all security mechanisms are fully and correctly apply.Note that the USA Passport card is not a biometric passport. The passport card does not follow the ICAOs Doc 9303, can only be used in a limited fleck of countries and uses a simple RFID chip instead of the contactless smart card technology that is used for biometric passports. Contactless smart card technology includes a microprocessor, data overture control, communications security and other functionality as programmed.2- buffalo chip insert (human)A human flake insert is an integrated circuit device or RFID transponder encased in silicate glas s and inserted into a domain body. A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information.HobbyistsThe first reported experiment with an RFID implant was carried out in 1998 by the British scientist Kevin Warwick. As a test, his implant was used to open doors, switch on lights, and cause verbal takings within a building. The implant has since been held in the Science Museum (London).Since that time, at least two additional hobbyists have placed RFID microchips implants into their drop deads or had them placed there by others.Amal Graafstra, author of the book RFID Toys, asked affects to place implants in his helping hands. A cosmetic surgeon used a scalpel to place a microchip in his left hand, and his family doctor injected a chip into his right hand using a veterinary Avid injector kit. Graafstra uses the im plants to open his home and car doors and to log on to his computer. Neither implant was the VeriChip brand.Medical records useThe PositiveID bay window (previously known as The VeriChip Corporation Applied Digital Solutions, Inc. and The Digital apotheosis Corporation) distribute the implantable chip known as the VeriChip. The company suggests that the implant could be used to retrieve medical information in the event of an emergency, as follows Each VeriChip implant contains a 16-digit ID number. This number is transmitted when a handheld VeriChip image scanner is passed within a few inches of the implant. Participating hospitals and emergency workers can enter this number into a secure page on the VeriChip Corporations bladesite to access medical information that the patient has previously stored on file with the company. build access and securityThe VeriChip Corporation has also suggested that the implant could be used to restrict access to secure facilities such as power pl ants. Microchip scanners could be installed at entrances so locks would only work for persons with appropriately programmed chips.The downside is the relative ease with which the 16-digit ID number contained in a chip implant can be obtained and cloned using a hand-held device, a paradox that has been demonstrated publicly by security researcher Jonathan Westhues and documented in the whitethorn 2006 issue of Wired magazine, among other places.A nightclub in Barcelona offered a chip implant for identifying VIP guests.Figure 6 Biometric passport with RFID tagFigure 7 Microchip human implantTechnical problems with RFIDProblems with RFID StandardsRFID has been implemented in different ways by different manufacturers global standards are still being worked on. It should be noted that some RFID devices are neer meant to leave their network (as in the case of RFID tags used for inventory control within a company). This can cause problems for companies.Consumers may also have problems wi th RFID standards. For example, ExxonMobils SpeedPass system is a proprietary RFID system if another company wanted to use the convenient SpeedPass (say, at the drive-in window of your favorite luxuriant food restaurant) they would have to pay to access it an unlikely scenario. On the other hand, if every company had their own SpeedPass system, a consumer would need to carry many different devices with them.RFID systems can be easily disruptedSince RFID systems make use of the electromagnetic spectrum (like WiFi networks or cellphones), they are relatively easy to trap using energy at the right frequency. Although this would only be an smother for consumers in stores (longer waits at the checkout), it could be disastrous in other environments where RFID is progressively used, like hospitals or in the military in the field.Also, active RFID tags (those that use a battery to increase the range of the system) can be repeatedly interrogated to break down the battery down, disrupt ing the system.RFID Reader CollisionReader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem many systems use an anti-collision protocol (also called a singulation protocol. Anti-collision protocols enable the tags to take turns in transmitting to a reader.RFID just the ticket CollisionTag collision occurs when many tags are present in a small area but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time.Security, privacy and ethics problems with RFIDThe following problems with RFID tags and readers have been reportedThe contents of an RFID tag can be read after the item leaves the furnish chainAn RFID tag cannot tell the difference between one reader and another. RFID scanners are very portable RFID tags can be read from a distance, from a few inches to a few yards. This allows anyone t o see the contents of your pocketbook or pocket as you walk down the street. Some tags can be turned off when the item has left the supply chain. robot RFID TagsOne of the main concerns with RFID tags is that their contents can be read by anyone with an appropriately equipped scanner even after you take it out of the store.One technology that has been suggested is a zombie RFID tag, a tag that can be temporarily deactivated when it leaves the store. The process would work like this you bring your purchase up to the register, the RFID scanner reads the item, you pay for it and as you leave the store, you pass a special device that sends a signal to the RFID tag to die. That is, it is no longer readable.The zombie element comes in when you bring an item back to the store. A special device especially made for that kind of tag re-animates the RFID tag, allowing the item to reenter the supply chain.RFID tags are difficult to subvertRFID tags are difficult to for consumers to remove so me are very small (less than a half-millimeter square and as thin as a sheet of paper) others may be unnoticeable or embedded inside a product where consumers cannot see them. New technologies allow RFID tags to be printed right on a product and may not be removable at all.RFID tags can be read without your knowledgeSince the tags can be read without being swiped or obviously scanned (as is the case with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and other consumer products without your knowledge. For example, you could be scanned before you enter the store, just to see what you are carrying. You might then be approached by a clerk who knows what you have in your backpack or purse, and can suggest accessories or other items.RFID tags can be read at greater distances with a high-gain antennaFor various reasons, RFID reader/tag systems are designed so that distance between the tag and the reader is kept to a minimum. Howe ver, a high-gain antenna can be used to read the tags from much further away, leading to privacy problems.RFID tags with unique serial numbers could be linked to an individual credit card numberAt present, the Universal Product Code (UPC) implemented with barcodes allows each product sold in a store to have a unique number that identifies that product. Work is proceeding on a global system of product identification that would allow each individual item to have its own number. When the item is scanned for purchase and is paid for, the RFID tag number for a ill-tempered item can be associated with a credit card number.Goals of the childbedMany educatees skip more than 20% of their lectures, and using an embed RFID tags in their scholarly person card will help to keep track of attendance.It can be a reference to the doctor in keeping records of attendance.It can also be used to provide any extra information to the doctor or the department without the need to type in the student num ber.It can be upgraded to include money amounts to be used just or so the university campus.Provides let out management for the doctor in his lecture.Reduce the use of paper to keep track of the students.User RequirementsAny user can use the system.Students are able to see their attendance online and almost in very time.Ordinary student cards can be implanted with an RFID tag. information Flow DiagramFigure 8Scenario Diagram The first maltreat , the user scans his cardThe user opens the website. For example Just website The user chooses if he will log-in like ingredient or visitor.Figure 9If he clicks sign in Button, the system asks him to insert his ID and the Password, and then the system checks the validity of the inserted information and then asks him to rescan his card to match it with that ID.Figure 10If the tidings valid and is a match with the card, the system redirect him to the member page.Figure 11 If a doctor has logged in , the system ask him if he would like to open the attendance list of his lectures , or opens the student list of a certain lecture to have the students check for attendance . If a student has logged in, the students will be able to view a list of his lecture absence or check for a certain lecture attendance By rescanning the card, the member signs out of the system.If he clicks the visitor handout, He can view a guide on how to obtain an RFID tagged card.Figure 12Information sourcesRFID tags are a new technology and few companies support it, one of these companies that provide support to RFID tags is TOUCHATAG. So we tried to collect as many information from the touchatag website about it and about the RFID hardware before we start using it and these resources are1- Touchatag webpage we entered Touchatag webpage to read about how to use touchatag device, tags.2- Taking the website tour we took a tour about touchatag DIY.3- indicant books and tutorials we read many tutorials and online books about RFID tags and hardware .Software RequirementsTo do this project we essential some hardware to help us in the building1- Touchatag RFID scanner we must have touchatag rfid scanner to do this project, so we obtained it.2- RFID tags from Touchatag Company these tags are used with the scanner to have a working RFID environment.3- A programming software Programming software is required to implement the project, then uploading it to the touchatag website and attach it with the account associated with the RFID scanner.System RequirementsAs Touchatag application is a software affiliated to the touchatag server, client must satisfy these requirements to run the application, here we are using this application under Windows (requirements vary depend on OS machine)Windows marginal requirementRecommendedInternet Connection blood line or DSLCable or DSLOperating System2000, XP, or VistaXP or VistaComputer Processor800 MHz Pentium III orAthlon, or better1.5 GHz (XP), 2-GHz (Vista) 32-bit (x86) or betterScreen Resoluti on1024768 pixels1024768 pixels or higher art Card for XP/2000NVIDIA GeForce 2, GeForce 4 MX or betterNVIDIA artistry cardsGeForce Go Series 7600, 7800, 7900ATI Graphics CardsX2600, X2900X3650, X3850Graphics Card for Vista (requires latest drivers)NVIDIA GeForce 6600 or betterOR ATI Radeon 9500 or betterOR Intel 945 chipsetNVIDIA Graphics cardsGeForce Go Series 7600, 7800, 7900ATI Graphics CardsX2600, X2900X3650, X3850ImplementationFor the implementation part, and due to the lack of possibility to develop my application directly on the Touchatag device, I took the approach of developing two things and link them together, first Ive created the website and the data base using ASP.net and C, stored the data and performed the operation that Ill explain later on, and the second part was creating a visual basic script, that is attached to each tag and performs the task unavoidable when it is called by the tag.ASP.net Ive started the project with programming on ASP.net using C, to accompl ish the following tasksCreate a set ID for login.Create a Doctor Password for login.Save the Doctor ID and Password in the database.Login as a Doctor and open the Student attendance system page.Check lectures where this function do the following Upon clicking the button the system checks the time on the system and then scan the database for any lectures that is in this time and then pitch the tables ID which matches the time of the system and then store it in a unsung label, then the program checks the hidden label for the ID of the lecture and goes to the database to retrieve the students who are attached with that ID, along with two fields for the measure in and Time out.Upon clicking one of the four buttons which are labeled Open Sign in, resolve Sign in. Open Sign out, Close Sign Out the determine of a hidden label are changed to specific values.When the student types in his Student ID and Student Password , then press the login button , the system checks the student ID an d the password if they are stored in the data base , once he found the data it checks which button of the four was clicked by the doctor first by checking a hidden label that stored the values of the button that was clicked , then based on that value it stores the time when the Login button was clicked, and by doing so it also updates the Database at the same Time.optical Basic book of account The visual basic script is what links the ASP.net website to the Touchatag card it is implemented through statements that do the followingEach Tag is assigned to a script of its own.The Tag when scanned activates the script that is assigned to it.The script is constructed with few simple statements that opens the web page, writes the user ID and Password in the cross ponding field, and the press the login button.Touchatag reader and Tags The Touchatag reader is connected to the Touchatag server which does the specific task you have assigned it already on the Touchatag Server, and by scanning each tag the specific Tag ID goes to the Server and retrieves the function that is assigned to that specific Tag.Screen ShotsAsp.netDoctor Login rapscallion Figure 13 ASP.netStudent Login Page , with Check Lectures and other PromptsFigure 14 ASP.netVisual Basic ScriptFigure 15 Visual BasicTouchatagFigure 16 TouchatagFigure 17 Figure 18 TouchatagFigure 19 TouchatagTestingSecurityRfid ID tags provided by touchatag have several security measures which include1- Accounts password Every user has a password to access his account in the webpage and the server. This password is created when the user signs up.2- IPs touchatag server changes its IP from time to time to avoid hacking.3- Report Abuse This feature allows any user to report any object or person if they ill-treat them.4- Unique tags ID each tag has a unique tag provided by the tag itself.CopyrightsThe touchatag RFID tags are copyright protected and cant be used without a reference from touchatag.Performance TestingEach tag is s canned effortlessly without any problems, the website might crash sometimes but it is restored without any problems.whole TestingIve tested the tags, they work fine even after being placed in a wallet for more than 6 months and the wear and tear process is slow, and the tags are durable.ConclusionThis project is the first step towards building Jordan University of Science Technology fully automated attendance system JUST administration can take this step further, build on it to reach a better-enhanced project and can add more features and operate to staff, officers, and students. Furthermore, the administration can also use this new technology to ameliorate students attendance operate and activities.I faced many problems during this project. The first problem is when I have to work in this system alone. Really, this problem gave me a big challenge to complete the project, but with the help of Dr. Qutaiba Al Thebyan, Dr. Qusai Abu Ein, Mrs. Alaa Mestarihi and the department, I co uld complete it.Finally, RFID tags is the future and every day services now a day require more interaction , but with those tags , many services and jobs can be done effortlessly without the ever getting your hand out of your pocket.

No comments:

Post a Comment