基于指纹、RFIC及密码的三重认证门禁系统研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
门禁,又称出入管理控制系统,是一种管理人员进出的数字化管理系统。常见的门禁系统有:密码门禁系统,IC卡门禁系统,非接触IC卡(RFIC卡)门禁系统,生物识别门禁系统等。其中生物识别门禁又包括指纹、虹膜、掌纹、语音等系统。
     传统的密码输入不安全,卡容易遗失和被盗,以及指纹被复制的可能,都决定了单识别门禁系统不可能具有太高的安全性。本文对该系统的技术领域及其在国内外的发展状况进行了详细的调查和分析的基础上,提出了一种结合RFIC、指纹识别及传统密码输入的复合系统方案,该方案充分结合了射频识别技术、指纹识别技术以及密码输入的优点,彻底杜绝了有可能发生的安全隐患,提高了系统的安全性能。
     本论文主要采用了射频识别技术与指纹识别技术,以嵌入式ARM器件作为中央处理器,使系统具有较高的响应速度,可以直接运用存储卡中的所要辨别的信息而独立工作,完成RFIC卡的有效性识别、指纹的认证及密码的验证,也可通过上位机实现识别及验证工作。本系统具有响应速度快,稳定性好,安全性能高等特点,可以满足人们日益增长的安全需求,具有非常高的市场前景。
Entrance guard system, as well called access controller system, is the digital management apparatus to control the access of the personnel. The familiar sorts of the entrance guard system are password entrance guard system, IC card system, non-contact IC card system, biometric identification system, etc. And the biometric identification entrance guard system includes fingerprint system, iris system, palm print system and voice system and so on.
     Traditional password input is an insecure way. The card is easily dropped or stolen, as well as the fingerprint has the possibility of being copied, which make sure that single identification entrance guard system has no possibility possessing high security. Basing on detailed investigation and analysis of the technology domain development status inside and outside of the country, this paper bring forward a system scheme combined the technology of RFIC, fingerprint, password input. This scheme used the merits of radio frequency technology, fingerprint identification technology and password input method. It absolutely put an end to the hidden trouble possibly occurred, and improved the secure capability of the system.
     This system primarily made use of radio frequency recognition technology and fingerprint identification technology. It used embedded ARM apparatus as the center processor, which provided the system with a high response speed. According to the exploitation requirement, this system could choose the way not corresponding with monitor computer and working alone with the requisite information stored in the memory, or the way using monitor computer to achieve the identification of RFIC card, fingerprint or password. It has the characteristics of high response speed, good stability, speICal security, etc. It can satisfy the people's day-increasingly safety requirement and some speICal situation. So, it has a high market prospect.
引文
[1]尹义龙,宁新宝,张晓梅.自动指纹识别技术的发展与应用.南京大学学报.2002,38(1):29-35
    [2]RFID技术的发展历程及应用现状.RFID世界网.http://ifidworld.com.cn
    [3]游战清.无线射频识别技术(RFID)理论与应用.第1版.北京:电子工业出版社.2004
    [4]李锦涛,射频识别技术及其应用,中科院信息技术快报11期,2004
    [5]王恒奎,边耐欣,潘峰.非接触式射频卡系统及若干关键技术[J].电子技术应用,1999,24(12):36-39.
    [6]朗为民,射频识别技术原理与应用,机械工业出版社,2006
    [7]张传生编著,数字通信原理,西安交通大学出版社,1998
    [8]秦霆镐,张婷婷.基于ARM的非接触式指纹IC卡一体机的设计.仪表技术.2006,6:11-12,15
    [9]李文元主编,无线通信技术概论,国防工业出版社,2006
    [10]ISO/IEC,ISO/IEC14443Part1:PhysicalCharaeteristies,2001
    [11]谢健阳,李铁才,唐降龙,佟喜峰.指纹识别系统的设计实现.微计算机信息,2006,3-2:156-157
    [12]张成,周媛媛,林嘉宇.指纹采集技术及产品发展趋势.电子技术应用,2004,8:1-3
    [13]终喜峰.基于指纹的身份鉴别技术[D].硕士学位论文,哈尔滨工业大学,2003.7
    [14]罗菁,修春波.一种基于神经网络匹配的指纹识别算法.人工智能,2005,12
    [15]张雪奇,李文光,申正波.一种基于伪特征点消除算法的指纹细节提取方法.网络安全技术与应用,2006,(1):17-20
    [16]汪剑鸣,沈虹,丁润涛.一种新的基于相位保持的指纹图像增强算法.计算机应用,[J],2006,(1):50-53
    [17]柴晓光.民用指纹识别技术.人民邮电出版社,2004
    [18]马秀丽,李莹,华宇宁.一种非接触式射频卡基站读写电路的设计与应用.金卡工程,2003,8:52-56
    [19]陈秋裕.非接触式IC卡门禁控制在远程监控应用中的应用[J].电子技术, 1998,36(11):10—13.
    [20]王崇文,赵德申,王延才.指纹取向与识别.计算机工程与应用,2002,20:90-94
    [21]周立功,张华等.深入浅出ARM7.第1版.北京航空航天大学出版社,2005
    [22]MFRC530datasheet.http:www.youwokeji.com.
    [23]莫德举,刘丽丽.RFIC卡读写模块研发.仪器仪表学报,2003:24(4)
    [24]LPC2210datasheet.Koninklijke Philips Electronics N.V.2005.All rights reserved.http://www.semiconductors.philips.com
    [25]TF-MD-01指纹模块用户手册.广州十指科技有限公司
    [26]Jean J.Labrosse.邵贝贝翻译.嵌入式实时操作系统μC/OS—Ⅱ(第2版).北京航空航天大学出版社.2003
    [27]王田苗.嵌入式系统设计与实例开发——基于ARM处理器与μC/OS—Ⅱ实时操作系统.清华大学出版社.第一版.2002
    [28]任群,张晓鹏,田捷.指纹图像质量自动评测方法.中国科学院自动化研究所复杂系统与智能科学实验室,2004
    [29]傅景广,许刚,王裕国.基于细节点方向分布的指纹特征匹配.计算机工程,2003,(19):27—30
    [30]王崇文,王伟,王廷才,郑治伟.指纹图像后处理.计算机系统与设计,2002,(9):40-43
    [31]朱海涛,陈颖,蔡黎.一种改进的指纹识别预处理算法及评价.工矿自动化,2006,(1):18—22
    [32]周瑛,杜建中.指纹识别技术在我国疾病预防控制信息系统中的应用前景.疾病监测,2005,(12):11—14
    [33]罗希平,田捷.自动指纹识别中的图像增强和细节匹配算法.软件学报,2002,(5):48—52
    [34]赵慧民,朱立.基于DSP CCS 2.2实现指纹识别预处理系统.电子技术应用.http://www.bbww.net
    [35]尹勇,欧光军,关荣锋.DSP集成开发环境CCS开发指南.北京航空航天出版社,2004:30-55
    [36]沈绪榜,何立民等.2001嵌入式系统及单片机国际学术交流会议论文集.北京 航空航天大学出版社,2002:10-80
    [37]张勇,曾炽祥,周好斌,陈滨.TMS320C5000系列DSP汇编语言程序设计.西安电子科技大学出版社,2004:143-160
    [38]陈阳,谭思云.基于DSP的指纹识别系统设计.计算机测量与控制,2005
    [39]李科让.一种实用的非接触式IC卡读写模块系统的设计[J].重庆邮电学院学报,2001,28(6):13—16.
    [40]李池水.射频卡数据读写方法[J].电测与仪表,2000,16(9):10-13.
    [41]吴刚,刘丽丽,莫德举.门禁系统非接触式IC卡读卡模块的设计[J].北京化工大学学报,2003,30f3):24-27.
    [42]陈秋裕.非接触式IC卡门禁控制在远程监控应用中的应用[J].电子技术,1998,36(11):10—13.
    [43]戴月明.智能门禁系统[J].江南大学学报,2002,28(1):36-38
    [44]王汝琳,张爱华.智能门禁控制系统[J].安防科技,2003,36(9):29-31.
    [45]吴国英.非接触IC长技术在门禁系统中的应用[M].中国安防产品信息,2004:21-24.
    [46]A.K.Jain,R.Bolle,S.Pankantieds.Biometrics:Personal Identifieation in Networked SoICety.KluwerAeademiePublishers,1999
    [47]H.Cummins,C.Midlo.Fingerprints,PalmsandSoles.NewYork:Dover,1961:5-18
    [48]E.Henry.Classification and uses of fingerprints.London:Routledge,1900
    [49]A Taxonomy for Texture Description and Identification.NewYork,Springer-verlag.1990
    [50]Lin Hong,Yifei Wan,and Anil Jain,"Fingerprint Image Enhancement Algorithm Performance Evaluation",IEEE Transaction on Pattern Analysisand Machine Intelligence.Vol20.No.8,pp.777-789,August 1998.
    [51]Byoung-HoCho.Core-basedfingerprintimageclassification[C].15thInter-national Conference on Pattern Recognition,Vol.2,pp.859-862,2000.
    [52]T.Pavlidis,Algorithms for graphics and image processing,Computer SICence Press,1982.
    [53]Kameshwar Rao.Type classification of fingerprint:A syntacticapproach[J]. IEEE-PAMI, 1980, 2(3): 223-231
    [54]A.K. Jam, S. Prabhakar and L. Hong, "A multichannel approach to fingerprint classification", IEEE Trans. PAMI, Vol.21, No.4, pp348-359, 1999.
    [55] R. Cappelli, A. Lumini, D. Maio and D. Maltoni, "Fingerprint classification by directional image partitioning", IEEE Trans. PAMI, Vol.21, No.5, pp402-421, 1999.
    [56] K. Rao and K. Black, "Type classification of fingerprints: a syntactic approach", IEEE Trans. PAMI, Vol2, No.3, pp223-231, 1980.
    [57]K. Karu and A.K. Jam, "Fingerprint classification", Pattern Recognition, Vol.29, No.3, pp389-404, 1996.
    [58]M. Kamijo, "Classifying fingerprint images using neural network: deriving the classification state", Proc. 3rdmt. ConfNeural Network, pp.1932-1937, 1993.
    [59]J. Shen, W. Shen, H.J. Sun and J.Y. Yang, "Fuzzy neural nets with non-symmetric p membership functions andapplications in signal and image processing", Signal Processing, Vol.80, pp965-983, 2000.146 Proc.
    [60]J.D.Woodward.Biometrics: Privacy's foe or privacy's friend.Proceedings ofthe IEEE(SpeICal Issue on Automated Biometrics), September 1997, (85): 1480-1492
    [61]Qinzhi Zhang, Kai Huang, Hong Yan.Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges.School of Electrical and Information Engineering University of Sydney, 2006: 8-12
    [62]Biometrics for Airport Access Control.Response to Section 4011, September 2005: 23-27
    [63]R.Bahuguna.Fingerprint Verification Using Hologram Matched Filterings.Proc. Biometric Consortium Eighth Meeting, June, 1996: 101-108
    [64]Jason Zalev, Reza Sedaghat.Automatic Fingerprint Recognition Algorithm. Electrical and Computer Engineering.2004, (4): 30-34, 61
    [65]D.Maio, D.Maltoni, R.Cappelli, A.K.Jain. FVC2000: Fingerprint verification Competion.http: //bial.csr.unibo.it/fvc2000.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700