Biometrics in Access Control System

Size: px
Start display at page:

Download "Biometrics in Access Control System"

Transcription

1 Biometrics in Access Control System Akanksha Bhargava 1, Dr. R.S.Ochawar 2 1 M.Tech VLSI Design, Ramdeo Baba College of Engineering and Management, Nagpur, Maharashtra, India 2 Associate Professor, Ramdeo Baba College of Engineering and Management, Nagpur, Maharashtra, India Abstract This work describes an automated fingerprint authentication system fusing two different technologies viz. embedded and biometrics accessible to the persons who are authorized by the officials using bio-metric identification of finger print. The system operates in both online and offline mode. The fingerprint reader is an optical reader that captures the difference between valleys and ridges. System also employs Power over Ethernet. The goal of this project is to develop a complete system for fingerprint identification. For experimentation LM3S6965 micro-controller is interfaced with SFM3250-OP fingerprint scanner and LCD touch screen. Complete system could be connected to an access control products for applications ranging from multi door system to enterprise wide, networked systems containing thousand of entry points providing better security. Keywords Keil software, Biometrics, K350QVG-V1-F LCD touch screen, LM3S6965 Microcontroller, SFM3250-OP. I. INTRODUCTION With threat levels ranging from common vandalism to domestic terrorism, the security of our surroundings is paramount. The system described here provides an integrated solution that can enhance perimeter protection as well as internal security. The embedded system based on biometric authentication is applied as the platform of personal identification. Traditional system for the personal identification includes third party like Lock and Key, Personal Identification Security Guard, Pin number Based Identification, Proximity or Smart Card based Identification which could be easily transgressed or lost or forgotten. Another possible way is devising an access control system for a secured perimeter, which allows access to only those people who are identified based on their Biometric Identity. Biometric features that can be used for identification include fingerprints, palm prints, handwriting, vein pattern, facial characteristics, iris, and some others like voice pattern and gait [1]. Many other modalities are in various stages of development and assessment. Among these available biometric traits fingerprint proves to be one of the best traits providing good mismatch ratio and also reliable. To provide perfect security and to make work easier the help of two different technologies viz. EMBEDDED SYSTEMS and BIOMETRICS is taken. The system described here is based on granting access on the basis of fingerprint identification. Systems using a user ID/password pair can be changed to a user ID/fingerprint pair providing the higher level of security. Knowing with certainty who the user is, allows information services and data availability to be easily tailored to that particular individual, making the security solution one that enables productivity rather than that blocks the user from getting the job done. Focus of this research work is to employ biometrics into access control system. II. BENEFITS OF BIOMETRICS IN ACCESS CONTROL SYSTEM The purpose of any access control system is to allow access to authorized people into specific areas. Only with the use of a biometric one can be assured of authenticity. The security field uses three different types of authentication: something you know (a password, PIN), something you have (a card key, smart card) or something you are (a biometric trait). Of these, biometric trait identification is the most secure and convenient authentication tool. It cannot be borrowed, stolen or forgotten, and forging one is practically impossible [1]. Each human has his/her own biological identity that is different from any-one else s, which explains the difficulty in corrupting this kind of data.a card based access system will grant access to whoever is in possession of a registered card. Systems using PINs (personal identification numbers) requires to know a specific number to gain entry. Who actually enters the code can not be arbitrated. Biometric devices authenticate a person by their unique biometric characteristic, whether it is their hand, eye, fingerprint or voice. Biometrics can be layered with already existing access system to increase the security or can be used on its own. The true benefit of biometrics is eyes and hands are seldom lost, stolen or forgotten [1]. They also don t wear out and need to be replaced. III. INTERFACING The primary function of a biometric device is to verify or identify registered people on a system. 269

2 Access control requires the ability to authenticate a person and grant (or deny) access based on time restrictions. The system employed here can be used in different modes. A. Fingerprint mode Users are enrolled at the unit and their biometric template is stored in the fingerprint module memory. The actual comparison is accomplished within the unit and a lock output is energized depending on the outcome. Input points are available to monitor the door switch for door open too long and door forced open conditions. Outputs are provided to signal a bell or alarm panel if an alarm condition is detected by the system. All administration including enrolments, deletions and designating time restrictions are programmed. TCP/IP, RS232/485 for communication is also employed. Here we can have a networked system as well as standalone system. Networked systems also provide for a centralized template management. This process allows a user to enrol at a single location and have their template uploaded to other locations depending on access rights. A networked system can also provide authentication at the host PC where templates are extracted at any location and final authentication is performed at the PC to include access rights. B. Fingerprint + card mode In this type of integration, the access control software handles the template management and communications to the biometric units. In this case, the biometric template data is handled just like any other piece of card holder information and is stored inside the user s data record at the head end. Template distribution happens through the access control system s network topography. Templates can be sent through the network and ultimately stored in the specific biometric unit at the door or concentrated in the access control panels. Fig 1.The hardware structure of ARM-based biometric access control system. IV. INTEGRATION OF SUBMODULES A. Microcontroller LM3S6965, a 32 bit Arm cortex processor by Texas Instrument is used. The Cortex-M3 is a low-power processor that features low gate count, low interrupt latency, and low-cost debug, operating at 50MHz. It combines both a 10/100 Ethernet Media Access Control (MAC) and Physical (PHY) layer [2]. The microcontroller provides interfacing of sub-modules for access control system. Different ports are used for interfacing devices. 270

3 B. Fingerprint Scanner Biometrics the project is focused on fingerprint scanning. The first part includes to key out the scanner. For fingerprint verification implementation, the fullfunctioned fingerprint identification SFM 3520-OP optical module produced by Suprema inc. as a scanner is used. The Uni Finger modules are stand-alone fingerprint systems ideal for embedded system applications where biometric security is needed. There exist three buttons, three LED s, buzzer, and relay on the interface board for standalone evaluation without PC interface. Also, 2 terminal connectors are present to help evaluation of interfacing with various external devices, such as Wiegand device or relay- controlled device. It provides fast 1:1 and 1:N matching speed (400MHz DSP), fast power-on time, Serial interface with simple protocol, User-configurable I/O and LED control. The protocol based on fixed sized packets. Only fingerprint image, template data, and user lists are transmitted as appended to the packet. Checksum functionality is supported to ensure consistency of transmitted data[3]. Fingerprint module is interfaced with RS-232 port of microcontroller. C. Display Device TABLE III PACKET SIZE k350qvg-v1-f manufactured by Kitronix is a 3.5 (diagonal), 320x RGBx 240dots, 262Kcolors, Transmissive, TFT LCD module. Driving IC:SSD2119, and 18-bits databus (parallel RGBinterface/8080 parallel system interface) with Touch Panel[4]. TABLE III SPECIFICATIONS The module works on measuring the x and y coordinates. These co-ordinates are then sent to the program and depending on these exactly where the touch event took place and it then relays that information to the touch-screen driver software. This gives the interactive environment to the user. Logs can be checked, modes of operation can be selected like finger only, finger + card, finger + card+ pin. D. Power over Ethernet Power over Ethernet (PoE) is a technology that integrates power into a standard LAN infrastructure. It enables power to be provided to the device. Category 5 cable is used in the project. Voltage range 50 to 57 for power supply equipment[5]. With the use of PoE the constraint of having AC power outlets is eliminated. This provides flexibility in placing the device in the most optimal locations instead of choosing locations where power is available enabling centralized power management. E. LAN Communication 1) CGI and SSI CGI stands for Common Gateway Interface and SSI stands for Server Side Include. The Common Gateway Interface (CGI) is a standard method for web server software to delegate the generation of web content to executable files. When a web page request is sent from a browser to the embedded system, which has got lwip configured with CGI and SSI, if any SSI tag is present on the web page being served, the SSI handler is called[6,7]. When the board, receives the web page request, the lwip stack knows which function to call. In the corresponding CGI handler, the parameters are extracted from the URL, by Find CGI Parameter function and Get CGI Param function, and the functions are called for setting these values. This is how data gets passed to the system using CGI through web pages. Server Side Includes (SSI) is a simple interpreted server-side scripting language used almost exclusively for the Web. Server Side Includes are useful for including a common piece of code throughout a site, such as a page header, a page footer and a navigation menu. Conditional navigation menus can be conditionally included using control directives. 2) Raw TCP/IP interface for lwip lwip provides three Application Program's Interfaces (APIs) for programs to use for communication with the TCP/IP code: * Low-level "core" / "callback" or "raw" API. * Higher-level "sequential" API. * BSD-style socket API. 271

4 The sequential API provides a way for ordinary, sequential, programs to use the lwip stack. It is quite similar to the BSD socket API. The model of execution is based on the blocking open-read-write-close paradigm. Since the TCP/IP stack is event based by nature, the TCP/IP code and the application program must reside in different execution contexts (threads). The socket API is a compatibility API for existing applications, currently it is built on top of the sequential API. It is meant to provide all functions needed to run socket API applications running on other platforms (e.g. unix / windows etc.). F. Relay A relay is an electrically operated switch. When the access is granted (or denied) the power or ground is applied to a coil, the relay clicks on or off. The result is that a power wire to a function is either closed (connected) or opened (disconnected). When the line is connected, the function is turned on and works. When the line is disconnected, the function is turned off and will not work. Fig.2: Screen image of µvision IDE version 4. VI. FLOW CHART V. SYSTEM SOFTWARE IMPLEMENTATION A biometric access control system works in two models: enrollment model and verification model. In the off-line enrollment model, an enrolled fingerprint image is stored in the fingerprint module scanner memory. In the on-line verification model, the similarity between the enrolled image and the images of real-time captured fingerprint image are matched. For better security it also has provision for smart card and proximity card that would make verification easier and fast by employing 1:1 scan mode. A. Software for system The software Program was developed in C language for initializing the Ports, and the Program is written in Keil µvision 4. The µvision IDE from Keil combines project management, make facilities, source code editing, program debugging, and complete simulation in one powerful environment. The µvision development platform is easyto-use and helping you quickly create embedded programs that work. The µvision editor and debugger are integrated in a single application that provides a seamless embedded project development environment [8]. 272

5 Finger is kept on the finger print module and is matched with the already stored fingerprints. The program gets executed as per the above flow chart. Matching can be made 1:1 or 1:n depending upon the mode selected. VII. CONCLUSION Biometric access control system which supports various authentication media and different security combination: fingerprint, password & RF cards would be developed. It would also detect the live finger. Combining various authentication methods 1:1, 1: n and short cut ID for user convenience. REFERENCES [1 ] Biometric Wikipedia, the free encyclopedia. Available: [2 ] LM3s6965 Datasheet Available: [3 ] SFM3520-OP. Available: heet_v1.0.pdf [4 ] k350qvg-v1-f datasheet Available: [5 ] Power over Ethernet -Wikipedia, the free encyclopedia. Available: [6 ] CGI- Wikipedia, the free encyclopedia. Available: [7 ] SSI- Wikipedia, the free encyclopedia. Available: [8 ] Keil software. Available: 273

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

solutions Biometrics integration

solutions Biometrics integration Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability

More information

S-SupremaConfigurationGuide-DOC 7/23/2014. Suprema Biometrics Configuration Guide ACS OnSite Aparato

S-SupremaConfigurationGuide-DOC 7/23/2014. Suprema Biometrics Configuration Guide ACS OnSite Aparato S-SupremaConfigurationGuide-DOC 7/23/2014 Suprema Biometrics Configuration Guide ACS OnSite Aparato Page 2 Suprema Configuration Guide ACS OnSite Aparato Table of Contents 1. SUPREMA BIOSTAR CONFIGURATION...

More information

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker

More information

Android based Secured Vehicle Key Finder System

Android based Secured Vehicle Key Finder System International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Android based Secured Vehicle Key Finder System Sindhoori S. 1, Dr. N. Sathish Kumar 2 *(M.E. Embedded System Technologies, Sri

More information

BIT COMMANDER. Serial RS232 / RS485 to Ethernet Converter

BIT COMMANDER. Serial RS232 / RS485 to Ethernet Converter BIT COMMANDER Serial RS232 / RS485 to Ethernet Converter (Part US2000A) Copyrights U.S. Converters 1 Contents Overview and Features... 3 Functions..5 TCP Server Mode... 5 Httpd Client Mode.5 TCP Auto mode....6

More information

Access Control Using Smartcard And Passcode

Access Control Using Smartcard And Passcode IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676 Volume 4, Issue 5 (Jan. - Feb. 2013), PP 29-34 Access Control Using Smartcard And Passcode Omorogiuwa Eseosa 1., Uhunmwangho

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student

More information

PoE-Touch Fingerprint and RFID Access Control

PoE-Touch Fingerprint and RFID Access Control -Touch Fingerprint and RFID Access Control Intelligent Security -Touch Fingerprint and RFID Access Control is a new generation access control device of Anviz. The adopts touch activation technologies in

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of

More information

The Access Engine. Building Integration System - The Access Engine. Security Systems

The Access Engine. Building Integration System - The Access Engine. Security Systems The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware

More information

SHENZHEN PROYU BIOMETRIC T/A & A/C TERMINAL QUOTATION

SHENZHEN PROYU BIOMETRIC T/A & A/C TERMINAL QUOTATION Biometric Time Attendance Terminal ITEM NO. MAIN SPECIFICATION PY-B3 * Fingerprint Cap.: 1,500 * Record Cap.: 50,000 * Communication: RS232;485;TCP/IP * Workcode: * Check in/out, Break in/out PY-X628 *

More information

BIOMETRIC SOLUTIONS 2013 ISSUE

BIOMETRIC SOLUTIONS 2013 ISSUE BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise

More information

SNMP Web Management. User s Manual For SNMP Web Card/Box

SNMP Web Management. User s Manual For SNMP Web Card/Box SNMP Web Management User s Manual For SNMP Web Card/Box Management Software for Off-Grid Inverter Version: 1.2 Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2 Features... 1 1.3 Overlook...

More information

W38 / W35 GLOBAL TIME ATTENDANCE. AGW Systems

W38 / W35 GLOBAL TIME ATTENDANCE. AGW Systems W38 / W35 GLOBAL TIME ATTENDANCE AGW Systems TIME ATTENDANCE HOW TO CHOOSE YOUR SYSTEM WHAT IS MY BEST CHOICE? The first step in selecting your time attendance system is to know clearly how much information

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Fingerprint Based Biometric Attendance System

Fingerprint Based Biometric Attendance System Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265

More information

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN ATM Terminal Security Using Fingerprint Reconition. Prof. B.Jolad, Tejshree Salunkhe, Rutuja Patil, Puja Shindgi Padmashree Dr. D. Y. Patil Institute Of Engineering and Technology,Pimpri,Pune - 411018

More information

Cisco Physical Access Manager

Cisco Physical Access Manager Data Sheet Cisco Physical Access Manager 1.4.1 Cisco Physical Access Manager is the management application for the Cisco Physical Access Control solution. Cisco Physical Access Manager (Figure 1) is used

More information

How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone

How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,

More information

Access CONTROL. MANAGEMENT Software

Access CONTROL. MANAGEMENT Software Software Guide Access CONTROL MANAGEMENT Software 21 Personnel Fields Users are provided twenty one fields to record various personnel data such as first name, last name, department, parking spot, and

More information

1 Serial RS232 to Ethernet Adapter Installation Guide

1 Serial RS232 to Ethernet Adapter Installation Guide Installation Guide 10/100 Mbps LED (amber color ) Link/Activity LED (green color ) 1. Introduction Thank you for purchasing this 1-port RS232 to Ethernet Adapter (hereinafter referred to as Adapter ).

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

Digital I/O: OUTPUT: Basic, Count, Count+, Smart+

Digital I/O: OUTPUT: Basic, Count, Count+, Smart+ Digital I/O: OUTPUT: Basic, Count, Count+, Smart+ The digital I/O option port in the 4-Series provides us with 4 optically isolated inputs and 4 optically isolated outputs. All power is supplied externally.

More information

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out

More information

Figure 1.Block diagram of inventory management system using Proximity sensors.

Figure 1.Block diagram of inventory management system using Proximity sensors. Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav

More information

Using the JNIOR with the GDC Digital Cinema Server. Last Updated November 30, 2012

Using the JNIOR with the GDC Digital Cinema Server. Last Updated November 30, 2012 Using the JNIOR with the GDC Digital Cinema Server Last Updated November 30, 2012 The following is an explanation of how to utilize the JNIOR with the GDC Digital Cinema Server. Please contact INTEG via

More information

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System

Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n

More information

DOMUSBOX. User guide. Index

DOMUSBOX. User guide. Index DOMUSBOX User guide Index Introduction... 2 1. Installing SEAV DOMUS... 4 1.1 Activating DomusBox... 4 1.2Drawing the environments in DomusWeb... 5 1.3Connecting DomusBox to the devices...9 1.4Configuration

More information

Access control designed simply for you

Access control designed simply for you TruPortal Access control designed simply for you QUICK START GUIDE Introduction TruPortal access control solutions have been engineered and designed to install quickly and easily right out of the box.

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

INTELLIGENT CONTROL MODULE SA-2000-II HARDWARE MANUAL. Access Technologies International, Inc.

INTELLIGENT CONTROL MODULE SA-2000-II HARDWARE MANUAL. Access Technologies International, Inc. SA-2000-II HARDWARE MANUAL Access Technologies International, Inc. 1 Table of Contents 1. Introduction 3 2. Features 3 3. Specification 4 4. Identifying Supplied Parts 4 5. Panel Description 5 6. Connection

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology R. Senthil Kumar [1] Assistant professor, Dept. of ECE Jay Shriram Group of Institutions, Tirupur prof.senthilramalingam@gmail.com

More information

Development of an Internet based Embedded System for Smart House Controlling and Monitoring

Development of an Internet based Embedded System for Smart House Controlling and Monitoring Development of an Internet based Embedded System for Smart House Controlling and Monitoring Ahmed Abd-Elkarim Abd- Ellatif Salih Maged Ali Mohammed Asa'ad Yousif Elhadi Elsideeg Ahmed Department of Computer

More information

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Biometric Systems Biometrics

More information

Intelligent Database Monitoring System using ARM9 with QR Code

Intelligent Database Monitoring System using ARM9 with QR Code Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India

More information

SNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems

SNMP Web card. User s Manual. Management Software for Uninterruptible Power Supply Systems SNMP Web card User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. Overview... 3 1.1 Introduction... 3 1.2 Features... 3 1.3 Overlook... 3 1.4 Installation and

More information

www.smarcom.biz BARCODE TICKET SOLUTION RF CARD SOLUTION MAGNETIC TICKET SOLUTION

www.smarcom.biz BARCODE TICKET SOLUTION RF CARD SOLUTION MAGNETIC TICKET SOLUTION BARCODE TICKET SOLUTION RF CARD SOLUTION MAGNETIC TICKET SOLUTION C A R PA R K M A N A G E M E N T S Y S T E M C A R Barcode ticket application PA R K M A N A G E M E N T S Y S T E M RF card application

More information

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0

VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP

More information

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5

More information

PLC training panel (Twido version)

PLC training panel (Twido version) PLC training panel (Twido version) User manual Name School of Trades Produced by: GJR October 2012 Colour leaves: 9 BW leaves: 2 Cover colour: White Cover image: G.J.Rogerson Acknowledgments: Much of the

More information

Summer Project Report. Fingerprint Based Attendance System

Summer Project Report. Fingerprint Based Attendance System Summer Project Report On Fingerprint Based Attendance System Advisor Prof Amey Karkare Submitted by- Rajat Chaudhary Priyaranjan Deepak Kumar Durgesh Deep (Group 02) Introduction The most common means

More information

To perform Ethernet setup and communication verification, first perform RS232 setup and communication verification:

To perform Ethernet setup and communication verification, first perform RS232 setup and communication verification: PURPOSE Verify that communication is established for the following products programming option (488.2 compliant, SCPI only): DCS - M9C & DCS M130, DLM M9E & DLM-M9G & DLM M130, DHP - M9D, P series, SG,

More information

Module 1 Overview ControlLogix5000

Module 1 Overview ControlLogix5000 Module 1 Overview ControlLogix5000 Module Overview This module takes a fundamental approach to a ControlLogix system. It begins with an overview of the architecture and migrates into an introduction of

More information

Maintaining the Content Server

Maintaining the Content Server CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down

More information

Nagpur, Maharashtra, India

Nagpur, Maharashtra, India Volume 6, Issue 2, February 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated Door

More information

Testing Robots Using the VEXnet Upgrade

Testing Robots Using the VEXnet Upgrade Testing Robots Using the VEXnet Upgrade This document is an inspection guide for VEX v1.5 microcontroller-based robots. Use this document to test if a robot using the VEXnet Upgrade is competition ready.

More information

Quick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation

Quick Installation. A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding. Quick Installation Quick Installation A Series of Intelligent Bar Code Reader with NeuroFuzzy Decoding This chapter intends to get your new FuzzyScan scanner working with your existing system within minutes. General instructions

More information

EMBEDDED ACCESS CONTROL Hardware Installation Guide

EMBEDDED ACCESS CONTROL Hardware Installation Guide EMBEDDED ACCESS CONTROL Hardware Installation Guide Lenel goentry Hardware Installation Guide, product version 1.00. This guide is item number DOC- ENHW-ENU, revision 1.003, April 2009 Copyright 2009 Lenel

More information

HyperAccess Access Control System

HyperAccess Access Control System Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000

More information

Functional Specification Document

Functional Specification Document Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware

More information

Basic Software Setup Guide. www.easyclocking.com

Basic Software Setup Guide. www.easyclocking.com 1 Basic Software Setup Guide www.easyclocking.com 2 Table of Contents Software registration 3 How to connect the time clock.. 5 How to turn the time clock on 5 Defining the type of connection... 5 TCP/IP

More information

Surveillance System Using Wireless Sensor Networks

Surveillance System Using Wireless Sensor Networks Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA dantnguyen84@gmail.com chihshun@gmail.com Abstract The

More information

Fingerprint Time Attendance Hardware User Manual

Fingerprint Time Attendance Hardware User Manual Fingerprint Time Attendance Hardware User Manual CONTENTS 1. Start Screen 1 2. User Management 1 2.1User Registration 1 2.2DeleteRegistration 2 3. Equipment Setting 2 3.1Basic Setting 2 3.2Advanced Setting

More information

Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester

Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester Leonardo Journal of Sciences ISSN 1583-0233 Issue 20, January-June 2012 p. 31-36 Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester Ganesh Sunil NHIVEKAR *, and Ravidra Ramchandra MUDHOLKAR

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

Cost Effective time clock solution for Workday

Cost Effective time clock solution for Workday Cost Effective time clock solution for Automatically Upload Employee Time Records to s Time Tracking. Why pay someone to manually input employee time records, or waste time on staff disputes over time

More information

X Series Application Note 43:

X Series Application Note 43: X Series Application Note 43: Using the Remote Viewing & Web Pages of the X - Series & GR Series Recorders The Remote Viewing function of the X-Series and GR Series Recorders provide the user with the

More information

ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual

ALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual ALL0237R Wireless N 300Mbit Access Point/Repeater User s Manual ALLNET ALL0237R User Manual Table of Contents About the Device... 3 Minimum System Requirements... 5 Package Contents... 5 Device Overview...

More information

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,

More information

Tailored integration to suit you

Tailored integration to suit you UTC Fire & Security Integrated Systems Platforms Tailored integration to suit you We listened to you A majority of the Fortune 100 companies have chosen UTC Fire & Security for their integration needs.*

More information

Using the ievo fingerprint reader with Net2

Using the ievo fingerprint reader with Net2 Using the ievo fingerprint reader with How does it work? The ievo system stores the encoded fingerprint information within each reader. Once registered on the enrolment reader, the fingerprint data is

More information

How To Connect A300 To A300 Time Clock On A Pc Or Mac Computer

How To Connect A300 To A300 Time Clock On A Pc Or Mac Computer 1 TABLE OF CONTENTS INTRODUCTION CHAPTER 1 ESTABLISHING A CONNECTION TO TIME CLOCK 1.1 INSTALLATION OF SOFTWARE 1.2 CONNECT TIME CLOCK TO PC 2 1.2.A..VIA USB CABLE CONNECTION 2-5 1.2.B... VIA TCP/IP NETWORK

More information

Embedded Ethernet Interface Using Arm Processor

Embedded Ethernet Interface Using Arm Processor IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 4 (Jan. - Feb. 2013), PP 24-28 Embedded Ethernet Interface Using Arm Processor Raghava

More information

3.5 EXTERNAL NETWORK HDD. User s Manual

3.5 EXTERNAL NETWORK HDD. User s Manual 3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility

More information

How to add a SIP server How to register a handset

How to add a SIP server How to register a handset How to add a SIP server How to register a handset Contents Contents... 1 Hardware required equipment... 2 Software required equipment... 3 Add server... 3 Register handset to base... 7 1 of 12 Hardware

More information

ELM Security System Electronic Locking & Monitoring

ELM Security System Electronic Locking & Monitoring Whitepaper ELM Security System Electronic Locking & Monitoring Issue: September 2006 EMKA Beschlagteile GmbH & Co.KG Release: 1.0 Langenberger Str. 32 42551 Velbert Germany Tel.: 0049 (0) 20 51 / 2 73-0

More information

DESIGN AND IMPLEMENTATION OF ONLINE PATIENT MONITORING SYSTEM

DESIGN AND IMPLEMENTATION OF ONLINE PATIENT MONITORING SYSTEM DESIGN AND IMPLEMENTATION OF ONLINE PATIENT MONITORING SYSTEM Harsha G S Department of Electronics & Communication Channabasaveshwara Institute of Technology, Gubbi, 572216, India ABSTRACT Patient s condition

More information

Synapse s SNAP Network Operating System

Synapse s SNAP Network Operating System Synapse s SNAP Network Operating System by David Ewing, Chief Technology Officer, Synapse Wireless Today we are surrounded by tiny embedded machines electro-mechanical systems that monitor the environment

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection? FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...

More information

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3 SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,

More information

Preparing the Computers for TCP/IP Networking

Preparing the Computers for TCP/IP Networking Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or

More information

Microtronics technologies Mobile: 99707 90092

Microtronics technologies Mobile: 99707 90092 For more Project details visit: http://www.projectsof8051.com/rfid-based-attendance-management-system/ Code Project Title 1500 RFid Based Attendance System Synopsis for RFid Based Attendance System 1.

More information

HOME APPLIANCES CONTROL SYSTEM BASED ON ANDROID SMARTPHONE

HOME APPLIANCES CONTROL SYSTEM BASED ON ANDROID SMARTPHONE HOME APPLIANCES CONTROL SYSTEM BASED ON ANDROID SMARTPHONE Ajinkya Korane 1, Sanket Salunke 2 1 UG, Mechanical, 2 UG, E & TC, University of Pune, (India) ABSTRACT Today we are living in 21st century where

More information

AD-350WFP. Web-based Biometric Access Control/Time & Attendance Terminal. User Manual

AD-350WFP. Web-based Biometric Access Control/Time & Attendance Terminal. User Manual AD-350WFP Web-based Biometric Access Control/Time & Attendance Terminal User Manual Ver. 2.1 Dec 9, 2011 1 Contents I. Product features:... 3 II. Specifications:... 3 III. Exterior... 4 IV. Setup the clock...

More information

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

Data Transfer between Serial Link and TCP/IP Link Using ez80f91 MCU

Data Transfer between Serial Link and TCP/IP Link Using ez80f91 MCU Application Note Data Transfer between Serial Link and TCP/IP Link Using ez80f91 MCU AN021904 0808 Abstract This application note describes Zilog s ez80 - based Serial-to-TCP and TCP-to-Serial communicator

More information

DESIGN AND IMPLEMENTATION OF LOW COST HOME SECURITY SYSTEM USING PIC MICROCONTROLLER ANDGSM NETWORK

DESIGN AND IMPLEMENTATION OF LOW COST HOME SECURITY SYSTEM USING PIC MICROCONTROLLER ANDGSM NETWORK DESIGN AND IMPLEMENTATION OF LOW COST HOME SECURITY SYSTEM USING PIC MICROCONTROLLER ANDGSM NETWORK Varun Goel 1, Vinni 2 Abhishek Goel 3 1,2,3 Electronics & Communication Engineering Department, Hindu

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

Ethernet. Customer Provided Equipment Configuring the Ethernet port.

Ethernet. Customer Provided Equipment Configuring the Ethernet port. Installing the RDSP-3000A-NIST Master Clock. Ethernet Connect the RJ-45 connector to a TCP/IP network. Equipment The following equipment comes with the clock system: RDSP-3000A-NIST Master Clock Module.

More information

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple

More information

EDI Distributor Control Interface Wiring and Setup Instructions

EDI Distributor Control Interface Wiring and Setup Instructions Universal I/O EDI Distributor Control Interface Wiring and Setup Instructions EDI UNIVERSAL I/O INTERFACE MODULE The only interface needed for EDI-V5 controls Network compatible with all older EDI controls

More information

An Embedded Based Web Server Using ARM 9 with SMS Alert System

An Embedded Based Web Server Using ARM 9 with SMS Alert System An Embedded Based Web Server Using ARM 9 with SMS Alert System K. Subbulakshmi 1 Asst. Professor, Bharath University, Chennai-600073, India 1 ABSTRACT: The aim of our project is to develop embedded network

More information

Alliance System Ordering Guide

Alliance System Ordering Guide Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers

More information

Table of Contents. Chapter1. Introduction...1. 1.1 Before Installation... 1 1.2 System Requirements... 1

Table of Contents. Chapter1. Introduction...1. 1.1 Before Installation... 1 1.2 System Requirements... 1 Table of Contents Chapter1. Introduction...1 1.1 Before Installation... 1 1.2 System Requirements... 1 Chapter2. IVS-110 1-Channel Internet Video Server...2 2.1 Package Content... 2 2.2 Physical Installation...

More information

A Real Time, Object Oriented Fieldbus Management System

A Real Time, Object Oriented Fieldbus Management System A Real Time, Object Oriented Fieldbus Management System Mr. Ole Cramer Nielsen Managing Director PROCES-DATA Supervisor International P-NET User Organisation Navervej 8 8600 Silkeborg Denmark pd@post4.tele.dk

More information

3.2 inch QVGA TFT Color LCD User s Guide Version 1 & 2

3.2 inch QVGA TFT Color LCD User s Guide Version 1 & 2 3.2 inch QVGA TFT Color LCD - User s Guide 3.2 inch QVGA TFT Color LCD User s Guide Version 1 & 2 Give graphics and to your application! EA2-USG-0701 v2.1 Rev A 3.2 inch QVGA TFT Color LCD - User s Guide

More information

Smart Card Authentication. Administrator's Guide

Smart Card Authentication. Administrator's Guide Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5

More information

How To Set Up A Smart Card Programmer With Titan 2.2.2 (Titan) And Titan 2.3 (Tok) (Tonga) (Powerbook) (Smart Card) (Programmer) (S

How To Set Up A Smart Card Programmer With Titan 2.2.2 (Titan) And Titan 2.3 (Tok) (Tonga) (Powerbook) (Smart Card) (Programmer) (S Smart Card Programmer TS0870P: Installation Guide Overview The TS0870P Smart Card Programmer programs user cards for use with the TS0870 Smart Card Reader. Using TITAN management software, cards are programmed

More information

Software INTERACT. MachineLogic. The Shortest Distance Between Man and Machine

Software INTERACT. MachineLogic. The Shortest Distance Between Man and Machine Software INTERACT MachineLogic The Shortest Distance Between Man and Machine Fully IntegrateYour HMI and PC-Based Control With MachineShop Project Management MachineShop s Project Management is a simple,

More information

CipherLab 5100 Time Attendance Utility Manual

CipherLab 5100 Time Attendance Utility Manual CipherLab 5100 Time Attendance Utility Manual K:\Products\Product Technical\BI\BI-PC5100T\CipherLab5100TimeAttendnaceUtilityManual0707-process.doc Page 1 / 13 1 Login A popup form as follows will appear

More information

Operation Manual of EX9132C-RS485. Serial to TCP/IP Converter

Operation Manual of EX9132C-RS485. Serial to TCP/IP Converter Operation Manual of EX9132C-RS485 Serial to TCP/IP Converter Version 1.0 27th May 2014 Table of Contents 1. Introduction 3 Overview 4 Package Checklist 4 Block Diagram 5 Product Features 7 Product Specifications

More information

Chapter 1 Connecting the Router to the Internet

Chapter 1 Connecting the Router to the Internet Chapter 1 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to set up your wireless ADSL

More information

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria

More information

NSR TM. Open the Era of Embedded Security Integration Systems. Network Security Recorder. Integrated Security

NSR TM. Open the Era of Embedded Security Integration Systems. Network Security Recorder. Integrated Security Integrated Security Networ k Security Recorder NSR TM Network Security Recorder Open the Era of Embedded Security Integration Systems NSR (Network Security Recorder) is developed by Anson and will be promoted

More information