Apply Multi-Biometrics Recognition Systems for Intelligent House Management
|
|
|
- Morris Grant
- 10 years ago
- Views:
Transcription
1 Hong Kong Institute of Vocational Education (Tsing Yi) Department of Multimedia and Internet Technology Higher Diploma in Multimedia and lnternet Applications (41381) Final Year Project Report Apply Multi-Biometrics Recognition Systems for Intelligent House Management By Chan Ka Lun, Peae Tsang Man Piu Academic Year 2005/06 Supervised by Mr. MK Lam
2 ABSTRACT This final year project describes the design and development of applying the biometrics technology with facial recognition and fingerprint recognition system. Several commonly used applications for our biometric system are reviewed in this report. Details of the design criteria of both hardware and software principles of operation as well as the testing and verification of the system are presented. Further development of project is also proposed and recommended. This project is to develop and built up a biometrics system for intelligent house and clubhouse. As biometrics is a popular and safety technology, the project applies this technology to improve the security level and easy for management. i
3 TABLE OF CONTENTS page ABSTRACT TABLE OF CONTENTS LIST OF FIGURES LIST OF TABLES LIST OF APPENDICES i ii v viii ix Chapter 1 Introduction Overview Background Information Structure of the Final Year Project Report 1 Chapter 2 Literature Review Introduction Introduction to Biometrics Technologies What is Biometrics? History of Biometrics How does it work? Applications in Biometrics Template size of each Biometrics Technology Examples of biometrics system in my life Examples of biometrics system layout Examples of hardware design Examples of software interface design Summary 12 Chapter 3 Development Methodology for Multi-Biometrics Recognition System Introduction Design Consideration of Hardware System Design Consideration of Software Graphics Design and Layout Structure of Database Design 19 ii
4 Chapter 4 Details of the Multi-Biometrics Recognition System Overview Workflow of Recognition System Function of Recognition System Function of Administration tools Function of Building security system Function of Clubhouse system Hardware of Recognition System Development Software use Software needs and setup Database Structure Relational between tables Householder Householder Log Visitor Building Floor and Flat Clubhouse Graphics Design and Layout Administration Tools layout design Building security system layout design Clubhouse system layout design 35 Chapter 5 Evaluation of Multi-Biometrics Recognition Systems Overview Principle of Biometric Enrolment and Verification Summary 38 Chapter 6 Application Procedure of Multi-Biometrics Recognition Systems Administration tools Add new householder Edit householder Delete householder Householder entry log Visitor entry log Building Security System 49 iii
5 6.2.1 Householder mode Visitor mode Clubhouse system Clubhouse login and logout system Clubhouse payroll system 57 Chapter 7 Verification of the Multi-Biometrics Recognition Systems Overview Verification of Result Summary 59 Chapter 8 Conclusion and Further Development Overview Contribution of Final Year Project Discussion on the Project Limitation Further Proposal 61 References 62 Appendices 64 Appendix A: Team member workload 64 Appendix B: Project plan 65 Appendix C: Programming code 66 iv
6 LIST OF FIGURES page Fig. 2.1 Biometric identification and encrypted data system 8 Fig. 2.2 Biometric access control system (Exys Security system) 8 Fig. 2.3 Country entry and exit control system 8 Fig. 2.4 Hand geometry control system 9 Fig. 2.5 Biometric experiment system 9 Fig. 2.6 Presse Fotos ekey fingerprint system 10 Fig. 2.7 Biometric reader clocking system 10 Fig. 2.8 Office access control system 10 Fig. 2.9 Windows lcqon recognition system 11 Fig Breaker facial searching system 11 Fig Biometric Patient Tracking System 11 Fig fingerid system with biometrics in USA 11 Fig. 3.1 Types of fingerprint 13 Fig. 3.2 Optical Fingerprint Sensors 14 Fig. 3.3 Surface Pressure Sensor 14 Fig. 3.4 Capacitive Sensors 14 Fig. 3.5 Facial geometry example 15 Fig. 3.6 Correct recognition example 15 Fig. 3.7 Facial recognition in airport 16 Fig. 3.8 First Visitor mode layout 17 Fig. 3.9 Second Visitor mode layout 18 Fig Clubhouse mode layout 18 Fig Database schema of Biometrics System 19 Fig. 4.1 Structure of System 20 Fig. 4.2 Workflow of Building security system 21 Fig. 4.3 Workflow of Clubhouse system 22 Fig. 4.4 Marcomedia Flash 25 Fig. 4.5 Adobe Photoshop 25 Fig. 4.6 Visual Basic Fig. 4.7 Create MySQL user 26 Fig. 4.8 Restore the backup file 27 Fig. 4.9 Permission of the folder 27 Fig Folder of householder and visitor 28 Fig Database Structure of Systems 28 v
7 Fig Main page of Administration Tools 32 Fig Database Management of Householder 32 Fig Entry Log of Householder 33 Fig Entry Log of Visitor 33 Fig Selection mode of building security system 34 Fig Householder mode of building security system 34 Fig Visitor mode of building security system 35 Fig Language Selection mode of clubhouse system 35 Fig Selection mode of clubhouse system 36 Fig Login mode of clubhouse system 36 Fig Choose facilities mode of clubhouse system 37 Fig Logout mode of clubhouse system 37 Fig. 6.1 Select Database Management 39 Fig. 6.2 Click the Add New button 39 Fig. 6.3 Add user windows 40 Fig. 6.4 Procedure of face enrollment 40 Fig. 6.5 Successful message of face enrollment 41 Fig. 6.6 Successful message of add new householder 41 Fig. 6.7 Error message of add new householder 42 Fig. 6.8 New householder in the list 42 Fig. 6.9 Click the Edit button 43 Fig Enroll new face 43 Fig Successful message of face enrollment 44 Fig Successful message of update householder 44 Fig Delete the householder 45 Fig Confirm to delete householder 45 Fig Select Entry Log of householder 46 Fig Query of Householder Entry Log 46 Fig Result of Householder Entry Log 47 Fig Select Entry Log of visitor 47 Fig Query of Visitor Entry Log 48 Fig Show the photo of visitor 48 Fig Mode selection of Building Security System 49 Fig Procedure of identify the householder 49 Fig Error message when cannot identify the householder 50 Fig Householder identify complete 50 Fig Mode selection of Building Security System 51 Fig Procedure of enter the floor and flat 51 vi
8 Fig Error message of enter wrong floor 52 Fig Procedure of face capture 52 Fig Procedure of fingerprint capture 53 Fig Visitor register complete 53 Fig Step 1 of process clubhouse system 54 Fig Step 2 of process clubhouse system 54 Fig Step 3 of process clubhouse system 55 Fig Step 4 of process clubhouse system 55 Fig Step 5 of process clubhouse system 56 Fig Step 6 of process clubhouse system 56 Fig Step 1 of process clubhouse payroll system 57 Fig Step 2 of process of clubhouse payroll system 57 Fig Step 3 of process of clubhouse payroll system 58 vii
9 LIST OF TABLES page Table 2.1 Template size of each Biometrics Technology 7 Table 4.1 Database structure of householder 29 Table 4.2 Database structure of householder log 29 Table 4.3 Database structure of visitor 30 Table 4.4 Database structure of building 30 Table 4.5 Database structure of floor and flat 31 Table 4.6 Database structure of clubhouse 31 Table 7.1 FRR rate of facial recognition 59 Table 7.2 FAR rate of facial recognition 59 viii
10 LIST OF APPENDICES page Appendix A Team member workload 64 Appendix B Project plan 65 Appendix C Programming code 66 ix
11 Chapter 1 Introduction 1.1 Overview Nowadays, Biometrics becomes important in our life. Since it has a high security and convenient, so that people use Biometrics technology on anything. Such as, door access control, border control, banking, identify people, intelligent house, etc. The application is very diverse and their capacity of development is very large. The intelligent house becomes popular for the past few years. It can provide a safety and comfortable to the householder. But the security is very important, it must be identify the house holder accurately and prevent the system to make a mistake for identification. So that, we need to build a system like the security to make a identity and monitoring the security of building. 1.2 Background Information In fact, Hong Kong building security is decreased. The thief is increased to make the people safety to be damaged. So, we must improve the building security and the management. By the way, when we come back to our building, we may use words of password or the key to open the building door. That is so trouble and inconvenience. Biometrics technologies can help us to improve the security and easy to management. So, we may use the biometrics technologies to maintain our final year project. 1.3 Structure of the Final Year Project Report The remainder of this report is divided into Seven Chapters. They are as follows: - Chapter 2 covers the literature review on the design research of biometrics system. We find a lot of the information and image from Internet. Chapter 3 discusses on the design criteria of hardware system, software, layout and database Chapter 4 presents the details of the components of the hardware software, workflow and database about our system. Chapter 5 describes the performance evaluation of the developed system about the principle of biometric enrolment and verification. Chapter 6 and 7 describe the enrolment and verification procedure of how to capture and record of our recognition system. 1
12 Chapter 8 concludes the report and out lines the contributions of the project. The limitations were highlighted and suggestions are made for further development to improve the system. 2
13 Chapter 2 Literature Review 2.1 Introduction That part is literature review. It means we will show you all our research before our project starting. And the research should be about example of biometric system, layout of the hardware system, layout of the software interface, etc. We will show you all of our research for the final year project. 2.2 Introduction to Biometrics Technologies What is Biometrics? The term biometrics refers to the emerging field of technology devoted to the identification of individuals using biological traits or behaviours [1]. In practice, this means capturing an image of a unique feature of an individual such as a fingerprint, hand, eye or face, and comparing it with a template captured previously. For ease of explanation this has been over-simplified, but in essence this is biometric technology works. Human Recognition Systems works with 4 key biometric technologies: Iris Recognition Hand Recognition Fingerprint Recognition Facial Recognition History of Biometrics 1800s identification largely relied upon "photographic memory" [2]. This was changed in 1883 when Alphonse Bertillon, a clerk in the Paris police prefecture, introduced physical measurement system (which came to bear his name: bertillonage) Bertillon based his system on the claim that measurement of adult bones does not change throughout life. Measurements in his system included: height, length, and breadth of the head, the length of different fingers, the length of forearms, etc (Bertillon estimated that the odds of duplicate records were 286,435,456 to 1 if 14 traits were used. After this, the police used finger printing, which was developed by Richard Edward Henry of Scotland Yard, instead. Essentially reverting to the same methods used by 3
14 the Chinese for years. However the idea of biometrics as a field of study with useful identification applications, was there and interest in it has grown. Personal Identification Numbers (PINs) were one of the first methods used for identification. There are also methods that involve passwords and physical tokens e.g. smart cards. There are a number of problems associated with this kind of identification. People forget passwords, lose tokens, reuse passwords, write them down, tokens can get stolen. The recognition of the above does not mean the identification of the person providing it - they could be presented by anybody. With the advent of e-commerce brings increased pressure on IT managers to provide partners and customers with means of identification to access corporate networks. This results in a deluge of passwords and means of access, which are often forgotten, misused or lost. With the increased population accessing these networks the risk of attacks on the networks is increased. Companies are turning to Biometric Systems to bring tighter security to their computer networks. Today we have the technology to realize the aims, and to refine the accuracy of biometric identification, and therefore the possibility of making it a viable field. Soon biogenetics technology will be used in every house hold and it is getting increasingly more and safer to use biometric technologies in order to better our life How does it work? False Reject Rates: For most applications, letting the good guys in is just as important as keeping the bad guys out [3]. The probability that a biometric device won't recognize a good guy is called the "False Reject Rate." The False Reject Rates quoted for current biometric systems range from % to 1.0%. A low False Reject Rate is very important for most applications, since users will become extremely frustrated if they're denied access by a device that has previously recognized them. 4
15 There has a example may be helpful. A company with 100 employees has a biometric device at its front door. Each employee uses the door four times a day, yielding 400 transactions per day. A False Reject Rate of 1.0% predicts that every day, four good guys (1% of 400) will be denied access. Over a five-day week, that means 20 problems. Reducing the False Reject Rate to 0.1% results in just two problems per week. A low False Reject Rate is very important for most applications, since users will become extremely frustrated if they're denied access by a device that has previously recognized them. As mentioned previously, the combination of a low False Reject Rate plus a simple keypad code provides virtually unbreakable security. Equal Error Rates: Error curves give a graphical representation of a biometric device's "personality." The point where false accept and false reject curves cross is called the "Equal Error Rate." The Equal Error Rate provides a good indicator of the unit's performance. The smaller the Equal Error Rate, the better. Validity of Test Data: Testing biometrics is difficult, because of the extremely low error rates involved. To attain any confidence in the statistical results, thousands of transactions must be examined. Some error rates cited by manufacturers are based on theoretical calculations. Other rates are obtained from actual field testing. Field data are usually more reliable. In the case of False Reject rates, only field test data can be considered accurate, since biometric devices require human interaction. For example, if the device is hard to use, false reject rates will tend to rise. A change in the user's biometric profile could also cause a false reject (a finger is missing, for example). None of these conditions can be accurately quantified by purely theoretical calculations. On the other hand, False Accept Rates can be calculated with reasonable accuracy from cross-comparison of templates in large template databases. 5
16 Currently, most field test error rates have been generated by various biometric manufacturers using end-user data. Tests have also been conducted by independent laboratories such as the U.S. Department of Energy's Sandia National Laboratories. The most recent test released by Sandia was performed in It's important to remember that error rates are statistical: they are derived from a series of transactions by a population of users. In general, the larger the population and the greater the number of transactions, the greater the confidence level in the accuracy of the results. If the error rate is reported at 1:100,000, and only 100 transactions were included in the study, the confidence level in the results should be very low. If the same error rate was reported for 1 million transactions, the confidence level would be much higher. The magnitude of the reported results affects the size of the sample required for a reasonable confidence level. If the reported error rate is 1:10, then a sample of 100 transactions may provide a sufficient confidence level. Conversely, a 100-transaction sample would be too small if the error rate was reported as 1:100, Applications in Biometrics There are 9 biometrics applications: [4] Physical Access Control Logical Access Control Justice/Law Enforcement Time and Attendance Border Control/Airports HIPAA Financial/Transactional Integrators/Resellers Safes, Door Locks 6
17 2.2.5 Template size of each Biometrics Technology Biometrics Technology Iris Fingerprint Facial Hand Geometry Template size per record 256 Bytes Bytes >512 Bytes 9 Bytes Table 2.1 Template size of each Biometrics Technology 2.3 Examples of biometrics system in my life Law Enforcement The law enforcement community is perhaps the largest biometrics user group. Police forces thought the world use AFIS technology to process criminal suspect, match finger images and bring guilty criminals to justices. A number of biometrics vendors are earning significant revenues in this area. Banking Bank has been evaluating a range of biometrics technologies for many years. Automated Teller Machines (ATMs) and transaction at the point of scale are particularly vulnerable to fraud and can be secured by biometrics. Other emerging markets such as telephone banking and internet bank must also be totally secure for bankers alike. 7
18 2.4 Examples of biometrics system layout We researched that the following figures are the examples of the biometrics system. Fig. 2.1 Biometric identification and encrypted data system [5] Fig. 2.2 Biometric access control system (Exys Security system) [6] Fig. 2.3 Country entry and exit control system [7] 8
19 Fig. 2.4 Hand geometry control system [8] Fig. 2.5 Biometric experiment system [9] 9
20 2.5 Examples of hardware design We may show you our research of hardware. The following figures are below. Fig. 2.6 Presse Fotos ekey fingerprint system [10] Fig. 2.7 Biometric reader clocking system [11] Fig. 2.8 Office access control system [12] 10
21 2.6 Examples of software interface design The following figures are our research of the biometrics software interface examples. Fig. 2.9 Windows lcqon recognition system [13] Fig Breaker facial searching system [14] Fig Biometric Patient Tracking System [15] Fig fingerid system with biometrics in USA [16] 11
22 2.7 Summary After the research that, we find many about the information of biometrics and many different kinds of the biometrics system. In fact, there were many technologies were used the biometrics technology. It is the truth and it must be more popular in the future. Now a day, many old systems are displaced by the biometric system. For example: access control system, payroll system, banking system, etc. During the project development, the biometric hardware is used. There are TiFace system, U are U fingerprint system. TiFace system enables to capture and enrol user s face. U are U fingerprint system is use to capture and enrol user s fingerprint. So, we have to use the biometric in the future life. 12
23 Chapter 3 Development Methodology for Multi-Biometrics Recognition System 3.1 Introduction In this part, we will tell you about our first development methodology. What kinds of hardware did we use. Why we use that hardware. What kinds of software did we use. Why we use that software. And we also post our first layout design in that part. We will all tell you the answer 3.2 Design Consideration of Hardware System Fingerprint recognition represents the oldest method of biometric identification. Its history is going back as far as at least 2200 BC. The use of fingerprints as a personal code has a long tradition and was already used by the Assyrians, the Babylonians, the Chinese and the Japanese. Since 1897, dactyloscopy (synonym for non-computer-based fingerprint identification) has been used for criminal identification. A fingerprint consists of ridges (lines across fingerprints) and valleys (spaces between ridges). The pattern of the ridges and valleys is unique for each individual. [17] There are two major methods of fingerprint matching: Minutiae matching and global pattern matching. The first approach analyses ridge bifurcations and endings, the second method represents a more macroscopic approach. The last approach considers the flow of ridges in terms of, for example, arches, loops and whorls. As the equal-error-rate is low, therefore fingerprint recognition is very accurate. The prices of such systems compared to other biometric systems are quite low and the user acceptance is very high. The strength of fingerprint identification is, that it can be deployed in a varied range of environments. Fig. 3.1 Types of fingerprint [18] 13
24 There are 6 types of sensors for fingerprint recognition: Optical Fingerprint Sensors Themalelectric Sensors Capacitive Sensors E-Field Sensors Touchless Sensors Surface Pressure Sensor Fig. 3.2 Optical Fingerprint Sensors [19] Fig. 3.3 Surface Pressure Sensor [20] Fig. 3.4 Capacitive Sensors [21] The template size varies from 100 bytes to 1500 Bytes depending on the algorithm and the quality of a fingerprint. Nevertheless, very rarely there are fingerprints without any minutiae-points that leads to a failure to enroll (FER = Failure to Enroll Rate). It is also difficult to extract the minutiae points accurately when the fingerprint has got a low quality. 14
25 Introduction of facial recognition Facial recognition systems are built on computer programs that analyze images of human faces for the purpose of identifying them. The programs take a facial image, measure characteristics such as the distance between the eyes, the length of the nose, and the angle of the jaw, and create a unique file called a "template." Using templates, the software then compares that image with another image and produces a score that measures how similar the images are to each other. Typical sources of images for use in facial recognition include video camera signals and pre-existing photos such as those in driver's license databases. [22] Computers can do increasingly amazing things, but they are not magic. If human beings often can't identify the subject of a photograph, why should computers be able to do it any more reliably? The human brain is highly adapted for recognizing faces - infants, for example, remember faces better than other patterns, and prefer to look at them over other patterns. The human brain is also far better than computers at compensating for changes in lighting and angle. The fact is that faces are highly complex patterns that often differ in only subtle ways, and that it can be impossible for man or machine to match images when there are differences in lighting, camera, or camera angle, let alone changes in the appearance of the face itself. Fig. 3.5 Facial geometry example [23] Fig. 3.6 Correct recognition example [24] 15
26 All of this makes face recognition ideal for high traffic areas open to the general public, such as: Airports and railway stations Casinos Cashpoints Stadiums Public transportation Financial institutions Government offices Businesses of all kinds Fig. 3.7 Facial recognition in airport [25] 16
27 3.3 Design Consideration of Software We choose macromedia flash and adobe Photoshop for our design software. Why we use that two software for design development? It is because macromedia flash is so powerful. It can be used actionscript for many different of animation. Although, it is easy to use and popular in the design area. The second point is we don t want to have a static and boring interface. So, we decided to use flash animation to replace of static picture interface. It can attract the people to use our system and make the system more interest. In the internet, many people used that two software. It is the brand name power and that software is really good for design. On the other hand, Photoshop can help us for tuning the photo color, light, size, effect, etc. It also can help us to make the picture be good. 3.4 Graphics Design and Layout Fig. 3.8 First Visitor mode layout 17
28 Fig. 3.9 Second Visitor mode layout. Fig Clubhouse mode layout 18
29 3.5 Structure of Database Design The following Fig is our first development of database structure design. It only consists of 4 tables: tblhouseholder, tblbuilding, tblvisitoryymmdd and tblfloorflat. That is our first developed schema. Fig Database schema of Biometrics System 19
30 Chapter 4 Details of the Multi-Biometrics Recognition System 4.1 Overview In this part, we finished to discuss and develop all the kinds of tool should we use. We will use two hardware for the system. It should be Face recognition and fingerprint hardware. And we will tell you the function of our biometric system. It has three different parts of the recognition system, please refer to Fig Finally, we choose the software, hardware and the final layout. We will show you all the things in the following. Fig. 4.1 Structure of System 20
31 4.2 Workflow of Recognition System The following two figures 4.2 & 4.3 are our workflow of the building security system and clubhouse system. Entry Select Mode Visitor Input Floor and Flat Householder Facial Recognition Enroll Face Invaild Check database & identify Enroll Fingerprint Vaild Open door Open door Fig. 4.2 Workflow of Building security system 21
32 Entry Select Login/Logout Logout Login Login mode Logout mode Facial recognize Facial recognize Invaild vaild Invaild vaild Check database Check database Store login time to database Store logout time to database Fig. 4.3 Workflow of Clubhouse system 4.3 Function of Recognition System There are three parts of our recognition system. It consists of Administration Tools, Building security system and Clubhouse system Function of Administration Tools Actually, householder and visitor also need to enroll fast when they want to use the biometric system. We make an enrolment to analysis this problem. Householder can come to our office to use the householder enrolment system. They only need to put their face in front of the camera. Their face record will store to our database for verify used. They also need to type their information (e.g. name, 22
33 gender, and floor no., flat no., etc.) to our database used. It is used for comparison Function of Building security system We design that householder mode is for householder using. They are no need to remember the word of password for house entry. It is because the entry password always changed a time. The householder may forget the password or remember the wrong one. So, Householder mode system can help person easily for entry. They only put their face in front of camera. If they are our householders then the door will open automatically by our system. Nowadays, people visit to their friend house. They must write down their personal information (e.g. name, id, gender, visit reason, visit room no.) in the building entry control. It is because the building needs to protect their householder safety and giving record. It may make the visitor inconvenient. So, we make a visitor mode for visitor using. It can help visitor more convenient, Visitor only put their face in front of camera and fingerprint to record their personal data. That should be fast and more convenient than the paper record Function of Clubhouse system Clubhouse is to be more popular to the new building. Householders can use their own clubhouse facilities. When they used the clubhouse facilities, they need to make a paper rent. That is not convenient and trouble. So, we make a clubhouse biometric system for householder using. They only open our system and put their face in front of the camera. Our system will record their login time. Otherwise, when they want to logout and leave that they also use our system to record their logout time. They can use our clubhouse easily. When you finished your playing from clubhouse, you need to pay the free to the clubhouse using. We make a payroll system for clubhouse payment. Householder only put their face in front of camera. Our database will search your clubhouse login time and logout time used for calculate the price. When you know the price that you only pay the money to our staff. He will help you to finish the payment process. 23
34 4.4 Hardware of Recognition System We choose facial recognition and fingerprint for our system used Facial recognition systems are computer-based security systems that are able to automatically detect and identify human faces. These systems depend on a recognition algorithm. The first step for a facial recognition system is to recognize a human face and extract it fro the rest of the scene. Next, the system measures nodal points on the face, such as the distance between the eyes, the shape of the cheekbones and other distinguishable features. Facial recognition is a good biometric system and it is too convenience and user-friendly. So that, we use facial recognition for our system used. For the fingerprint reason, we found that following good points: More securable than passwords by intercepting use and approach of Unauthorized people whose identification is not registered. Free from inconvenience to upgrade and remember passwords and the company It can save much cost to manage passwords. Fast and exact perception with high technology of finger print identification. Adopted dsp system that is to calculate moving direction and distance without Password by the image perceiving sensor. No roller and soft movement thanks to less rubbing resistance. Finally, fingerprint is easy too use, user-friendly and too cheap in the kinds of biometrics devices. 24
35 4.5 Development Software use Macromedia Flash Fig. 4.4 Marcomedia Flash [26] Adobe Photoshop Fig. 4.5 Adobe Photoshop [27] These two design tools are very powerful and easy to use. It can help us to analysis all the design problems. And we can make many different effects by that two software. It is very popular and great. So that, we used the tools for our interface layout design. Programming tools Fig. 4.6 Visual Basic 6.0 [28] Visual Basic 6.0. It is very easy to learn. It seen that very simple and comfortable for user programming. Finally, it also is a popular programming tool in the common program company. 25
36 4.6 Software needs and setup The basic software needs to install of the system are below: Flash Player 8.0 TiFace Runtime TiFace SmartGate SDK Futronic Fingerprint SDK The server and driver of the system needs are below: MySQL Server 4.0.x MySQL ODBC 3.51 Driver For easy to manage the database, we suggest to install these software are below: MySQL Administrator MySQL Query Browser Now, I will show you how to create new database account and restore the table in database form sql backup file. Step1. Use MySQL Administrator to create a new account. The MySQL user and password also is ive. Then, click Apply changes. The user will be created. Fig. 4.7 Create MySQL user 26
37 Step2. Open the sql backup file to restore the table needs in the database. It will create the schema ive_fyp automatically. Fig. 4.8 Restore the backup file Next, I will show how to share the folder. This folder is used to store householder and visitor s template and photo. Step1. Create a folder userdata in your any local drive. E.g.: C drive. Step2. Share this folder and set the permission of Everyone to Full control. Fig. 4.9 Permission of the folder 27
38 Step3. Create two folders householder and visitor in the userdata folder. Fig Folder of householder and visitor Then, I will show you how to change the server ip of the system connect. Step1. Open the config.ini file in the same level of folder. Step2. Modify the IP and enter the correct server IP. For example, you MySQL server s IP is So, you should enter the serverip= And the template file and photo also store in this server. Important: If your MySQL server is setup on localhost, you must enter Database structure Relational between tables Fig Database Structure of Systems 28
39 4.7.2 Householder Table: fyp_tblhouseholder Description: Store the detail of householder Key Field Name Data Type Description intholderid INT(5) HouseHolder s ID chrholdername VARCHAR(255) HouseHolder s Name chrgender CHAR(1) HouseHolder s Gender datbirth DATE HouseHolder Birthday chrhkid VARCHAR(11) HouseHolder s HKID Number datregdate DATE Register Date chruserdata VARCHAR(64) Template Filename of Face Enroll intbuildingid INT(2) Building ID intffid INT(3) Floor and Flat ID Table 4.1 Database structure of householder Householder Log Table: fyp_tblholderlog Description: Store the log of householder login Key Field Name Data Type Description intlogid INT(8) Log ID intholderid INT(5) Householder s ID datintime DATETIME Login Date and Time Table 4.2 Database structure of householder log 29
40 4.7.4 Visitor Table: fyp_tblvisitor Description: Store the detail and log of visitor Key Field Name Data Type Description intvisitorid INT(8) Visitor s ID chrfacedata VARCHAR(64) Template Filename of Face Enroll chrfingerdata VARCHAR(64) Template Filename of Fingerprint Enroll datentry DATETIME Entry Date and Time intbuildingid INT(2) Building ID of Visitor visit intffid INT(3) Floor and Flat ID of Visitor visit Table 4.3 Database structure of visitor Building Table: fyp_tblbuilding Description: Store the name of building Key Field Name Data Type Description intbuildingid INT(2) Building ID chrbuildingname VARCHAR(255) Building Name Table 4.4 Database structure of building 30
41 4.7.6 Floor and Flat Table: fyp_tblfloorflat Description: Store the floor and flat Key Field Name Data Type Description intffid INT(3) Floor and Flat ID chrfloor CHAR(2) Floor Number chrflat CHAR(1) Flat Character Table 4.5 Database structure of floor and flat Clubhouse Table: fyp_tblclublog Description: Store the log of householder using clubhouse Key Field Name Data Type Description intlogid INT Log ID intholderid INT(5) Householder s ID datintime DATETIME Login Date and Time datouttime DATETIME Logout Date and Time intprice INT(5) Price of using clubhouse Table 4.6 Database structure of clubhouse 31
42 4.8 Graphics Design and Layout Administration Tools layout design Fig Main page of Administration Tools 1. Menu bar Fig Database Management of Householder 1. Query search 2. List of the householder 3. Add new householder 4. Edit selected householder 5. Delete selected householder 6. Refresh the List of householder 32
43 Fig Entry Log of Householder 1. List of entry log 2. Query search Fig Entry Log of Visitor 1. List of Entry Log 2. Query search 3. Photo of the visitor 33
44 4.8.2 Building security system layout design Fig Selection mode of building security system 1. Date and Time 2. Mode selection button Fig Householder mode of building security system 1. Date and Time 2. Camera box 3. Message box 4. Exit button 34
45 Fig Visitor mode of building security system 1. Date and Time 2. Display of floor and flat 3. Message box 4. Number and character keypad 5. Exit button Clubhouse system layout Fig Language Selection mode of clubhouse system 1. Mode selection button 35
46 Fig Selection mode of clubhouse system 1. Mode selection button Fig Login mode of clubhouse system 1. Camera box 2. Message box 3. Login button 36
47 Fig Choose facilities mode of clubhouse system 1. Camera box 2. Message box 3. Login button 4. Facilities button Fig Logout mode of clubhouse system 1. Camera box 2. Message box 3. Logout button 37
48 Chapter 5 Evaluation of Multi-Biometrics Recognition Systems 5.1 Overview We would like to tell you our biometric system. It s all of good points in the popular area. And we also have any short points for future improvement. 5.2 Principle of Biometric Enrolment and Verification For the good side, people no need to remember the word of password for entry to their building. They no need to use any key or find other people to help them open the door. Our biometric system can easy to help people only put their face in front of the camera for open the door. It seen that it is very convenience, comfortable and user-friendly to our customer. For the bad side, when a householder sometime wears glasses, sometime not wear glasses. Our facial recognition system may verify failed for their glasses or cap. It is because our system is followed the capture face data to compare the person s face. If the person wear glasses or cap, it may verify failed. On the other hand, if the area has not enough light. It also may distort the verify %. It is because if the area has not enough light, then the camera can not capture the face data fully and immediately. 5.3 Summary In fact, all of the technology also has good and bad points. Facial recognition system also has that two points. But Biometric system really can help people to make the world convenience and more easy. So that, biometric system also can help human to analysis many problems. We may improve the biometric technology as soon as possible. It is because it may be the future one of the main technology. 38
49 Chapter 6 Application Procedure of Multi-Biometrics Recognition Systems 6.1 Administration Tools Add new householder Step1. Select Householder -> Database Management in menu bar. Fig. 6.1 Select Database Management Step2. Click the Add New button. Fig. 6.2 Click the Add New button 39
50 Step3. The Add user windows will appear. Enter the detail of householder. Fig. 6.3 Add user windows Step4. Click the Start button to open the camera and click Enroll button to make a face enrollment. Fig. 6.4 Procedure of face enrollment 40
51 Step5. The successful message will be appear when the face enrollment success. Fig. 6.5 Successful message of face enrollment Step6. Click the Save button after enroll the face and enter the detail. The tools will add new householder in database and show the successful message. Fig. 6.6 Successful message of add new householder 41
52 Step7. If you do not enroll the face before click the Save button, the tools will show the error message and tell you enroll the face. Fig. 6.7 Error message of add new householder Step8. The tools will show you the new householder in the list. Fig. 6.8 New householder in the list 42
53 6.1.2 Edit householder Step1. Select the householder you want to edit in the list, and then click Edit button. Fig. 6.9 Click the Edit button Step2. Click the Start button to open the camera and click Enroll button to make a new face enrollment. Fig Enroll new face 43
54 Step3. The successful message will be appear when the face enrollment success. Fig Successful message of face enrollment Step4. Click the Save button after enroll the face and modify the detail. The tools will update householder in database and show the successful message. Fig Successful message of update householder 44
55 6.1.3 Delete householder Step1. Select the householder in the list and click Delete button. Fig Delete the householder Step2. The tools will ask you confirm to delete. Fig Confirm to delete householder 45
56 6.1.4 Householder entry log Step1. Select Householder -> Entry Log in menu bar. Fig Select Entry Log of householder Step2. Enter the householder ID or name and select the range of date to search the log. Fig Query of Householder Entry Log 46
57 Step3. The tools will show the result. Fig Result of Householder Entry Log Visitor entry log Step1. Select Visitor -> Entry Log in menu bar. Fig Select Entry Log of visitor 47
58 Step2. Select the date and building Fig Query of Visitor Entry Log Step3. You can select the visitor in the list and it will show the photo of visitor. Fig Show the photo of visitor 48
59 6.2 Building Security System Householder Mode Step1. Press the Householder button. Fig Mode selection of Building Security System Step2. The systems will identify after 3 seconds automatically. No needs enter any button. Fig Procedure of identify the householder 49
60 Step3. If the systems cannot identify you, it will show the error message and identify after 3 seconds again. Fig Error message when cannot identify the householder Step4. If success to identify, the systems will show your name and show you the success message. The door will be open. Fig Householder identify complete 50
61 6.2.2 Visitor Mode Step1. Press the Visitor button. Fig Mode selection of Building Security System Step2. Enter the floor and flat you want to go. Then, press the Enter button. Also, you can the Clear button when you enter wrong floor and flat. Fig Procedure of enter the floor and flat 51
62 Step3. Our floor range is 1 to 15. If you enter large than 15, you will get the error message and enter the correct floor. Fig Error message of enter wrong floor Step4. Press the button to capture your face when you are ready in front of the camera. After press the button, the systems will countdown 3 seconds to capture automatically. Fig Procedure of face capture 52
63 Step5. Put your any finger on the fingerprint device to capture your finger. It needs to capture 3 times. Fig Procedure of fingerprint capture Step6. After face and fingerprint capture, the systems will save your data in database and open the door. Fig Visitor register complete 53
64 6.3 Clubhouse system Process of clubhouse login and logout system Step1. You can see the selection page. When you want to login clubhouse, you can press the 登 入 button Fig Step 1 of process clubhouse system Step2. The login page is opened. You can see the monitor and message. In this moment, you need to put your face in front of the camera. Fig Step 2 of process clubhouse system 54
65 Step3. When you are our householder, our database will find your face data. The system will let you pass the login process and click the login button for verifies. Fig Step 3 of process clubhouse system Step4. When you login successful, our database should store your login time record. Fig Step 4 of process clubhouse system 55
66 Step5. When you want to leave our clubhouse, you must logout our system. It is as same as login part. You also put on your face in front of the camera. Our database will record your logout time automatically. Fig Step 5 of process clubhouse system Step6. When you logout successful, our database should store your logout time record. Fig Step 6 of process clubhouse system 56
67 6.3.2 Process of clubhouse payroll system Step1. When you pay the clubhouse free, you may go to our clubhouse payroll system. Fig Step 1 of process clubhouse payroll system Step2. You also put your face in front of our camera. Our database will search your login and logout time for calculates the price for clubhouse payment. Fig Step 2 of process of clubhouse payroll system 57
68 Step3. When you pay the money to our staff, our database should store your payment record. Fig Step 3 of process of clubhouse payroll system 58
69 Chapter 7 Verification of the Multi-Biometrics Recognition Systems 7.1 Overview In this part, we would like to represent our system s verification result of facial recognition. We will test it 20 times to get the result of its FAR and FRR. It cans test the reliable and accuracy of the system. 7.2 Verification of Result FAR and FRR of Facial recognition: No. of correct acceptance (a) No. of false rejection (b) False Rejection Rate (FRR) b / (a + b) Table 7.1 FRR rate of facial recognition No. of correct rejection (a) No. of false acceptance (b) False Acceptance Rate (FAR) b / (a + b) Table 7.2 FAR rate of facial recognition 7.3 Summary To summarize, the FRR of facial recognition is a little bit high. It is 0.25%. Sometimes, it cannot verify properly. It is because the light, glasses, cap may affect the system to verify. Although the FRR is a little bit high, the FAR is 0. It shows that the system have a high reliable. And the system have a high accuracy to verify the user. 59
70 Chapter 8 Conclusions and Further Development 8.1 Overview Base on the important of biometrics technology, it is popular and user-friendly to displace many older technologies and systems in the future technology development. 8.2 Contribution of Final Year Project The achievements and contributions of this project can be summarizes as follows:- We are developed the three parts of the recognition system. There are Administration Tools, Building Security System and Clubhouse System. It is ready to apply in the building. This recognition is convenience and safety for security management. We also need to improve our technology, security and method for biometrics system built up process and developed any great ideas. They are no need to remember the word of password for house entry. It is because the entry password always changed a time. The householder may forget the password or remember the wrong one. Now, they only use their face to make an entry and no need to bring smartcard and remember the password. 8.3 Discussion on the Project Limitation When a person sometime wears glasses, sometime not wear glasses. Our facial recognition system may verify failed for their glasses or cap. It is because our system is followed the capture face data to compare the person s face. So, the person enrolls the face record that he has no wear any glasses or anything on his face. If the person wears glasses or cap to verify, it may verify failed. On the other hand, if the area has not enough light or in a dark area. It also may distort the verify %. It may verify failed. It is because if the area has not enough light, then the camera cannot capture the face data fully and immediately. 60
71 8.4 Further Proposal After this project, we have other further ideas. The further ideas are below:- Administration Tools can generate the report of householder or visitor. Add Chinese interface of the building security system. Send the or signal to householder when visitor come. Payroll monthly statement for members. Car entry and exit recognition system for car park Use face recognition to identify the householder and open the gate Record the entry and exit log for security The householder no need to bring the car park card for entry used 61
72 References [1] Introduction of Biometrics [2] History of Biometrics [3] How does it work? [4] Applications in Biometrics [5] Fig. 2.1 Biometric identification and encrypted data system [6] Fig. 2.2 Biometric access control system (Exys Security system) [7] Fig. 2.3 Country entry and exit control system [8] Fig. 2.4 Hand geometry control system [9] Fig. 2.5 Biometric experiment system [10] Fig. 2.6 Presse Fotos ekey fingerprint system [11] Fig. 2.7 Biometric reader clocking system [12] Fig. 2.8 Office access control system [13] Fig. 2.9 Windows lcqon recognition system [14] Fig Breaker facial searching system [15] Fig Biometric Patient Tracking System [16] Fig fingerid system with biometrics in USA [17] Introduction of fingerprint recognition [18] Fig. 3.1 Types of fingerprint 62
73 [19] Fig. 3.2 Optical Fingerprint Sensors [20] Fig. 3.3 Surface Pressure Sensor [21] Fig. 3.4 Capacitive Sensors [22] Introduction of facial recognition [23] Fig. 3.5 Facial geometry example [24] Fig. 3.6 Correct recognition example [25] Fig. 3.7 Facial recognition in airport [26] Fig. 4.1 Marcomedia Flash [27] Fig. 4.2 Adobe Photoshop [28] Fig. 4.3 Visual Basic Tutorial and example of VB and MySQL Tutorial of embedded Flash in VB
74 Appendices Appendix A: Team member workload Chan Ka Lun, Peae (leader) Design interface of Householder mode Design interface of Visitor mode Design interface of enrolment mode Design interface of administrator mode Programming of Householder mode Programming of Visitor mode Programming of enrolment mode Programming of administrator mode Build up database system Tsang Man Piu Design interface of Clubhouse login system Design interface of Clubhouse payroll system Programming of Clubhouse login system Programming of Clubhouse payroll system 64
75 Appendix B: Project plan PROJECT PLAN Course : 41381/3A Student Name : Chan Ka Lun, Tsang Man Piu Project Title : Apply Multi-Biometrics Recognition Systems for Intelligent House Management Project Supervisor : Mr. MK Lam Date : 7 October, 2005 (Week 4) Project Objective(s) : - Developed to use human s face and fingerprint to in place of the words of password and key. - Development of Multi-Biometrics Recognition System to instead of traditional security Survey & Research Work flow & Database draft design Interface draft design Read SmartGate s manual and SDK Read Futronic Fingerprint SDK Database & Interface programming Programming Week No Testing Project report & presentation Project Resources Plan Equipment: PC with development environment Webcam Fingerprint device Touch screen Tools: Microsoft Visio for drawing diagram Microsoft Word for typing report Microsoft PowerPoint for presentation Adobe Photoshop for interface design Macromedia Flash for interface design Microsoft Visual Basic 6.0 for system programming Titanium SmartGate Biometric System SDK Futronic Fingerprint SDK 65
76 Appendix C: Programming code The class module of system CRijndael.cls This class module is used to generate the 64 character filename of the template. 1 Option Explicit 2 3 Private m_lonbits(30) As Long 4 Private m_l2power(30) As Long 5 Private m_bytonbits(7) As Byte 6 Private m_byt2power(7) As Byte 7 8 Private m_inco(3) As Byte 9 10 Private m_fbsub(255) As Byte 11 Private m_rbsub(255) As Byte 12 Private m_ptab(255) As Byte 13 Private m_ltab(255) As Byte 14 Private m_ftable(255) As Long 15 Private m_rtable(255) As Long 16 Private m_rco(29) As Long Private m_nk As Long 19 Private m_nb As Long 20 Private m_nr As Long 21 Private m_fi(23) As Byte 22 Private m_ri(23) As Byte 23 Private m_fkey(119) As Long 24 Private m_rkey(119) As Long Private Declare Sub CopyMemory Lib "kernel32" Alias "RtlMoveMemory" _ 27 (ByVal Destination As Any, ByVal Source As Any, ByVal Length As Long) '******************************************************************************* 30 ' Class_Initialize (SUB) 31 '******************************************************************************* 32 Private Sub Class_Initialize() 33 m_inco(0) = &HB 34 m_inco(1) = &HD 35 m_inco(2) = &H9 36 m_inco(3) = &HE ' Could have done this with a loop calculating each value, but simply 39 ' assigning the values is quicker - BITS SET FROM RIGHT 40 m_bytonbits(0) = 1 ' m_bytonbits(1) = 3 ' m_bytonbits(2) = 7 ' m_bytonbits(3) = 15 ' m_bytonbits(4) = 31 ' m_bytonbits(5) = 63 ' m_bytonbits(6) = 127 ' m_bytonbits(7) = 255 ' ' Could have done this with a loop calculating each value, but simply 50 ' assigning the values is quicker - POWERS OF 2 51 m_byt2power(0) = 1 ' m_byt2power(1) = 2 ' m_byt2power(2) = 4 ' m_byt2power(3) = 8 ' m_byt2power(4) = 16 ' m_byt2power(5) = 32 ' m_byt2power(6) = 64 ' m_byt2power(7) = 128 ' ' Could have done this with a loop calculating each value, but simply 61 ' assigning the values is quicker - BITS SET FROM RIGHT 62 m_lonbits(0) = 1 ' m_lonbits(1) = 3 ' m_lonbits(2) = 7 '
77 65 m_lonbits(3) = 15 ' m_lonbits(4) = 31 ' m_lonbits(5) = 63 ' m_lonbits(6) = 127 ' m_lonbits(7) = 255 ' m_lonbits(8) = 511 ' m_lonbits(9) = 1023 ' m_lonbits(10) = 2047 ' m_lonbits(11) = 4095 ' m_lonbits(12) = 8191 ' m_lonbits(13) = ' m_lonbits(14) = ' m_lonbits(15) = ' m_lonbits(16) = ' m_lonbits(17) = ' m_lonbits(18) = ' m_lonbits(19) = ' m_lonbits(20) = ' m_lonbits(21) = ' m_lonbits(22) = ' m_lonbits(23) = ' m_lonbits(24) = ' m_lonbits(25) = ' m_lonbits(26) = ' m_lonbits(27) = ' m_lonbits(28) = ' m_lonbits(29) = ' m_lonbits(30) = ' ' Could have done this with a loop calculating each value, but simply 95 ' assigning the values is quicker - POWERS OF 2 96 m_l2power(0) = 1 ' m_l2power(1) = 2 ' m_l2power(2) = 4 ' m_l2power(3) = 8 ' m_l2power(4) = 16 ' m_l2power(5) = 32 ' m_l2power(6) = 64 ' m_l2power(7) = 128 ' m_l2power(8) = 256 ' m_l2power(9) = 512 ' m_l2power(10) = 1024 ' m_l2power(11) = 2048 ' m_l2power(12) = 4096 ' m_l2power(13) = 8192 ' m_l2power(14) = ' m_l2power(15) = ' m_l2power(16) = ' m_l2power(17) = ' m_l2power(18) = ' m_l2power(19) = ' m_l2power(20) = ' m_l2power(21) = ' m_l2power(22) = ' m_l2power(23) = ' m_l2power(24) = ' m_l2power(25) = ' m_l2power(26) = ' m_l2power(27) = ' m_l2power(28) = ' m_l2power(29) = ' m_l2power(30) = ' End Sub '******************************************************************************* 130 ' LShift (FUNCTION) 131 '******************************************************************************* 132 Private Function LShift(ByVal lvalue As Long, _ 133 ByVal ishiftbits As Integer) As Long 134 If ishiftbits = 0 Then 135 LShift = lvalue 136 Exit Function 137 ElseIf ishiftbits = 31 Then 138 If lvalue And 1 Then 139 LShift = &H Else 67
78 141 LShift = End If 143 Exit Function 144 ElseIf ishiftbits < 0 Or ishiftbits > 31 Then 145 Err.Raise End If If (lvalue And m_l2power(31 - ishiftbits)) Then 149 LShift = ((lvalue And m_lonbits(31 - (ishiftbits + 1))) * _ 150 m_l2power(ishiftbits)) Or &H Else 152 LShift = ((lvalue And m_lonbits(31 - ishiftbits)) * _ 153 m_l2power(ishiftbits)) 154 End If 155 End Function '******************************************************************************* 158 ' RShift (FUNCTION) 159 '******************************************************************************* 160 Private Function RShift(ByVal lvalue As Long, _ 161 ByVal ishiftbits As Integer) As Long 162 If ishiftbits = 0 Then 163 RShift = lvalue 164 Exit Function 165 ElseIf ishiftbits = 31 Then 166 If lvalue And &H Then 167 RShift = Else 169 RShift = End If 171 Exit Function 172 ElseIf ishiftbits < 0 Or ishiftbits > 31 Then 173 Err.Raise End If RShift = (lvalue And &H7FFFFFFE) \ m_l2power(ishiftbits) If (lvalue And &H ) Then 179 RShift = (RShift Or (&H \ m_l2power(ishiftbits - 1))) 180 End If 181 End Function '******************************************************************************* 184 ' LShiftByte (FUNCTION) 185 '******************************************************************************* 186 Private Function LShiftByte(ByVal bytvalue As Byte, _ 187 ByVal bytshiftbits As Byte) As Byte 188 If bytshiftbits = 0 Then 189 LShiftByte = bytvalue 190 Exit Function 191 ElseIf bytshiftbits = 7 Then 192 If bytvalue And 1 Then 193 LShiftByte = &H Else 195 LShiftByte = End If 197 Exit Function 198 ElseIf bytshiftbits < 0 Or bytshiftbits > 7 Then 199 Err.Raise End If LShiftByte = ((bytvalue And m_bytonbits(7 - bytshiftbits)) * _ 203 m_byt2power(bytshiftbits)) 204 End Function '******************************************************************************* 207 ' RShiftByte (FUNCTION) 208 '******************************************************************************* 209 Private Function RShiftByte(ByVal bytvalue As Byte, _ 210 ByVal bytshiftbits As Byte) As Byte 211 If bytshiftbits = 0 Then 212 RShiftByte = bytvalue 213 Exit Function 214 ElseIf bytshiftbits = 7 Then 215 If bytvalue And &H80 Then 216 RShiftByte = 1 68
79 217 Else 218 RShiftByte = End If 220 Exit Function 221 ElseIf bytshiftbits < 0 Or bytshiftbits > 7 Then 222 Err.Raise End If RShiftByte = bytvalue \ m_byt2power(bytshiftbits) 226 End Function '******************************************************************************* 229 ' RotateLeft (FUNCTION) 230 '******************************************************************************* 231 Private Function RotateLeft(ByVal lvalue As Long, _ 232 ByVal ishiftbits As Integer) As Long 233 RotateLeft = LShift(lValue, ishiftbits) Or RShift(lValue, (32 - ishiftbits)) 234 End Function ''******************************************************************************* 237 '' RotateLeftByte (FUNCTION) 238 '******************************************************************************* 239 Private Function RotateLeftByte(ByVal bytvalue As Byte, _ 240 ByVal bytshiftbits As Byte) As Byte 241 RotateLeftByte = LShiftByte(bytValue, bytshiftbits) Or _ 242 RShiftByte(bytValue, (8 - bytshiftbits)) 243 End Function '******************************************************************************* 246 ' Pack (FUNCTION) 247 '******************************************************************************* 248 Private Function Pack(b() As Byte) As Long 249 Dim lcount As Long 250 Dim ltemp As Long For lcount = 0 To ltemp = b(lcount) 254 Pack = Pack Or LShift(lTemp, (lcount * 8)) 255 Next 256 End Function '******************************************************************************* 259 ' PackFrom (FUNCTION) 260 '******************************************************************************* 261 Private Function PackFrom(b() As Byte, _ 262 ByVal k As Long) As Long 263 Dim lcount As Long 264 Dim ltemp As Long For lcount = 0 To ltemp = b(lcount + k) 268 PackFrom = PackFrom Or LShift(lTemp, (lcount * 8)) 269 Next 270 End Function '******************************************************************************* 273 ' Unpack (SUB) 274 '******************************************************************************* 275 Private Sub Unpack(ByVal a As Long, _ 276 b() As Byte) 277 b(0) = a And m_lonbits(7) 278 b(1) = RShift(a, 8) And m_lonbits(7) 279 b(2) = RShift(a, 16) And m_lonbits(7) 280 b(3) = RShift(a, 24) And m_lonbits(7) 281 End Sub '******************************************************************************* 284 ' UnpackFrom (SUB) 285 '******************************************************************************* 286 Private Sub UnpackFrom(ByVal a As Long, _ 287 b() As Byte, _ 288 ByVal k As Long) 289 b(0 + k) = a And m_lonbits(7) 290 b(1 + k) = RShift(a, 8) And m_lonbits(7) 291 b(2 + k) = RShift(a, 16) And m_lonbits(7) 292 b(3 + k) = RShift(a, 24) And m_lonbits(7) 69
80 293 End Sub '******************************************************************************* 296 ' xtime (FUNCTION) 297 '******************************************************************************* 298 Private Function xtime(byval a As Byte) As Byte 299 Dim b As Byte If (a And &H80) Then 302 b = &H1B 303 Else 304 b = End If a = LShiftByte(a, 1) 308 a = a Xor b xtime = a 311 End Function '******************************************************************************* 314 ' bmul (FUNCTION) 315 '******************************************************************************* 316 Private Function bmul(byval x As Byte, _ 317 y As Byte) As Byte 318 If x <> 0 And y <> 0 Then 319 bmul = m_ptab((clng(m_ltab(x)) + CLng(m_ltab(y))) Mod 255) 320 Else 321 bmul = End If 323 End Function '******************************************************************************* 326 ' SubByte (FUNCTION) 327 '******************************************************************************* 328 Private Function SubByte(ByVal a As Long) As Long 329 Dim b(3) As Byte Unpack a, b 332 b(0) = m_fbsub(b(0)) 333 b(1) = m_fbsub(b(1)) 334 b(2) = m_fbsub(b(2)) 335 b(3) = m_fbsub(b(3)) SubByte = Pack(b) 338 End Function '******************************************************************************* 341 ' product (FUNCTION) 342 '******************************************************************************* 343 Private Function product(byval x As Long, _ 344 ByVal y As Long) As Long 345 Dim xb(3) As Byte 346 Dim yb(3) As Byte Unpack x, xb 349 Unpack y, yb 350 product = bmul(xb(0), yb(0)) Xor bmul(xb(1), yb(1)) Xor bmul(xb(2), yb(2)) _ 351 Xor bmul(xb(3), yb(3)) 352 End Function '******************************************************************************* 355 ' InvMixCol (FUNCTION) 356 '******************************************************************************* 357 Private Function InvMixCol(ByVal x As Long) As Long 358 Dim y As Long 359 Dim m As Long 360 Dim b(3) As Byte m = Pack(m_InCo) 363 b(3) = product(m, x) 364 m = RotateLeft(m, 24) 365 b(2) = product(m, x) 366 m = RotateLeft(m, 24) 367 b(1) = product(m, x) 368 m = RotateLeft(m, 24) 70
81 369 b(0) = product(m, x) 370 y = Pack(b) InvMixCol = y 373 End Function '******************************************************************************* 376 ' ByteSub (FUNCTION) 377 '******************************************************************************* 378 Private Function ByteSub(ByVal x As Byte) As Byte 379 Dim y As Byte y = m_ptab(255 - m_ltab(x)) 382 x = y 383 x = RotateLeftByte(x, 1) 384 y = y Xor x 385 x = RotateLeftByte(x, 1) 386 y = y Xor x 387 x = RotateLeftByte(x, 1) 388 y = y Xor x 389 x = RotateLeftByte(x, 1) 390 y = y Xor x 391 y = y Xor &H ByteSub = y 394 End Function '******************************************************************************* 397 ' gentables (SUB) 398 '******************************************************************************* 399 Public Sub gentables() 400 Dim i As Long 401 Dim y As Byte 402 Dim b(3) As Byte 403 Dim ib As Byte m_ltab(0) = m_ptab(0) = m_ltab(1) = m_ptab(1) = m_ltab(3) = For i = 2 To m_ptab(i) = m_ptab(i - 1) Xor xtime(m_ptab(i - 1)) 413 m_ltab(m_ptab(i)) = i 414 Next m_fbsub(0) = &H m_rbsub(&h63) = For i = 1 To ib = i 421 y = ByteSub(ib) 422 m_fbsub(i) = y 423 m_rbsub(y) = i 424 Next y = For i = 0 To m_rco(i) = y 429 y = xtime(y) 430 Next For i = 0 To y = m_fbsub(i) 434 b(3) = y Xor xtime(y) 435 b(2) = y 436 b(1) = y 437 b(0) = xtime(y) 438 m_ftable(i) = Pack(b) y = m_rbsub(i) 441 b(3) = bmul(m_inco(0), y) 442 b(2) = bmul(m_inco(1), y) 443 b(1) = bmul(m_inco(2), y) 444 b(0) = bmul(m_inco(3), y) 71
82 445 m_rtable(i) = Pack(b) 446 Next 447 End Sub '******************************************************************************* 450 ' gkey (SUB) 451 '******************************************************************************* 452 Public Sub gkey(byval nb As Long, _ 453 ByVal nk As Long, _ 454 key() As Byte) Dim i As Long 457 Dim j As Long 458 Dim k As Long 459 Dim m As Long 460 Dim N As Long 461 Dim C1 As Long 462 Dim C2 As Long 463 Dim C3 As Long 464 Dim CipherKey(7) As Long m_nb = nb 467 m_nk = nk If m_nb >= m_nk Then 470 m_nr = 6 + m_nb 471 Else 472 m_nr = 6 + m_nk 473 End If C1 = If m_nb < 8 Then 477 C2 = C3 = Else 480 C2 = C3 = End If For j = 0 To nb m = j * m_fi(m) = (j + C1) Mod nb 488 m_fi(m + 1) = (j + C2) Mod nb 489 m_fi(m + 2) = (j + C3) Mod nb 490 m_ri(m) = (nb + j - C1) Mod nb 491 m_ri(m + 1) = (nb + j - C2) Mod nb 492 m_ri(m + 2) = (nb + j - C3) Mod nb 493 Next N = m_nb * (m_nr + 1) For i = 0 To m_nk j = i * CipherKey(i) = PackFrom(key, j) 500 Next For i = 0 To m_nk m_fkey(i) = CipherKey(i) 504 Next j = m_nk 507 k = Do While j < N 509 m_fkey(j) = m_fkey(j - m_nk) Xor _ 510 SubByte(RotateLeft(m_fkey(j - 1), 24)) Xor m_rco(k) 511 If m_nk <= 6 Then 512 i = Do While i < m_nk And (i + j) < N 514 m_fkey(i + j) = m_fkey(i + j - m_nk) Xor _ 515 m_fkey(i + j - 1) 516 i = i Loop 518 Else 519 ' Problem fixed here 520 i = 1 72
83 521 Do While i < 4 And (i + j) < N 522 m_fkey(i + j) = m_fkey(i + j - m_nk) Xor _ 523 m_fkey(i + j - 1) 524 i = i Loop 526 If j + 4 < N Then 527 m_fkey(j + 4) = m_fkey(j m_nk) Xor _ 528 SubByte(m_fkey(j + 3)) 529 End If 530 i = Do While i < m_nk And (i + j) < N 532 m_fkey(i + j) = m_fkey(i + j - m_nk) Xor _ 533 m_fkey(i + j - 1) 534 i = i Loop 536 End If j = j + m_nk 539 k = k Loop For j = 0 To m_nb m_rkey(j + N - nb) = m_fkey(j) 544 Next i = m_nb 547 Do While i < N - m_nb 548 k = N - m_nb - i 549 For j = 0 To m_nb m_rkey(k + j) = InvMixCol(m_fkey(i + j)) 551 Next 552 i = i + m_nb 553 Loop j = N - m_nb 556 Do While j < N 557 m_rkey(j - N + m_nb) = m_fkey(j) 558 j = j Loop 560 End Sub '******************************************************************************* 563 ' encrypt (SUB) 564 '******************************************************************************* 565 Public Sub Encrypt(buff() As Byte) 566 Dim i As Long 567 Dim j As Long 568 Dim k As Long 569 Dim m As Long 570 Dim a(7) As Long 571 Dim b(7) As Long 572 Dim x() As Long 573 Dim y() As Long 574 Dim t() As Long For i = 0 To m_nb j = i * a(i) = PackFrom(buff, j) 580 a(i) = a(i) Xor m_fkey(i) 581 Next k = m_nb 584 x = a 585 y = b For i = 1 To m_nr For j = 0 To m_nb m = j * y(j) = m_fkey(k) Xor m_ftable(x(j) And m_lonbits(7)) Xor _ 591 RotateLeft(m_ftable(RShift(x(m_fi(m)), 8) And m_lonbits(7)), 8) Xor _ 592 RotateLeft(m_ftable(RShift(x(m_fi(m + 1)), 16) And m_lonbits(7)), 16) Xor _ 593 RotateLeft(m_ftable(RShift(x(m_fi(m + 2)), 24) And m_lonbits(7)), 24) 594 k = k Next 73
84 596 t = x 597 x = y 598 y = t 599 Next For j = 0 To m_nb m = j * y(j) = m_fkey(k) Xor m_fbsub(x(j) And m_lonbits(7)) Xor _ 604 RotateLeft(m_fbsub(RShift(x(m_fi(m)), 8) And m_lonbits(7)), 8) Xor _ 605 RotateLeft(m_fbsub(RShift(x(m_fi(m + 1)), 16) And m_lonbits(7)), 16) Xor _ 606 RotateLeft(m_fbsub(RShift(x(m_fi(m + 2)), 24) And m_lonbits(7)), 24) 607 k = k Next For i = 0 To m_nb j = i * UnpackFrom y(i), buff, j 613 x(i) = y(i) = Next 616 End Sub '******************************************************************************* 619 ' decrypt (SUB) 620 '******************************************************************************* 621 Public Sub Decrypt(buff() As Byte) 622 Dim i As Long 623 Dim j As Long 624 Dim k As Long 625 Dim m As Long 626 Dim a(7) As Long 627 Dim b(7) As Long 628 Dim x() As Long 629 Dim y() As Long 630 Dim t() As Long For i = 0 To m_nb j = i * a(i) = PackFrom(buff, j) 635 a(i) = a(i) Xor m_rkey(i) 636 Next k = m_nb 639 x = a 640 y = b For i = 1 To m_nr For j = 0 To m_nb m = j * y(j) = m_rkey(k) Xor m_rtable(x(j) And m_lonbits(7)) Xor _ 646 RotateLeft(m_rtable(RShift(x(m_ri(m)), 8) And m_lonbits(7)), 8) Xor _ 647 RotateLeft(m_rtable(RShift(x(m_ri(m + 1)), 16) And m_lonbits(7)), 16) Xor _ 648 RotateLeft(m_rtable(RShift(x(m_ri(m + 2)), 24) And m_lonbits(7)), 24) 649 k = k Next 651 t = x 652 x = y 653 y = t 654 Next For j = 0 To m_nb m = j * y(j) = m_rkey(k) Xor m_rbsub(x(j) And m_lonbits(7)) Xor _ 660 RotateLeft(m_rbsub(RShift(x(m_ri(m)), 8) And m_lonbits(7)), 8) Xor _ 661 RotateLeft(m_rbsub(RShift(x(m_ri(m + 1)), 16) And m_lonbits(7)), 16) Xor _ 662 RotateLeft(m_rbsub(RShift(x(m_ri(m + 2)), 24) And m_lonbits(7)), 24) 663 k = k Next For i = 0 To m_nb j = i * UnpackFrom y(i), buff, j 670 x(i) = 0 74
85 671 y(i) = Next 673 End Sub ''******************************************************************************* 676 '' CopyBytesASP (SUB) 677 '' 678 '' Slower non-api function you can use to copy array data 679 ''******************************************************************************* 680 'Private Sub CopyBytesASP(bytDest() As Byte, _ 681 ' ldeststart As Long, _ 682 ' bytsource() As Byte, _ 683 ' lsourcestart As Long, _ 684 ' llength As Long) 685 ' Dim lcount As Long 686 ' 687 ' lcount = ' Do 689 ' bytdest(ldeststart + lcount) = bytsource(lsourcestart + lcount) 690 ' lcount = lcount ' Loop Until lcount = llength 692 'End Sub '******************************************************************************* 695 ' IsInitialized (FUNCTION) 696 '******************************************************************************* 697 Private Function IsInitialized(ByRef varray As Variant) As Boolean 698 On Error Resume Next IsInitialized = IsNumeric(UBound(vArray)) 701 End Function '******************************************************************************* 704 ' EncryptData (FUNCTION) 705 ' 706 ' Takes the message, whatever the size, and password in one call and does 707 ' everything for you to return an encoded/encrypted message 708 '******************************************************************************* 709 Public Function EncryptData(bytMessage() As Byte, _ 710 bytpassword() As Byte) As Byte() 711 Dim bytkey(31) As Byte 712 Dim bytin() As Byte 713 Dim bytout() As Byte 714 Dim byttemp(31) As Byte 715 Dim lcount As Long 716 Dim llength As Long 717 Dim lencodedlength As Long 718 Dim bytlen(3) As Byte 719 Dim lposition As Long If Not IsInitialized(bytMessage) Then 722 Exit Function 723 End If 724 If Not IsInitialized(bytPassword) Then 725 Exit Function 726 End If ' Use first 32 bytes of the password for the key 729 For lcount = 0 To UBound(bytPassword) 730 bytkey(lcount) = bytpassword(lcount) 731 If lcount = 31 Then 732 Exit For 733 End If 734 Next ' Prepare the key; assume 256 bit block and key size 737 gentables 738 gkey 8, 8, bytkey ' We are going to put the message size on the front of the message 741 ' in the first 4 bytes. If the length is more than a max int we are 742 ' in trouble 743 llength = UBound(bytMessage) lencodedlength = llength ' The encoded length includes the 4 bytes stuffed on the front 75
86 747 ' and is padded out to be modulus If lencodedlength Mod 32 <> 0 Then 749 lencodedlength = lencodedlength (lencodedlength Mod 32) 750 End If 751 ReDim bytin(lencodedlength - 1) 752 ReDim bytout(lencodedlength - 1) ' Put the length on the front 755 '* Unpack llength, bytin 756 CopyMemory VarPtr(bytIn(0)), VarPtr(lLength), ' Put the rest of the message after it 758 '* CopyBytesASP bytin, 4, bytmessage, 0, llength 759 CopyMemory VarPtr(bytIn(4)), VarPtr(bytMessage(0)), llength ' Encrypt a block at a time 762 For lcount = 0 To lencodedlength - 1 Step '* CopyBytesASP byttemp, 0, bytin, lcount, CopyMemory VarPtr(bytTemp(0)), VarPtr(bytIn(lCount)), Encrypt byttemp 766 '* CopyBytesASP bytout, lcount, byttemp, 0, CopyMemory VarPtr(bytOut(lCount)), VarPtr(bytTemp(0)), Next EncryptData = bytout 771 End Function '******************************************************************************* 774 ' DecryptData (FUNCTION) 775 ' 776 ' Opposite of Encryptdata 777 '******************************************************************************* 778 Public Function DecryptData(bytIn() As Byte, _ 779 bytpassword() As Byte) As Byte() 780 Dim bytmessage() As Byte 781 Dim bytkey(31) As Byte 782 Dim bytout() As Byte 783 Dim byttemp(31) As Byte 784 Dim lcount As Long 785 Dim llength As Long 786 Dim lencodedlength As Long 787 Dim bytlen(3) As Byte 788 Dim lposition As Long If Not IsInitialized(bytIn) Then 791 Exit Function 792 End If 793 If Not IsInitialized(bytPassword) Then 794 Exit Function 795 End If lencodedlength = UBound(bytIn) If lencodedlength Mod 32 <> 0 Then 800 Exit Function 801 End If ' Use first 32 bytes of the password for the key 804 For lcount = 0 To UBound(bytPassword) 805 bytkey(lcount) = bytpassword(lcount) 806 If lcount = 31 Then 807 Exit For 808 End If 809 Next ' Prepare the key; assume 256 bit block and key size 812 gentables 813 gkey 8, 8, bytkey ' The output array needs to be the same size as the input array 816 ReDim bytout(lencodedlength - 1) ' Decrypt a block at a time 819 For lcount = 0 To lencodedlength - 1 Step '* CopyBytesASP byttemp, 0, bytin, lcount, CopyMemory VarPtr(bytTemp(0)), VarPtr(bytIn(lCount)), Decrypt byttemp 76
87 823 '* CopyBytesASP bytout, lcount, byttemp, 0, CopyMemory VarPtr(bytOut(lCount)), VarPtr(bytTemp(0)), Next ' Get the original length of the string from the first 4 bytes 828 '* llength = Pack(bytOut) 829 CopyMemory VarPtr(lLength), VarPtr(bytOut(0)), ' Make sure the length is consistent with our data 832 If llength > lencodedlength - 4 Then 833 Exit Function 834 End If ' Prepare the output message byte array 837 ReDim bytmessage(llength - 1) 838 '* CopyBytesASP bytmessage, 0, bytout, 4, llength 839 CopyMemory VarPtr(bytMessage(0)), VarPtr(bytOut(4)), llength DecryptData = bytmessage 842 End Function The modules of Futronic fingerprint in Building Security System FP_BiOpers.bas Control of Futronic fingerprint scanner 1 Public Const INVALID_HANDLE_VALUE = Declare Function VarPtrArray Lib "msvbvm60.dll" Alias "VarPtr" (Var() As Any) As Long 4 Declare Function VarPtr Lib "msvbvm60.dll" (Var As Any) As Long 5 6 Public Declare Function MessageBeep Lib "user32" (ByVal wtype As Long) As Long 7 Public Declare Function UpdateWindow Lib "user32" (ByVal hwnd As Long) As Long 8 Public LastSignal As Long 9 10 Dim i As Integer ' 14 ' cbcontrol - user's callback function for control the enrollment or 15 ' verification execution flow. 16 ' Argument list: 17 ' usrcontext (input) - user-defined context information; 18 ' StateMask (input) - a bit mask indicating what arguments are provided; 19 ' presponse (output) - API function execution control is achieved through 20 ' this value; 21 ' Signal (input) - this signal should be used to interact with a user; 22 ' pbitmap (input) - a pointer to the bitmap to be displayed. 23 ' 24 Sub cbcontrol(byval usrcontext As Byte, ByVal StateMask As Long, ByVal presponse As Long, _ 25 ByVal Signal As Long, ByRef pbitmap As FTR_BITMAP) ' frame show 28 If (StateMask And FTR_STATE_FRAME_PROVIDED) = FTR_STATE_FRAME_PROVIDED Then 29 UpdateImage (pbitmap.ftrbitmap.pdata) 30 End If ' message print 33 If (StateMask And FTR_STATE_SIGNAL_PROVIDED) = FTR_STATE_SIGNAL_PROVIDED Then 34 If Signal <> LastSignal Then 35 Select Case Signal 36 Case FTR_SIGNAL_TOUCH_SENSOR 37 'Demo.messagebox.Caption = "Put your finger on the scaner" 38 i = i V_Mode.FingerImage.Picture = V_Mode.FingerImageList.ListImages(i).Picture 40 UpdateWindow V_Mode.hwnd 41 Case FTR_SIGNAL_TAKE_OFF 42 'Demo.messagebox.Caption = "Take off your finger from the scaner" 43 i = i V_Mode.FingerImage.Picture = V_Mode.FingerImageList.ListImages(i).Picture 45 UpdateWindow V_Mode.hwnd 77
88 46 End Select 47 LastSignal = Signal 48 End If 49 End If presponse = FTR_CONTINUE 'reset the index of FingerImageList 54 If (i = 6) Then 55 i = 0 56 End If End Sub FP_DataBase.bas It is used to save the fingerprint template to drive and insert record to database. 1 Public Declare Sub CopyMemory Lib "kernel32" Alias "RtlMoveMemory" _ 2 (Destination As Any, Source As Any, ByVal Length As Long) 3 4 ' 5 ' AddRecord - add new record to database. 6 ' Argument list: 7 ' data - pointer of data for store; 8 ' dlen - size of data. 9 Function AddFinger(data As Long, dlen As Long, path As String, filename As String) As Boolean Dim key As String * key = "tester" ' write "DB record" LBound 16 FPName = path & filename & ".tml" 17 Open FPName For Binary Access Write As #1 18 Put #1,, dlen 19 Put #1,, key 20 Dim DataArr() As Byte 21 ReDim DataArr(dLen) 22 Call CopyMemory(DataArr(0), ByVal data, dlen) 23 Put #1,, DataArr 24 Close # End Function FP_SDK_API.bas It stores the API of Futronic fingerprint 1 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' 2 ' 3 ' Futronic SDK types 4 ' 5 6 ' Generic byte data. 7 Type FTR_DATA 8 dwsize As Long ' Length of data in bytes. 9 pdata As Long ' Data pointer. 10 End Type ' Futronic SDK image data 13 Type FTR_BITMAP 14 ftrwidth As Long ' width in pixels 15 ftrheight As Long ' height in pixels 16 ftrbitmap As FTR_DATA ' bitmap as FTR_DATA type 17 End Type ' Array of identify records 20 Type FTR_IDENTIFY_ARRAY 21 TotalNumber As Long ' number of FTR_IDENTIFY_RECORD 22 pmembers As Long ' pointer on FTR_IDENTIFY_RECORD type 78
89 23 End Type ' Identify record description 26 Type FTR_IDENTIFY_RECORD 27 KeyValue As String * 16 ' external key 28 pdata As Long ' pointer on FTR_DATA type 29 End Type ' Match record description 32 Type FTR_MATCHED_RECORD 33 KeyValue As String * 16 ' external key 34 FarAttained As Long 35 End Type ' Array of match records 38 Type FTR_MATCHED_ARRAY 39 TotalNumber As Long ' number of FTR_MATCHED_RECORD 40 pmembers As Long ' pointer on FTR_MATCHED_RECORD 41 End Type ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' 45 ' 46 ' Futronic SDK constants 47 ' ' Return code values. 50 Public Const FTR_RETCODE_ERROR_BASE As Integer = 1 ' Base value for the error codes. 51 Public Const FTR_RETCODE_DEVICE_BASE As Integer = 200 ' Base value for the device error codes Public Const FTR_RETCODE_OK As Integer = 0 ' Successful function completion Public Const FTR_RETCODE_NO_MEMORY As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_INVALID_ARG As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_ALREADY_IN_USE As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_INVALID_PURPOSE As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_INTERNAL_ERROR As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_UNABLE_TO_CAPTURE As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_CANCELED_BY_USER As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_NO_MORE_RETRIES As Integer = FTR_RETCODE_ERROR_BASE Public Const FTR_RETCODE_FRAME_SOURCE_NOT_SET As Integer = FTR_RETCODE_DEVICE_BASE Public Const FTR_RETCODE_DEVICE_NOT_CONNECTED As Integer = FTR_RETCODE_DEVICE_BASE Public Const FTR_RETCODE_DEVICE_FAILURE As Integer = FTR_RETCODE_DEVICE_BASE Public Const FTR_RETCODE_EMPTY_FRAME As Integer = FTR_RETCODE_DEVICE_BASE ' Values used for the parameter definition (FTRSetParam and FTRGetParam). 70 Public Const FTR_PARAM_IMAGE_WIDTH As Long = 1 71 Public Const FTR_PARAM_IMAGE_HEIGHT As Long = 2 72 Public Const FTR_PARAM_IMAGE_SIZE As Long = 3 73 Public Const FTR_PARAM_CB_FRAME_SOURCE As Long = 4 74 Public Const FTR_PARAM_CB_CONTROL As Long = 5 75 Public Const FTR_PARAM_MAX_TEMPLATE_SIZE As Long = 6 76 Public Const FTR_PARAM_MAX_FAR_REQUESTED As Long = 7 77 Public Const FTR_PARAM_MAX_MODELS As Long = ' Available frame sources. These device identifiers are intended to be used 79 ' with the FTR_PARAM_CB_FRAME_SOURCE parameter. 80 Public Const FSD_FUTRONIC_USB As Long = 1 ' Futronic USB Fingerprint Scanner Device ' 83 ' User callback function definitions 84 ' 85 ' State bit mask values for user callback function. 86 Public Const FTR_STATE_FRAME_PROVIDED As Long = 1 87 Public Const FTR_STATE_SIGNAL_PROVIDED As Long = 2 88 ' Signal values. 89 Public Const FTR_SIGNAL_UNDEFINED As Long = 0 90 Public Const FTR_SIGNAL_TOUCH_SENSOR As Long = 1 91 Public Const FTR_SIGNAL_TAKE_OFF As Long = 2 92 ' Response values 93 Public Const FTR_CANCEL As Long = 1 94 Public Const FTR_CONTINUE As Long = ' Values used for the purpose definition 97 Public Const FTR_PURPOSE_IDENTIFY As Long = 2 79
90 98 Public Const FTR_PURPOSE_ENROLL As Long = ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' 102 ' 103 ' Futronic SDK function prototypes 104 ' 105 Declare Function FTRInitialize Lib "FtrAPI.DLL" () As Integer 106 Declare Function FTRTerminate Lib "FtrAPI.DLL" () As Integer 107 Declare Function FTRSetParam Lib "FtrAPI.DLL" _ 108 (ByVal Param As Long, ByVal value As Any) As Integer 109 Declare Function FTRGetParam Lib "FtrAPI.DLL" _ 110 (ByVal Param As Long, ByRef value As Any) As Integer 111 Declare Function FTRCaptureFrame Lib "FtrAPI.DLL" _ 112 (ByVal usrcontext As Any, ByRef pframebuf As Any) As Integer 113 Declare Function FTREnroll Lib "FtrAPI.DLL" _ 114 (ByVal usrcontext As Any, ByVal Purpose As Long, ByRef ptemplate As FTR_DATA) As Integer 115 Declare Function FTRVerify Lib "FtrAPI.DLL" _ 116 (ByVal usrcontext As Any, ByRef ptemplate As FTR_DATA, ByRef presult As Boolean, _ 117 ByRef pfarverify As Long) As Integer 118 Declare Function FTRSetBaseTemplate Lib "FtrAPI.DLL" _ 119 (ByRef ptemplate As FTR_DATA) As Integer 120 Declare Function FTRIdentify Lib "FtrAPI.DLL" _ 121 (ByRef paident As FTR_IDENTIFY_ARRAY, ByRef pdwmatchcnt As Long, _ 122 ByRef pamatch As FTR_MATCHED_ARRAY) As Long 123 FP_ViewWnd.bas It is used for create the area to show fingerprint image. 1 Public Const WM_PAINT = &HF 2 Public Const WM_ERASEBKGND = &H14 3 Public Const WM_DESTROY = &H2 4 Public Const COLOR_WINDOWTEXT = 8 5 Public Const WS_CHILD = &H Public Const WS_VISIBLE = &H Public Const WS_EX_DLGMODALFRAME = &H1& 8 Public Const BI_RGB = 0& 9 Public Const DIB_RGB_COLORS = 0 ' color table in RGBs Public Type RECT 12 Left As Long 13 Top As Long 14 Right As Long 15 Bottom As Long 16 End Type Public Type PAINTSTRUCT 19 hdc As Long 20 ferase As Long 21 rcpaint As RECT 22 frestore As Long 23 fincupdate As Long 24 rgbreserved(32) As Byte 25 End Type Public Type WNDCLASS 28 style As Long 29 lpfnwndproc As Long 30 cbclsextra As Long 31 cbwndextra2 As Long 32 hinstance As Long 33 hicon As Long 34 hcursor As Long 35 hbrbackground As Long 36 lpszmenuname As String 37 lpszclassname As String 38 End Type Public Type RGBQUAD 41 rgbblue As Byte 42 rgbgreen As Byte 43 rgbred As Byte 44 rgbreserved As Byte 80
91 45 End Type Public Type PALETTEENTRY 48 pered As Byte 49 pegreen As Byte 50 peblue As Byte 51 peflags As Byte 52 End Type Public Type LOGPALETTE 55 palversion As Integer 56 palnumentries As Integer 57 palpalentry(255) As PALETTEENTRY 58 End Type Public Type BITMAPINFOHEADER '40 bytes 61 bisize As Long 62 biwidth As Long 63 biheight As Long 64 biplanes As Integer 65 bibitcount As Integer 66 bicompression As Long 67 bisizeimage As Long 68 bixpelspermeter As Long 69 biypelspermeter As Long 70 biclrused As Long 71 biclrimportant As Long 72 End Type Public Type BITMAPINFO 75 bmiheader As BITMAPINFOHEADER 76 bmicolors As RGBQUAD 77 End Type Public Declare Function BeginPaint Lib "user32" (ByVal hwnd As Long, lppaint As PAINTSTRUCT) As Long Public Declare Function EndPaint Lib "user32" (ByVal hwnd As Long, lppaint As PAINTSTRUCT) As Long Public Declare Function DefWindowProc Lib "user32" Alias "DefWindowProcA" _ 84 (ByVal hwnd As Long, ByVal wmsg As Long, ByVal wparam As Long, ByVal lparam As Long) As Long Public Declare Function LoadCursor Lib "user32" Alias "LoadCursorA" _ 87 (ByVal hinstance As Long, ByVal lpcursorname As String) As Long Public Declare Function RegisterClass Lib "user32" Alias "RegisterClassA" (ByRef Class As WNDCLASS) As Long Public Declare Function CreateWindowEx Lib "user32" Alias "CreateWindowExA" _ 92 (ByVal dwexstyle As Long, ByVal lpclassname As String, ByVal lpwindowname As String, _ 93 ByVal dwstyle As Long, ByVal x As Long, ByVal y As Long, ByVal nwidth As Long, _ 94 ByVal nheight As Long, ByVal hwndparent As Long, ByVal hmenu As Long, _ 95 ByVal hinstance As Long, lpparam As Any) As Long Public Declare Function CreatePalette Lib "gdi32" (lplogpalette As LOGPALETTE) As Long Public Declare Function SelectPalette Lib "gdi32" (ByVal hdc As Long, _ 100 ByVal hpalette As Long, ByVal bforcebackground As Long) As Long Public Declare Function RealizePalette Lib "gdi32" (ByVal hdc As Long) As Long Public Declare Function SetDIBitsToDevice Lib "gdi32" _ 105 (ByVal hdc As Long, ByVal x As Long, ByVal y As Long, ByVal dx As Long, ByVal dy As Long, _ 106 ByVal SrcX As Long, ByVal SrcY As Long, ByVal Scan As Long, ByVal NumScans As Long, _ 107 Bits As Any, BitsInfo As Any, ByVal wusage As Long) As Long Public Declare Function GetDC Lib "user32" (ByVal hwnd As Long) As Long Public Declare Function ReleaseDC Lib "user32" (ByVal hwnd As Long, ByVal hdc As Long) As Long
92 113 ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' 114 ' 115 ' Application data 116 ' 117 Public Const szshowclassname As String = "ShowWndClass" Public hswnd As Long ' show window handle 120 Public w_swnd As Long ' width of show window 121 Public h_swnd As Long ' heigth of show window Public lpdibheader() As Byte 124 Public lpdibdata() As Byte 125 Public lppollitra As LOGPALETTE 126 Public hpgrayscale As Long ' 130 ' UpdateImage - updates data and shows the current fingerprint image. 131 ' Argument list: 132 ' srcdata - new fingerprint image. 133 ' 134 Sub UpdateImage(ByVal srcdata As Long) 135 Dim icyc As Long 136 Dim hdc As Long ' rotate an image while copying data to the DIB data 139 For icyc = 0 To h_swnd Call CopyMemory(lpDIBData((h_SWnd - icyc - 1) * w_swnd), _ 141 ByVal (srcdata + icyc * w_swnd), w_swnd) 142 Next icyc ' show the fingerprint image 145 hdc = GetDC(hSWnd) 146 DIBShow (hdc) 147 Call ReleaseDC(hSWnd, hdc) End Sub ' 153 ' DIBShow - shows the captured fingerprint image. 154 ' Argument list: 155 ' hdc - show window device context. 156 ' 157 Sub DIBShow(ByVal hdc As Long) Call SelectPalette(hdc, hpgrayscale, 0) 160 Call RealizePalette(hdc) Call SetDIBitsToDevice(hdc, 0, 0, w_swnd, h_swnd, _ 163 0, 0, 0, h_swnd, lpdibdata(0), lpdibheader(0), DIB_RGB_COLORS) End Sub ' 168 ' PrepareView - allocates memory & initializes data for fingerprint viewing. 169 ' Argument list: 170 ' w, h, d - width, height and color depth of fingerprint image. 171 ' Return value: 172 ' True - success; 173 ' False - error. 174 ' 175 Function PrepareView(w As Long, h As Long, d As Integer) As Boolean Dim dib_bminfo As BITMAPINFO 178 Dim dib_bmicolors(255) As RGBQUAD 179 Dim icyc As Long ' support the 256-colors DIB only 182 If d <> 8 Then 183 PrepareView = False 184 Exit Function 185 End If ' allocate memory for DIB image 188 ReDim lpdibheader(len(dib_bminfo) + Len(dib_BMInfo.bmiColors) * 255) 82
93 189 ReDim lpdibdata(w * h) ' fill the DIB header 192 dib_bminfo.bmiheader.bisize = Len(dib_BMInfo.bmiHeader) 193 dib_bminfo.bmiheader.biwidth = w 194 dib_bminfo.bmiheader.biheight = h 195 dib_bminfo.bmiheader.biplanes = dib_bminfo.bmiheader.bibitcount = d 197 dib_bminfo.bmiheader.bicompression = BI_RGB ' fill the logical palette 200 lppollitra.palversion = lppollitra.palnumentries = ' initialize logical and DIB palettes to grayscale 204 For icyc = 0 To dib_bmicolors(icyc).rgbblue = icyc 206 dib_bmicolors(icyc).rgbgreen = icyc 207 dib_bmicolors(icyc).rgbred = icyc 208 lppollitra.palpalentry(icyc).peblue = icyc 209 lppollitra.palpalentry(icyc).pegreen = icyc 210 lppollitra.palpalentry(icyc).pered = icyc 211 Next icyc ' prepare DIB header 214 Call CopyMemory(lpDIBHeader(0), dib_bminfo.bmiheader, _ 215 Len(dib_BMInfo.bmiHeader)) 216 Call CopyMemory(lpDIBHeader(40), dib_bmicolors(0), _ 217 Len(dib_bmiColors(0)) * 256) ' create a grayscale palette 220 hpgrayscale = CreatePalette(lpPolLitra) PrepareView = True End Function ' 228 ' GetFunAddr - get function address 229 ' 230 Function GetFunAddr(ByVal lngfnptr As Long) As Long 231 GetFunAddr = lngfnptr 232 End Function ' 236 ' ShowWndProc - view window callback function 237 ' 238 Function ShowWndProc(ByVal hwnd As Long, ByVal msg As Long, ByVal wparam As Long, _ 239 ByVal lparam As Long) As Long 240 Dim hdc As Long 241 Dim ps As PAINTSTRUCT Select Case msg 244 Case WM_PAINT 245 hdc = BeginPaint(hwnd, ps) 246 DIBShow (hdc) 247 Call EndPaint(hwnd, ps) 248 Case WM_ERASEBKGND 249 ShowWndProc = Exit Function 251 Case WM_DESTROY 252 ShowWndProc = Exit Function 254 End Select ShowWndProc = DefWindowProc(hwnd, msg, wparam, lparam) End Function ' 262 ' weregshowwnd - register window class for viewing fingerprint image 263 ' Return value: 264 ' 0 - error while register window class 83
94 265 Function weregshowwnd() As Long 266 Dim Class As WNDCLASS Class.style = Class.lpfnwndproc = GetFunAddr(AddressOf ShowWndProc) 270 Class.cbClsextra = Class.cbWndExtra2 = Class.hInstance = VB.App.hInstance 273 Class.hIcon = Class.hCursor = Class.hbrBackground = COLOR_WINDOWTEXT Class.lpszMenuName = Empty 277 Class.lpszClassName = szshowclassname weregshowwnd = RegisterClass(Class) End Function ' 285 ' CreateShowWnd - create window for viewing fingerprint image 286 ' Argument list: 287 ' hparent - parent window; 288 ' x, y - upper left corner in parent; 289 ' w, h - window's width and height. 290 ' Return value: 291 ' 0 - error creating. 292 ' 293 Function CreateShowWnd(ByVal hparent As Long, ByVal x As Long, ByVal y As Long, _ 294 ByVal w As Long, ByVal h As Long) As Long ' store show window dimension 297 w_swnd = w 298 h_swnd = h ' register window class 301 weregshowwnd ' prepare data for view fingerprint image 304 If PrepareView(w, h, 8) = False Then 305 CreateShowWnd = Exit Function 307 End If ' create show window 310 hswnd = CreateWindowEx(0, szshowclassname, 0&, WS_CHILD + WS_VISIBLE + WS_EX_DLGMODALFRAME, _ 311 x, y, w, h, hparent, 0, VB.App.hInstance, 0&) 312 CreateShowWnd = hswnd 313 If hswnd = 0 Then 314 Exit Function 315 End If 316 UpdateWindow (hparent) End Function The modules of Administration Tools and Building Security System MySQLADODB.bas It is used to connect the MySQL database. 1 Public conn As New ADODB.Connection 2 Public strserverip As String 3 4 Public Function opendbcn() 5 6 If conn.state = 1 Then conn.close 7 8 strserverip = getcontent("serverip") 9 10 conn.cursorlocation = aduseclient 'connect MySQL database server 13 conn.connectionstring = "DRIVER={MySQL ODBC 3.51 Driver};" _ 84
95 14 & "SERVER=" & strserverip & ";" _ 15 & "DATABASE=ive_fyp;" _ 16 & "UID=ive;" _ 17 & "PWD=ive;" _ 18 & "OPTION=" & conn.open 20 End Function ReadINI.bas It is used to read the config.ini file. It is used for create the area to show fingerprint image. 1 Option Explicit 2 3 Public Const strinfoexcapechr = "#" ' escape character in Info file 4 Public Const intinfolength = 1024 ' Set Info file length 5 6 Public strinfoname(intinfolength) As String ' Info Name 7 Public strinfocontent(intinfolength) As String ' Info Content 8 9 ' Program start function 10 Sub main() 11 Call readinfo(app.path & "\config.ini", False) 12 'MsgBox getcontent("serverip") Call opendbcn 15 Select_Mode.Show 16 End Sub Public Sub readinfo(strinfopath As String, blnreload As Boolean) Dim strlinetmp As String 22 Dim lngassignpos As Long 23 Dim idxcnt As Long ' Check the Info File var is blank or not 26 If Len(strInfoPath) = 0 Then 27 'MsgBox() 28 Exit Sub 29 End If ' to Erase the array or not 32 If blnreload Then 33 Erase strinfoname() 34 Erase strinfocontent() strinfoname(0) = "" 37 strinfocontent(0) = "" 38 End If ' Open input file "startcd.inf" 41 Open strinfopath For Input As # idxcnt = While Not EOF(1) Line Input #1, strlinetmp Select Case Left$(strLineTmp, 1) 49 Case strinfoexcapechr 50 ' Nothing to Do and go to next line 51 Case Chr(13) 52 ' Nothing to Do and go to next line 53 Case Chr(10) 54 ' Nothing to Do and go to next line 55 Case Else 56 idxcnt = idxcnt lngassignpos = InStr(1, strlinetmp, "=") 59 'MsgBox lngassignpos strinfoname(idxcnt) = Left(strLineTmp, lngassignpos - 1) 85
96 62 strinfocontent(idxcnt) = Right(strLineTmp, Len(strLineTmp) - lngassignpos) 'MsgBox strinfoname(idxcnt) & " - " & strinfocontent(idxcnt) 65 End Select Wend Close # 'MsgBox strlinetmp End Sub ' Get Information Content string in loaded array with Information Name 76 Public Function getcontent(strinformationname As String) 77 Dim i As Integer 78 Dim strfoundcontent As String strfoundcontent = "" 81 For i = LBound(strInfoName) To UBound(strInfoName) ' Compare the Information Name 84 If strinfoname(i) = strinformationname Then 85 strfoundcontent = strinfocontent(i) 86 End If Next i getcontent = strfoundcontent 91 End Function The programming codes of form in Administration Tools frmadmin.frm It is the tools main form. 1 Option Explicit 2 Dim RemotePath As String 3 Dim ComputerName As String 4 Dim FolderName As String 5 Dim PhotoName As String 6 7 Private Sub cmdhadd_click() 8 frmadd.show (vbmodal) 9 End Sub Private Sub cmdhdelete_click() 12 Dim inthid As Integer inthid = Mid(lvwHHolder.SelectedItem.key, 4, Len(lvwHHolder.SelectedItem.key) - 3) If lvwhholder.selecteditem.selected Then 17 If MsgBox("Are you sure delete this householder?", vbexclamation + vbyesno, "Delete Record") = vbyes Then 18 conn.execute "DELETE FROM fyp_tblhouseholder WHERE intholderid = " & inthid & ";" 19 showrecord 20 End If 21 End If 22 End Sub Private Sub cmdhedit_click() 25 If SelectedHHID = 0 Then 26 MsgBox "Please select householder to edit.", vbexclamation, "Message" 27 Else 28 frmedit.show (vbmodal) 29 End If 30 End Sub Private Sub cmdhhlsearch_click() 33 showrecord 34 End Sub Private Sub cmdhrefresh_click() 86
97 37 'lvwhholder.refresh 38 showrecord 39 End Sub Private Sub cmdhsearch_click() 42 lvwhholder.listitems.clear 43 showrecord 44 End Sub Private Sub cmdvsearch_click() 47 showrecord 48 End Sub Private Sub Form_Load() 51 ComputerName = strserverip 'set computer name 52 FolderName = "userdata\visitor" 'set folder name (optional) 53 RemotePath = "\\" & ComputerName & "\" & FolderName & "\" 'set the remote path to store file 'close all frame 56 frahholder.visible = False 57 frahholderlog.visible = False 58 fravisitorlog.visible = False 'set all DTPicker date 61 dtpvselectday.value = Format(Now, "dd/mm/yyyy") 62 dtphhlfrom.value = Format(Now, "dd/mm/yyyy") 63 dtphhlto.value = Format(Now, "dd/mm/yyyy") 64 End Sub Private Sub lvwhholder_itemclick(byval Item As MSComctlLib.ListItem) 67 SelectedHHID = Mid(lvwHHolder.SelectedItem.key, 4, Len(lvwHHolder.SelectedItem.key) - 3) 68 End Sub Private Sub lvwvisitor_beforelabeledit(cancel As Integer) 71 Cancel = 1 72 End Sub Private Sub lvwvisitor_itemclick(byval Item As MSComctlLib.ListItem) 75 Dim intvid As Integer intvid = Mid(lvwVisitor.SelectedItem.key, 4, Len(lvwVisitor.SelectedItem.key) - 3) Dim rs As ADODB.Recordset Set rs = New ADODB.Recordset rs.open "SELECT * FROM fyp_tblvisitor WHERE intvisitorid = " & intvid & ";", conn, adopenstatic, adlockreadonly imgvphoto.picture = LoadPicture(RemotePath & rs!chrfacedata & ".bmp") 86 End Sub Private Sub mnuexit_click() 89 End 90 End Sub Private Sub mnuhhdb_click() 93 frahholder.visible = True 94 frahholderlog.visible = False 95 fravisitorlog.visible = False 96 showrecord 97 End Sub Private Sub showrecord() 100 Dim rs1 As ADODB.Recordset 101 Dim rs2 As ADODB.Recordset 102 Dim rs3 As ADODB.Recordset Dim strphotoname As String 105 Dim strbuilding As String 106 Dim strhname As String 107 Dim strhhlname As String Dim datseldate As Date 87
98 110 Dim datdatefrom As Date 111 Dim datdateto As Date Dim inthhid As Integer 114 Dim inthhlid As Integer Dim idxvisitor As Long 117 Dim idxhholder As Long 118 Dim idxhhlog As Long strbuilding = "%" 121 datseldate = dtpvselectday.value 122 datdatefrom = dtphhlfrom.value 123 datdateto = dtphhlto.value If cbobuilding.text <> "All" Then 126 strbuilding = cbobuilding.text 127 'msgbox strbuilding 128 End If strhname = "%" 131 If txthhname.text <> "" Then 132 strhname = txthhname.text 133 End If inthhid = If txthhid.text <> "" Then 137 inthhid = Val(txtHHID.Text) 138 strhname = "" 139 End If strhhlname = "" 142 If txthhlname.text <> "" Then 143 strhhlname = txthhlname.text 144 End If inthhlid = If txthhlid.text <> "" Then 148 inthhlid = Val(txtHHLID.Text) 149 strhhlname = "" 150 End If Set rs1 = New ADODB.Recordset 153 rs1.open "SELECT * FROM fyp_tblhouseholder h, fyp_tblbuilding b, fyp_tblfloorflat f " _ 154 & "WHERE (b.intbuildingid = h.intbuildingid AND f.intffid = h.intffid) AND " _ 155 & "(h.intholderid = " & inthhid & " OR " _ 156 & "h.chrholdername LIKE '" & strhname & "') ORDER BY intholderid ASC;", conn, adopenstatic, adlockreadonly lvwhholder.listitems.clear 159 idxhholder = While Not rs1.eof 161 idxhholder = idxhholder lvwhholder.listitems.add idxhholder, "hid" & rs1("intholderid"), rs1("intholderid") 163 lvwhholder.listitems.item(idxhholder).listsubitems.add 1,, rs1("chrholdername") 164 lvwhholder.listitems.item(idxhholder).listsubitems.add 2,, rs1("chrgender") 165 lvwhholder.listitems.item(idxhholder).listsubitems.add 3,, rs1("datbirth") 166 lvwhholder.listitems.item(idxhholder).listsubitems.add 4,, rs1("chrhkid") 167 lvwhholder.listitems.item(idxhholder).listsubitems.add 5,, rs1("datregdate") 168 lvwhholder.listitems.item(idxhholder).listsubitems.add 6,, rs1("chrbuildingname") 169 lvwhholder.listitems.item(idxhholder).listsubitems.add 7,, rs1("chrfloor") & rs1("chrflat") lvwhholder.refresh rs1.movenext 174 Wend Set rs2 = New ADODB.Recordset 177 rs2.open "SELECT v.intvisitorid, v.datentry, b.chrbuildingname, " _ 178 & "CONCAT(f.chrFloor, f.chrflat) AS 'Flat', v.chrfacedata, v.chrfingerdata " _ 179 & "FROM fyp_tblvisitor v, fyp_tblbuilding b, fyp_tblfloorflat f " _ 180 & "WHERE b.intbuildingid = v.intbuildingid AND f.intffid = v.intffid AND " _ 88
99 181 & "b.chrbuildingname LIKE '" & strbuilding & "' AND " _ 182 & "(v.datentry >= '" & Format(datSelDate, "yyyy-mm-dd") & " 00:00:00' AND " _ 183 & "v.datentry <= '" & Format(datSelDate, "yyyy-mm-dd") & " 23:59:59');", conn, adopenstatic, adlockreadonly lvwvisitor.listitems.clear 186 idxvisitor = While Not rs2.eof 188 idxvisitor = idxvisitor lvwvisitor.listitems.add idxvisitor, "vid" & rs2("intvisitorid"), rs2("intvisitorid") 190 lvwvisitor.listitems.item(idxvisitor).listsubitems.add 1,, rs2("datentry") 191 lvwvisitor.listitems.item(idxvisitor).listsubitems.add 2,, rs2("chrbuildingname") 192 lvwvisitor.listitems.item(idxvisitor).listsubitems.add 3,, rs2("flat") lvwvisitor.refresh rs2.movenext 197 Wend Set rs3 = New ADODB.Recordset Clipboard.SetText "SELECT * FROM fyp_tblholderlog l, fyp_tblhouseholder h " _ 202 & "WHERE l.intholderid = h.intholderid AND " _ 203 & "(l.intholderid = " & inthhlid & " OR h.chrholdername LIKE '" & strhhlname & "' OR" _ 204 & "(l.datintime >= '" & Format(datDateFrom, "yyyy-mm-dd") & " 00:00:00' AND " _ 205 & "l.datintime <= '" & Format(datDateTo, "yyyy-mm-dd") & " 23:59:59'));" rs3.open "SELECT * FROM fyp_tblholderlog l, fyp_tblhouseholder h " _ 208 & "WHERE l.intholderid = h.intholderid AND " _ 209 & "(l.intholderid = " & inthhlid & " OR h.chrholdername LIKE '" & strhhlname & "') AND " _ 210 & "(l.datintime >= '" & Format(datDateFrom, "yyyy-mm-dd") & " 00:00:00' AND " _ 211 & "l.datintime <= '" & Format(datDateTo, "yyyy-mm-dd") & " 23:59:59');", conn, adopenstatic, adlockreadonly lvwhhlog.listitems.clear 214 idxhhlog = While Not rs3.eof 216 idxhhlog = idxhhlog lvwhhlog.listitems.add idxhhlog, "lid" & rs3("intlogid"), rs3("intholderid") 218 lvwhhlog.listitems.item(idxhhlog).listsubitems.add 1,, rs3("chrholdername") 219 lvwhhlog.listitems.item(idxhhlog).listsubitems.add 2,, rs3("datintime") lvwhhlog.refresh rs3.movenext 224 Wend 225 End Sub Private Sub mnuhhlog_click() 228 frahholderlog.visible = True 229 frahholder.visible = False 230 fravisitorlog.visible = False 231 End Sub Private Sub mnuvlog_click() fravisitorlog.visible = True 236 frahholder.visible = False 237 frahholderlog.visible = False Dim rs As ADODB.Recordset Set rs = New ADODB.Recordset 242 rs.open "SELECT * FROM fyp_tblbuilding;", conn, adopenstatic, adlockreadonly cbobuilding.clear 245 cbobuilding.additem "All" 246 cbobuilding.text = "All" 247 While Not rs.eof
100 249 cbobuilding.additem rs("chrbuildingname") rs.movenext Wend End Sub frmadd.frm It is a form of add new householder. 1 Option Explicit 2 Dim RemotePath As String 3 Dim ComputerName As String 4 Dim FolderName As String 5 Dim AESFilename As String 6 7 Private Sub cmdclose_click() 8 Unload Me 9 End Sub Private Sub cmdenroll_click() 12 'start the capture timer 13 tmrstartcap.interval = tmrstartcap.enabled = True 15 End Sub Private Sub cmdsave_click() 18 If AESFilename = "" Then 19 MsgBox "Please enroll the face.", vbcritical, "Message" 20 Else 21 AddHHolder 22 End If 23 End Sub Private Sub cmdstartcam_click() 26 InitiateCam 27 cmdenroll.enabled = True 28 End Sub Private Sub cmdstopcam_click() 31 UninitiateCam 32 cmdenroll.enabled = False 33 End Sub Private Sub Form_Load() 36 ComputerName = strserverip 'set computer name 37 FolderName = "userdata\householder" 'set folder name (optional) 38 RemotePath = "\\" & ComputerName & "\" & FolderName & "\" 'set the remote path to store file 'set the maxlength of all textbox 41 txtname.maxlength = txtyear.maxlength = 4 43 txtmonth.maxlength = 2 44 txtday.maxlength = 2 45 txthkid1.maxlength = 2 46 txthkid2.maxlength = 6 47 txthkid3.maxlength = 'reset all combo box 50 cbogender.text = cbogender.list(0) 51 cbobuilding.text = cbobuilding.list(0) 52 cbofloor.text = cbofloor.list(0) 53 cboflat.text = cboflat.list(0) cmdenroll.enabled = False 56 tmrstartcap.enabled = False 'MsgBox "Please enroll the face first.", vbinformation, "Message" End Sub Private Sub InitiateCam() 90
101 63 'Initiate the webcam 64 Webcam.SetSizeType 1 65 Webcam.SetEyeThreshold Webcam.SetThreshold Webcam.InitSmartGate 68 Webcam.Show 69 piccammask.visible = False 70 End Sub Private Sub UninitiateCam() 73 'Uninitiate the webcam 74 Webcam.Unshow 75 Webcam.UninitSmartGate 76 piccammask.visible = True 77 End Sub Private Sub Form_Unload(Cancel As Integer) 80 UninitiateCam 81 End Sub Private Sub GenName() 84 Dim AESKey As CRijndael 85 Dim plaintext() As Byte 86 Dim enctext() As Byte 87 Dim encpassword() As Byte 88 Dim lcount As Long 89 Dim llength As Long Set AESKey = New CRijndael 'set AESKey from class modules plaintext = Format(Now, "yymmddhhmmss") 94 encpassword = "" 'default no password enctext = AESKey.EncryptData(plainText, encpassword) 97 AESFilename = "" 98 For lcount = 0 To UBound(encText) 99 AESFilename = AESFilename & Right("0" & Hex(encText(lCount)), 2) 100 Next End Sub Private Sub tmrstartcap_timer() 105 GenName 'generate the filename to AES format 106 If (Webcam.SaveToBmpImageT(RemotePath & AESFilename & ".bmp", 320, 240)) Then 'save bitmap from camera 107 Webcam.AppendData RemotePath & AESFilename & ".bmp", RemotePath & AESFilename & ".usr" 'save the template file from bitmap 108 MsgBox "Face Enrollment Successful!", vbinformation, "Face Enrollment" 109 Else 110 MsgBox "Face Enrollment Failed!\nPlease try again!", vbcritical, "Face Enrollment" 111 End If 'stop the timer after 3 seconds 114 If tmrstartcap.interval = 3000 Then 115 tmrstartcap.enabled = False 116 End If 117 End Sub Private Sub AddHHolder() 120 Dim rs1 As ADODB.Recordset 121 Dim rs2 As ADODB.Recordset 122 Dim datbirth As Date 123 Dim strhkid As String Set rs1 = New ADODB.Recordset 126 rs1.open "SELECT intbuildingid FROM fyp_tblbuilding WHERE chrbuildingname LIKE '" & cbobuilding.text & "';", conn, adopenstatic, adlockreadonly Set rs2 = New ADODB.Recordset 129 rs2.open "SELECT intffid FROM fyp_tblfloorflat WHERE chrfloor = '" & cbofloor.text & "' AND chrflat = '" & cboflat.text & "';", conn, adopenstatic, adlockreadonly datbirth = txtyear.text & "/" & txtmonth.text & "/" & txtday.text 132 strhkid = UCase(txtHKID1.Text) & txthkid2.text & "(" & txthkid3.text & ")" 'insert visitor record 91
102 135 conn.execute "INSERT INTO fyp_tblhouseholder VALUES ('', '" & txtname.text & "', '" & cbogender.text & "', '" & Format(datBirth, "YYYY-MM-DD") & "', '" _ 136 & strhkid & "', '" & Format(Now, "YYYY-MM-DD HH:MM:SS") & "', '" & AESFilename & "', '" & rs1!intbuildingid & "', " & rs2!intffid & ");",, adexecutenorecords rs1.close 139 Set rs1 = Nothing rs2.close 142 Set rs2 = Nothing MsgBox "Success to save the householder in database", vbinformation, "Save New Householder" 'reset all 147 AESFilename = "" 148 txtname.text = "" 149 txtyear.text = "" 150 txtmonth.text = "" 151 txtday.text = "" 152 txthkid1.text = "" 153 txthkid2.text = "" 154 txthkid3.text = "" cbogender.text = cbogender.list(0) 157 cbobuilding.text = cbobuilding.list(0) 158 cbofloor.text = cbofloor.list(0) 159 cboflat.text = cboflat.list(0) UninitiateCam 162 cmdenroll.enabled = False End Sub frmedit.frm It is a form of edit selected householder. 1 Option Explicit 2 Dim RemotePath As String 3 Dim ComputerName As String 4 Dim FolderName As String 5 Dim AESFilename As String 6 Dim HHID As Integer 7 8 Private Sub cmdclose_click() 9 Unload Me 10 End Sub Private Sub cmdenroll_click() 13 'start the capture timer 14 tmrstartcap.interval = tmrstartcap.enabled = True 16 End Sub Private Sub cmdsave_click() 19 UpdateHHolder 20 End Sub Private Sub cmdstartcam_click() 23 InitiateCam 24 cmdenroll.enabled = True 25 End Sub Private Sub cmdstopcam_click() 28 UninitiateCam 29 cmdenroll.enabled = False 30 End Sub Private Sub Form_Load() 33 Dim strbirth As String ComputerName = strserverip 'set computer name 36 FolderName = "userdata\householder" 'set folder name (optional) 92
103 37 RemotePath = "\\" & ComputerName & "\" & FolderName & "\" 'set the remote path to store file 'find the householder id and put data in textbox and combobox 40 HHID = SelectedHHID 41 Dim rs As ADODB.Recordset 42 Set rs = New ADODB.Recordset 43 rs.open "SELECT * FROM fyp_tblhouseholder h, fyp_tblfloorflat f WHERE h.intholderid = " & HHID & " AND f.intffid = h.intffid;", conn, adopenstatic, adlockreadonly strbirth = Format(rs!datBirth, "yyyy-mm-dd") 'format the strbirth easy to read 46 AESFilename = rs!chruserdata txtname.text = rs!chrholdername 49 txtyear.text = Left(strBirth, 4) 50 txtmonth.text = Mid(strBirth, 6, 2) 51 txtday.text = Right(strBirth, 2) 52 txthkid1.text = Mid(rs!chrHKID, 1, 1) 53 txthkid2.text = Mid(rs!chrHKID, 2, 6) 54 txthkid3.text = Mid(rs!chrHKID, 9, 1) 55 If (rs!chrgender = "M") Then 56 cbogender.text = cbogender.list(0) 57 ElseIf (rs!chrgender = "F") Then 58 cbogender.text = cbogender.list(1) 59 End If 60 cbobuilding.text = cbobuilding.list(val(rs!intbuildingid) - 1) 61 cbofloor.text = cbofloor.list(val(rs!chrfloor) - 1) 62 cboflat.text = cboflat.list(asc(rs!chrflat) - 65) 'disable some textbox to prevent modify 65 txtname.enabled = False 66 txtyear.enabled = False 67 txtmonth.enabled = False 68 txtday.enabled = False 69 txthkid1.enabled = False 70 txthkid2.enabled = False 71 txthkid3.enabled = False 72 cbogender.enabled = False 'set the maxlength of all textbox 75 txtname.maxlength = txtyear.maxlength = 4 77 txtmonth.maxlength = 2 78 txtday.maxlength = 2 79 txthkid1.maxlength = 2 80 txthkid2.maxlength = 6 81 txthkid3.maxlength = cmdenroll.enabled = False 84 tmrstartcap.enabled = False picholderimage.picture = LoadPicture(RemotePath & rs!chruserdata & ".bmp") 'load the previous enrolled pic 'MsgBox "Please enroll the face first.", vbinformation, "Message" End Sub Private Sub InitiateCam() 93 'Initiate the webcam 94 Webcam.SetSizeType 1 95 Webcam.SetEyeThreshold Webcam.SetThreshold Webcam.InitSmartGate 98 Webcam.Show 99 picholderimage.visible = False 100 piccammask.visible = False 101 End Sub Private Sub UninitiateCam() 104 'Uninitiate the webcam 105 Webcam.Unshow 106 Webcam.UninitSmartGate 107 piccammask.visible = True 108 End Sub
104 110 Private Sub Form_Unload(Cancel As Integer) 111 UninitiateCam 112 End Sub Private Sub GenName() 115 Dim AESKey As CRijndael 116 Dim plaintext() As Byte 117 Dim enctext() As Byte 118 Dim encpassword() As Byte 119 Dim lcount As Long 120 Dim llength As Long Set AESKey = New CRijndael 'set AESKey from class modules plaintext = Format(Now, "yymmddhhmmss") 125 encpassword = "" 'default no password enctext = AESKey.EncryptData(plainText, encpassword) 128 AESFilename = "" 129 For lcount = 0 To UBound(encText) 130 AESFilename = AESFilename & Right("0" & Hex(encText(lCount)), 2) 131 Next End Sub Private Sub tmrstartcap_timer() 136 GenName 'generate the filename to AES format 137 If (Webcam.SaveToBmpImageT(RemotePath & AESFilename & ".bmp", 320, 240)) Then 'save bitmap from camera 138 Webcam.AppendData RemotePath & AESFilename & ".bmp", RemotePath & AESFilename & ".usr" 'save the template file from bitmap 139 MsgBox "Face Enrollment Successful!", vbinformation, "Face Enrollment" 140 Else 141 MsgBox "Face Enrollment Failed!\nPlease try again!", vbcritical, "Face Enrollment" 142 End If 'stop the timer after 3 seconds 145 If tmrstartcap.interval = 3000 Then 146 tmrstartcap.enabled = False 147 End If 148 End Sub Private Sub UpdateHHolder() 151 Dim rs1 As ADODB.Recordset 152 Dim rs2 As ADODB.Recordset Set rs1 = New ADODB.Recordset 155 rs1.open "SELECT intbuildingid FROM fyp_tblbuilding WHERE chrbuildingname LIKE '" & cbobuilding.text & "';", conn, adopenstatic, adlockreadonly Set rs2 = New ADODB.Recordset 158 rs2.open "SELECT intffid FROM fyp_tblfloorflat WHERE chrfloor = '" & cbofloor.text & "' AND chrflat = '" & cboflat.text & "';", conn, adopenstatic, adlockreadonly conn.execute "UPDATE fyp_tblhouseholder SET datregdate = '" & Format(Now, "YYYY-MM-DD") & "', intbuildingid = " & rs1!intbuildingid & _ 161 ", intffid = " & rs2!intffid & ", chruserdata = '" & AESFilename & "' WHERE intholderid = " & HHID & ";" rs1.close 164 Set rs1 = Nothing rs2.close 167 Set rs2 = Nothing MsgBox "Successful update householder detail in database.", vbinformation, "Update Householder" End Sub Private Sub AddHHolder() 175 Dim rs1 As ADODB.Recordset 176 Dim rs2 As ADODB.Recordset 177 Dim datbirth As Date 178 Dim strhkid As String 94
105 Set rs1 = New ADODB.Recordset 181 rs1.open "SELECT intbuildingid FROM fyp_tblbuilding WHERE chrbuildingname LIKE '" & cbobuilding.text & "';", conn, adopenstatic, adlockreadonly Set rs2 = New ADODB.Recordset 184 rs2.open "SELECT intffid FROM fyp_tblfloorflat WHERE chrfloor = '" & cbofloor.text & "' AND chrflat = '" & cboflat.text & "';", conn, adopenstatic, adlockreadonly datbirth = txtyear.text & "/" & txtmonth.text & "/" & txtday.text 187 strhkid = UCase(txtHKID1.Text) & txthkid2.text & "(" & txthkid3.text & ")" 'insert visitor record 190 conn.execute "INSERT INTO fyp_tblhouseholder VALUES ('', '" & txtname.text & "', '" & cbogender.text & "', '" & Format(datBirth, "YYYY-MM-DD") & "', '" _ 191 & strhkid & "', '" & Format(Now, "YYYY-MM-DD HH:MM:SS") & "', '" & AESFilename & "', '" & rs1!intbuildingid & "', " & rs2!intffid & ");",, adexecutenorecords rs1.close 194 Set rs1 = Nothing rs2.close 197 Set rs2 = Nothing MsgBox "Success to save the householder in database.", vbinformation, "Save New Householder" 'reset all 202 AESFilename = "" 203 txtname.text = "" 204 txtyear.text = "" 205 txtmonth.text = "" 206 txtday.text = "" 207 txthkid1.text = "" 208 txthkid2.text = "" 209 txthkid3.text = "" cbogender.text = cbogender.list(0) 212 cbobuilding.text = cbobuilding.list(0) 213 cbofloor.text = cbofloor.list(0) 214 cboflat.text = cboflat.list(0) UninitiateCam 217 cmdenroll.enabled = False End Sub The programming codes of form in Building Security System Select_Mode.frm It is the mode selection form. 1 Private Sub btnclose_click() 2 End 3 End Sub 4 5 Private Sub Form_Load() 6 mode.movie = App.path & "\interface\select.swf" 7 mode.play 8 9 End Sub Private Sub mode_fscommand(byval command As String, ByVal args As String) 12 Select Case command 13 Case "householder" 14 H_Mode.Show 15 Case "visitor" 16 V_Mode.Show 17 End Select 18 End Sub 95
106 H_Mode.frm It is householder mode form. 1 Option Explicit 2 Dim RemotePath As String 3 Dim ComputerName As String 4 Dim FolderName As String 5 6 Private Sub Form_Load() 7 ComputerName = strserverip 'set computer name 8 FolderName = "userdata\householder" 'set folder name (optional) 9 RemotePath = "\\" & ComputerName & "\" & FolderName & "\" 'set the remote path to store file 'set the filename of flash and play 12 Interface.Movie = App.path & "\interface\householder.swf" 13 Interface.Play Webcam.Visible = False End Sub Private Sub Form_Unload(Cancel As Integer) 20 'Unshow and Uninitate the webcam 21 UninitiateCam 22 End Sub Private Sub StartCam_Timer() 25 Webcam.Visible = True 'stop the timer after 2 seconds 28 If StartCam.Interval = 2000 Then 29 StartCam.Enabled = False 'start the capture timer 32 StartCap.Interval = StartCap.Enabled = True 34 End If 35 End Sub Private Sub StartCap_Timer() 38 SearchUser End Sub Private Sub InitiateCam() 43 'Initiate the webcam 44 Webcam.SetSizeType 1 45 Webcam.SetEyeThreshold Webcam.SetThreshold Webcam.InitSmartGate 48 Webcam.Show 49 Webcam.Visible = True End Sub Private Sub UninitiateCam() 54 'Uninitiate the webcam 55 Webcam.Visible = False 56 Webcam.Unshow 57 Webcam.UninitSmartGate 58 End Sub Private Sub SearchUser() 61 Dim rs As ADODB.Recordset 62 Dim success As Boolean 63 Dim aaa As String success = False Set rs = New ADODB.Recordset 68 rs.open "SELECT intholderid, chrholdername, chruserdata FROM fyp_tblhouseholder;", conn, adopenstatic, adlockreadonly Do Until rs.eof Or success = True 96
107 71 If Webcam.LoadUserData(RemotePath & rs!chruserdata & ".usr", 1) And Webcam.Verify() Then 72 'save log of householder in table "fyp_tblholderlog" 73 conn.execute "INSERT INTO fyp_tblholderlog VALUES ('', '" & rs!intholderid & "', '" & Format(Now, "YYYY-MM-DD HH:MM:SS") & "');",, adexecutenorecords success = True 'show successful message box 78 Interface.SetVariable "VBCommand", "identifysuccess" 79 Interface.SetVariable "Username", rs!chrholdername 'uninitiate the cam when success 82 StartCap.Enabled = False 83 UninitiateCam 84 Else 85 rs.movenext 86 End If 87 Loop 'show failed message box when cannot verify 90 If (success = False) Then Interface.SetVariable "VBCommand", "identifyfailed" 'start the capture timer 95 StartCap.Interval = StartCap.Enabled = True 97 End If rs.close 100 Set rs = Nothing End Sub Private Sub Interface_FSCommand(ByVal command As String, ByVal args As String) 105 Select Case command 106 Case "opencam" 107 InitiateCam 108 'start the capture timer 109 StartCap.Interval = StartCap.Enabled = True 111 Case "closecam" 112 UninitiateCam 113 Case "unload" 114 UnloadForm.Interval = UnloadForm.Enabled = True 116 End Select 117 End Sub Private Sub UnloadForm_Timer() 120 Interface.Stop 121 Unload Me 122 End Sub V_Mode.frm It is visitor mode form. 1 Option Explicit 2 Dim AESFilename As String 3 Dim FaceName As String 4 Dim FingerName As String 5 Dim RemotePath As String 6 Dim ComputerName As String 7 Dim FolderName As String 8 Dim strfloor As String 9 Dim strflat As String Private Sub Enroll_Click() 12 GenName 'generate the filename to AES format 13 Webcam.SaveToBmpImageT RemotePath & AESFilename & ".bmp", 320, 240 'save bitmap from camera 14 Webcam.AppendData RemotePath & AESFilename & ".bmp", RemotePath & AESFilename & ".usr" 'save the template file from bitmap 97
108 15 16 'Insert visitor record in database 17 AddVisitor End Sub Private Sub Form_Load() 22 ComputerName = strserverip 'set computer name 23 FolderName = "userdata\visitor" 'set folder name (optional) 24 RemotePath = "\\" & ComputerName & "\" & FolderName & "\" 'set the remote path to store file 'set the filename of flash and play 27 Interface.Movie = App.path & "\interface\visitor.swf" 28 Interface.Play Webcam.Visible = False FingerImage.Visible = False 33 End Sub Private Sub Form_Unload(Cancel As Integer) 36 'Unshow and Uninitate the webcam 37 UninitiateCam 38 'uninitiate the fingerprint device 39 UninitFinger 40 End Sub Private Sub StartFace_Timer() 43 GenName 'generate the filename to AES format 44 FaceName = AESFilename 'put the generated filename in FaceName If (Webcam.SaveToBmpImageT(RemotePath & FaceName & ".bmp", 320, 240) = True) Then 'save bitmap from camera 47 Webcam.AppendData RemotePath & FaceName & ".bmp", RemotePath & FaceName & ".usr" 'save the template file from bitmap 48 UninitiateCam 'close the cam 49 Interface.SetVariable "VBCommand", "gotofinger" 'pass the value to flash and run the function 50 End If 51 'stop the timer after 3 seconds 52 If StartFace.Interval = 3000 Then 53 StartFace.Enabled = False 54 End If 55 End Sub Private Sub GenName() 58 Dim AESKey As CRijndael 59 Dim plaintext() As Byte 60 Dim enctext() As Byte 61 Dim encpassword() As Byte 62 Dim lcount As Long 63 Dim llength As Long Set AESKey = New CRijndael 'set AESKey from class modules plaintext = Format(Now, "yymmddhhmmss") 68 encpassword = "" 'default no password enctext = AESKey.EncryptData(plainText, encpassword) 71 AESFilename = "" 72 For lcount = 0 To UBound(encText) 73 AESFilename = AESFilename & Right("0" & Hex(encText(lCount)), 2) 74 Next End Sub Private Sub AddVisitor() 79 Dim rs As ADODB.Recordset conn.cursorlocation = aduseclient Set rs = New ADODB.Recordset 84 rs.open "SELECT intffid FROM fyp_tblfloorflat WHERE chrfloor = '" & strfloor & "' AND chrflat = '" & strflat & "';", conn, adopenstatic, adlockreadonly 85 98
109 86 'insert visitor record 87 conn.execute "INSERT INTO fyp_tblvisitor VALUES ('', '" & FaceName & "', '" & FingerName & "', '" & Format(Now, "YYYY-MM-DD HH:MM:SS") & "', 1, " & rs!intffid & ");",, adexecutenorecords rs.close 90 Set rs = Nothing End Sub Private Sub InitiateCam() 95 'Initiate the webcam 96 Webcam.SetSizeType 1 97 Webcam.SetEyeThreshold Webcam.SetThreshold Webcam.InitSmartGate 100 Webcam.Show 101 Webcam.Visible = True 102 End Sub Private Sub UninitiateCam() 105 'Uninitiate the webcam 106 Webcam.Visible = False 107 Webcam.Unshow 108 Webcam.UninitSmartGate 109 End Sub Private Sub Interface_FSCommand(ByVal command As String, ByVal args As String) 112 Select Case command 113 Case "floorflat" 114 strfloor = Left$(args, Len(args) - 1) 115 strflat = Right$(args, 1) 116 Case "opencam" 117 InitiateCam 118 Case "startface" 119 StartFace.Interval = StartFace.Enabled = True 121 Case "startfinger" 122 InitFinger 123 Case "endfinger" 124 FingerImage.Visible = False 125 Case "unload" 126 UnloadForm.Interval = UnloadForm.Enabled = True 128 End Select 129 End Sub Private Sub InitFinger() 132 Dim TemplateSize As Long 133 Dim lptemplatebytes() As Byte 134 Dim template As FTR_DATA FingerImage.Visible = True 'initialize Futronic fingerprint SDK 139 FTRInitialize 'set dsdk settings: 142 'frame source 143 Dim value As Long 144 value = FSD_FUTRONIC_USB 145 FTRSetParam FTR_PARAM_CB_FRAME_SOURCE, value 'user's calbacks 148 FTRSetParam FTR_PARAM_CB_CONTROL, AddressOf cbcontrol 'FAR setting 151 value = 'default threshold setting 152 FTRSetParam FTR_PARAM_MAX_FAR_REQUESTED, value 'Max Models 155 value = 3 'set the number of times to scan 156 FTRSetParam FTR_PARAM_MAX_MODELS, value 'create the image area for fingerprint bitmap 159 Dim hswnd As Long 99
110 160 hswnd = CreateShowWnd(V_Mode.hwnd, 460, 100, 320, 400) ' prepare memory for template store 163 FTRGetParam FTR_PARAM_MAX_TEMPLATE_SIZE, TemplateSize ReDim lptemplatebytes(0 To TemplateSize - 1) ' prepare arguments 168 template.pdata = VarPtr(lpTemplateBytes(0)) ' enroll operation 171 FTREnroll 0&, FTR_PURPOSE_ENROLL, template 'generate the filename 174 GenName 175 FingerName = AESFilename ' write template to file 178 If (AddFinger(template.pData, template.dwsize, RemotePath, FingerName)) Then 179 UninitFinger 'uninitiate the fingerprint device 180 End If 'finally, insert visitor record in database 183 AddVisitor 'call flash play movie when the finger success. 186 Interface.SetVariable "VBCommand", "succfinger" 187 End Sub Private Sub UninitFinger() 190 'uninitialize Futronic fingerprint SDK 191 FTRTerminate 192 End Sub Private Sub UnloadForm_Timer() 195 Interface.Stop 196 Unload Me 197 End Sub Programming code of Clubhouse system Clubhouse login system: Project1, Form2 1 Private Sub SearchUser() 2 Dim conn As ADODB.Connection 3 Dim success As Boolean 4 Dim tmp As Integer 5 Dim bbq1 As ADODB.Recordset 6 Dim bbq2 As ADODB.Recordset 7 8 success = False 9 10 Set conn = New ADODB.Connection 11 conn.cursorlocation = aduseclient 'connect MySQL database server conn.connectionstring = "DRIVER={MySQL ODBC 3.51 Driver};" _ 16 & "SERVER= ;" _ 17 & "DATABASE=ive_fyp;" _ 18 & "UID=ive;" _ 19 & "PWD=ive;" _ 20 & "OPTION=" & conn.open Set bbq1 = New ADODB.Recordset 24 bbq1.open "SELECT intholderid, chrholdername, chruserdata FROM fyp_tblhouseholder;", conn 25 Set bbq2 = New ADODB.Recordset 26 bbq2.open "SELECT intholderid, datintime FROM fyp_tblclub where fyp_tblclub.intholderid = '" & bbq1!intholderid & "' ;", conn Do Until bbq1.eof Or success = True 29 If Webcam.LoadUserData(RemotePath & bbq1!chruserdata & ".usr", 1) And Webcam.Verify() Then 100
111 30 success = True Text1.Text = bbq2!datintime Timetake.Visible = True 35 Timetake.Text = "Your Logout time is" Text2.Text = Time Text3.Text = "See you! " + bbq1!chrholdername + "! Logout successful!" conn.execute "UPDATE fyp_tblclub SET datouttime = '" & Format(Now, "HH:MM:SS") & "' WHERE fyp_tblclub.intholderid = '" & bbq1!intholderid & "' ;" Command1.Enabled = True 44 Else 45 bbq1.movenext 46 End If 47 Loop If (success = False) Then 50 Text3.Text = "Sorry, Logout Failed! Please try again!" 51 End If 52 bbq1.close 53 Set bbq1 = Nothing 54 End Sub 101
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Biometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration
WELCOME ievo would like to thank you for purchasing our product. ievo advise the use of a. Ensure you have calculated the correct power supply amp rating if you are connecting the ievo board and other
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Accessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]
Easy Data Centralization with Webster. User Guide
Easy Data Centralization with Webster User Guide CONTENTS 3-4 1 Introducing Webster Webster - An Introduction 5-14 2 Installing & Configuring Webster Installing the System Configuring Webster 15-18 3 Managing
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition
Automated Regional Justice Information System (ARJIS) Acceptable Use Policy for Facial Recognition Revised: 02/13/2015 A. STATEMENT OF PURPOSE The purpose of this document is to outline the responsibilities
Introducing... The Word's Most Advance. Biometric Time Attendance Door Access Security System
Introducing... The Word's Most Advance Biometric Time Attendance Door Access Security System EC50 Proximity Card Time Clock Designed for Small to Large sized Businesses Large Color LCD Display Plug n
Using the enclosed installation diagram, drill three holes in the wall with the lower hole 1150mm from the floor.
Terminal Installation When choosing the location of the terminal, care should be taken to select an area with consistent light levels throughout the day and avoid areas where the unit may be subjected
DAZZLE INTEGRATED DATA BACKUP FEATURE.
DAZZLE INTEGRATED DATA BACKUP FEATURE. To simplify the backup process and to make sure even the busiest (or laziest) shops have no excuse not to make data backups, we have created a simple on-screen backup
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
FrontDesk Installation And Configuration
Chapter 2 FrontDesk Installation And Configuration FrontDesk v4.1.25 FrontDesk Software Install Online Software Activation Installing State Related Databases Setting up a Workstation Internet Transfer
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
YubiKey with Password Safe
Authentication concepts Author: Felicia King Authentication concepts Single-factor authentication Single-factor authentication is inherently flawed. Hackers and criminals install keystroke loggers, screen
Two Factor Authentication. Software Version (SV) 1.0
Two Factor Authentication Software Version (SV) 1.0 Property of: Worldwide Interactive Services, Inc. 5025 South Orange Avenue Orlando, FL 32809 The data contained in this documentation is PROPRIETARY
River Valley Credit Union Online Banking
River Valley Credit Union Online Banking New user setup guide Members can self enroll for the service by answering a few simple questions. Before beginning the process, please make sure you have this information
HandPunch. Overview. Biometric Recognition. Installation. Is it safe?
HandPunch Overview Biometric Recognition Installation This section describes the HandPunch series of biometric scanners from RSI (Recognition Systems). These instructions apply to all the different HandPunch
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING
INTEGRATED STAFF ATTENDANCE SYSTEM (ISAS) WEE PEK LING A report submitted in partial fulfillment of the requirements for the award of the degree of Bachelor of Computer Science (Computer Systems & Networking)
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
BIOMETRIC SOLUTIONS 2013 ISSUE
BIOMETRIC SOLUTIONS 2013 ISSUE Southern Supplies Limited (SSL) was established on January 14th 1982 with one aim in mind : "To be the preferred supplier to the industries we service." Over time, our expertise
User Guide. Chapter 6. Teacher Pages
User Guide Chapter 6 s Table of Contents 1. Introduction... 4 I. Enhancements... 5 II. Tips... 6 2. Key Information... 7 3. How to Add a... 8 4. How to Edit... 10 I. SharpSchool s WYSIWYG Editor... 11
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
Access Control and Audit Trail Software
Varian, Inc. 2700 Mitchell Drive Walnut Creek, CA 94598-1675/USA Access Control and Audit Trail Software Operation Manual Varian, Inc. 2002 03-914941-00:3 Table of Contents Introduction... 1 Access Control
Flexible Identity. Tokenless authenticators guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication Tokenless authenticators guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected]
Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected] Biometric Systems Biometrics
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI
Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES ATM SECURITY IMPROVEMENT USING FINGER PRINT Neelam Verma 1, Rakesh Patel 2, Priya Bag 3 Student,B.E.(IT) Kirodimal Institute of Technology,Raigarh(C.G.),India
OA101 Fingerprint Time attendance system Preface
Preface Honorable customers, Thanks for choosing products of this company. OA101, with world cutting edge technologies fingerprint recognition, computer communication, as well as microelectronics, is considered
The Nuts and Bolts of Autodesk Vault Replication Setup
The Nuts and Bolts of Autodesk Vault Replication Setup James McMullen Autodesk, Inc PL4700-V Has your company decided to move toward a replicated Autodesk Vault software environment? Does your company
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
Embedded Web Server. User Guide. General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers
Embedded Web Server User Guide General usage guide lines to the ISONAS Embedded Web Server available on all ISONAS PowerNet reader-controllers 06/12/09 Contents Revision history... 4 Scope... 4 Introduction...
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
Fingerprint Enrollment Procedures
Fingerprint Enrollment Procedures 1 Version 1.1 December 1, 2003 Last Update April 1, 2004 COPYRIGHT Copyright 2003 Ringdale. All rights reserved. No part of this publication may be reproduced, transmitted,
PUBLIC Password Manager for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5
CENTRALLY MANAGED. Access Control
CENTRALLY MANAGED Access Control Keyscan Introduces a whole new way to think about access Control 2 KEYSCAN Centrally managed solutions Keyscan s Centrally Managed Access Control Solution (CMAC) has revolutionized
SOFTWARE INSTALLATION INSTRUCTIONS CLIENT/SERVER EDITION AND WEB COMPONENT VERSION 10
3245 University Avenue, Suite 1122 San Diego, California 92104 USA SOFTWARE INSTALLATION INSTRUCTIONS CLIENT/SERVER EDITION AND WEB COMPONENT VERSION 10 Document Number: SII-TT-002 Date Issued: July 8,
Partizan Access Control Management User Manual. Version 2.0.0, 14 August 2015
Partizan Access Control Management User Manual Version 2.0.0, 14 August 2015 Abstract This document is the Software User Manual (SUM) for the Partizan Access Control Management project and was made according
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
«Intellect» software system
AxxonSoft «Intellect» software system Detector Pack: User s Manual Version 1.1 Moscow 2012 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 General information... 3 1.2 Purpose of the document... 3 1.3
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems
Smart Cards and Biometrics in Privacy-Sensitive Secure Personal Identification Systems A Smart Card Alliance White Paper May 2002 Smart Card Alliance 191 Clarksville Road Princeton Junction, NJ 08550 www.smartcardalliance.org
V2.0 Attendance System Hardware Suite Guide Instructions Manual
CONTENTS TA920 V2.0 Attendance System Hardware Suite Guide Instructions Manual Chapter One - Introduction 1.1 Communication Port 5 1.2 Power Source Control. 5 1.3 Attendance Users. 6 1.4 Registering Ways..
Digital Persona Fingerprint Reader Installation
Digital Persona Fingerprint Reader Installation The link to download the Fingerprint Reader Software for AXIS-ACH is http://corpcu.com/fingerprint-reader-software This will begin the download for the drivers.
Search help. More on Office.com: images templates
Page 1 of 14 Access 2010 Home > Access 2010 Help and How-to > Getting started Search help More on Office.com: images templates Access 2010: database tasks Here are some basic database tasks that you can
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
UniFinger Engine SDK Manual (sample) Version 3.0.0
UniFinger Engine SDK Manual (sample) Version 3.0.0 Copyright (C) 2007 Suprema Inc. Table of Contents Table of Contents... 1 Chapter 1. Introduction... 2 Modules... 3 Products... 3 Licensing... 3 Supported
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions
ZKTime5.0 Attendance Management Software User Manual
ZKTime5.0 Attendance Management Software User Manual Version: 1.4 Date: April. 2013 Software version: Build 149 About this Manual: This manual provides ZKTime5.0 software operation instruction, for example
Securing corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
Access Control Software Manual
CONTENTS 1. Function overview...1 2. Installation environment...2 3. Concept description...3 4. Installation and Uninstallation...4 4.1 Installation...4 4.2 Uninstallation...10 5. Function instroduction...11
Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents
Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe
Upgrading from Call Center Reporting to Reporting for Call Center
Upgrading from Call Center Reporting to Reporting for Call Center www.nortelnetworks.com 2003 Nortel Networks i Table of Contents Table of Contents Change History...1 How to use this guide...2 Introduction...
A puzzle based authentication method with server monitoring
A puzzle based authentication method with server monitoring GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Online Backup and Recovery Manager Setup for Microsoft Windows.
Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the
Tips and Tricks SAGE ACCPAC INTELLIGENCE
Tips and Tricks SAGE ACCPAC INTELLIGENCE 1 Table of Contents Auto e-mailing reports... 4 Automatically Running Macros... 7 Creating new Macros from Excel... 8 Compact Metadata Functionality... 9 Copying,
Clickfree The Effortless Backup Solution
Reprint from May 2009 Clickfree The Effortless Backup Solution By Joel P. Bruckenstein One of the fundamental rules of computing is: Back up your data. To that fundamental rule we, at T3 add a few more:
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Upgrading from Windows Vista to Windows 7
Depending on your hardware and your current edition of Windows Vista, you can use the Upgrade option during Windows 7 installation to upgrade from Windows Vista to a corresponding or higher edition of
Migrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
Report on the Train Ticketing System
Report on the Train Ticketing System Author: Zaobo He, Bing Jiang, Zhuojun Duan 1.Introduction... 2 1.1 Intentions... 2 1.2 Background... 2 2. Overview of the Tasks... 3 2.1 Modules of the system... 3
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Business Intelligence Getting Started Guide
Business Intelligence Getting Started Guide 2013 Table of Contents Introduction... 1 Introduction... 1 What is Sage Business Intelligence?... 1 System Requirements... 2 Recommended System Requirements...
Using MS-SQL Server with Visual DataFlex March, 2009
Using MS-SQL Server with Visual DataFlex March, 2009 All rights reserved. Target Audience It is assumed that the reader of this white paper has general knowledge of the Visual DataFlex development environment.
MSSQL quick start guide
C u s t o m e r S u p p o r t MSSQL quick start guide This guide will help you: Add a MS SQL database to your account. Find your database. Add additional users. Set your user permissions Upload your database
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Installation & Maintenance Guide
The instruction booklet is also included on the CD in Word and Acrobat formats, which may be easier to print. (If you want to install Acrobat Reader run d:\acroread\setup.exe (where d:\ is the identifier
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
Server Installation, Administration and Integration Guide
Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management
Published by Murphy & Company, Inc. 13610 Barrett Office Dr Suite 206 St. Louis, MO 63012 www.mcompany.com
Published by Murphy & Company, Inc. 60 Barrett Office Dr Suite 06 St. Louis, MO 60 www.mcompany.com 007-05 Murphy & Company, Inc. Microsoft, Windows, Excel, and Internet Explorer are registered trademarks
Expat Tracker. User Manual. 2010 HR Systems Limited
Expat Tracker User Manual Expat Tracker Assignee Management Software HR Systems Limited Expat Tracker All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic,
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Getting Started - The Control Panel
Table of Contents 1. Getting Started - the Control Panel Login Navigation Bar Domain Limits Domain User Account Properties Session Management 2. FTP Management Creating and Editing Users Accessing FTP
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
SPICES BOARD (Ministry of Commerce & Industry, Govt. of India) Palarivattom.P.O. N H By Pass Kochi 682025
SPICES BOARD (Ministry of Commerce & Industry, Govt. of India) Palarivattom.P.O. N H By Pass Kochi 682025 Phone: 0484-2333603 Email: [email protected] Requirement of biometric time attendance system
Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee
Marquee Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Securing the Workplace Executive Summary OPTIMIZE TODAY S WORKPLACE Protecting
SourceForge Enterprise Edition 4.4 SP1 User Guide
SourceForge Enterprise Edition 4.4 SP1 User Guide SourceForge Enterprise Edition 4.4, Service Pack 1 Part Number: 98-0063 Last Revision: January 2008 Copyright 2008 CollabNet, Inc. All rights reserved.
TrustKey Tool User Manual
TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...
Biometric SSO Authentication Using Java Enterprise System
Biometric SSO Authentication Using Java Enterprise System Edward Clay Security Architect [email protected] & Ramesh Nagappan CISSP Java Technology Architect [email protected] Agenda Part 1 : Identity
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED.
VMWare Workstation 11 Installation MICROSOFT WINDOWS SERVER 2008 R2 STANDARD ENTERPRISE ED. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *If you are using
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide
Sage Intelligence Financial Reporting for Sage ERP X3 Version 6.5 Installation Guide Table of Contents TABLE OF CONTENTS... 3 1.0 INTRODUCTION... 1 1.1 HOW TO USE THIS GUIDE... 1 1.2 TOPIC SUMMARY...
