Smart card with iris recognition for high security access environment

Smart cards are increasingly being used as a form of identification & authentication. One inherent problem with smart cards, however, is the possibility of loss or theft. Current options for securing smart cards against unauthorized use are primarily restricted to passwords. Passwords are easy enough for others to steal so that they do not offer sufficient protection.

This has promoted interest in biometric identification methods, including iris recognition. The iris is, due to its unique biological properties, exceptionally suited for identification. It is protected from the environment, stable over time, unique in shape and contains a high amount of discriminating information. This paper proposes a method to integrate iris recognition with the smart card to develop a high security access environment.


An iris recognition system and smart card programming circuit with its software have been designed. Template on card (TOC) category has been employed. Hence, the extracted iris features stored in smart card are compared against the data acquired from a camera or database for authentication. The proposed algorithm has superior performance in terms of security, accuracy and consistency compared with other published technology.










Design of Elevator Intelligent Control System Based on Long Distance RFID

This paper analyzes the features of RFID Radio Frequency Identification technique with elevator as controlled object. After type selection of RFID system, the whole structural model of elevator intelligent control system could be constructed. The elevator intelligent control system designed by this model solves the problems of intelligent lock, floor control, base station set and the communication jamming between interrogator and tag, and it is widely used in the intelligent buildings. Centering on the users, this system combines the advanced concept of pervasive computing to realize the intelligent control of elevator. Besides, it upgrades the safety management level of office buildings, reduces the spinning times of the elevator and realizes the goal of intelligence, safety and energy conservation.

Research on the Integrated Management of Container Terminal Based on RFID

With the rapid development of port logistics, it sets a higher request to the management level of the container terminal. In view of the terminal issues of the tedious process of manually collecting container and truck information with higher error rate, the management confusion and low utilization of container handling equipment, poor supervision of the terminal container goods as well as personnel, low degree of management information technology in terminal and so on, this article combines the radio frequency identification (RFID) technology to propose a container terminal management system based on the RFID technology and introduces the specific application of this management system in the port with emphasis. It can effectively solve the management issues in the contemporary container terminals so that the current situation of terminal management is improved.

An RFID-Based Reminder System for Smart Home

Some people tend to forget things when they leave home for work or school. It is desired that there would be a reminder system to automatically remind people what they might have forgotten to bring along just when they step outside their home. In this paper, we present a reminder system that uses the RFID technology to detect the objects that a user brings along. The system then provide a reminder object list to the user based on the history data collected from the same user and the events in the user's calendar on that day. The list is to remind the user objects he/she might have forgotten at home. A feedback mechanism is also designed to lower the possibility of unnecessary reminding. The user can mark the objects that are not needed from the reminder object list such that these objects will not appear in the list again in the same situation. A prototype system is introduced in this paper.

RFID-Embedded Decision Support for Tracking Surgical Equipment

Healthcare and supply chain management have recently been the two most active areas for RFID applications. The healthcare environment is a natural fit for generating and utilizing instance-level data for decision support. We consider a scenario from the French healthcare environment involving tracking and tracing of surgical equipment within and among hospitals and develop a knowledge-based system for decision support that helps improve the overall performance of the surgical instrument management process while reducing errors. We illustrate the process through the developed healthcare knowledge-based system and evaluate its performance.

Research on the Integrated Management of Highway Based on Radio Frequency Identification Technology

The highway is the inevitable outcome of the social & economic development. In recent years, with the rapid development of our economy, the growth of highway is becoming faster and faster. But the followed is a series of highway management issues. In view of the issues of poor vehicle control, the traditional parking charge as well as traffic jam brought by this, road toll in confusion, low level of management information and so on in the highway traffic management, this article proposes a highway integrated management system based on the radio frequency identification (RFID) technology. The system can realize the effective vehicles supervision, no parking fee and so on. It can effectively solve the existing expressway management problems and make the use and management of highways become more efficient, safe and reasonable.

Design of auto-guard system based on RFID and network

To reduce the theft rate of the car and meet the intellectualized auto-guard demand of people,we proposed an auto-guard system which combined the radio frequency identify technology and the global mobile communication network.The system took Texas Instruments Company's car-used microcontroller STM8AF51AA as the control core.NXP Semiconductors Company's radio reader IC MF RC522 could identify the car owner quickly and then realized the function of keyless entry and keyless start-up.At the same time.The infrared sensors and vibration sensors completed the monitoring function.GSM module SIM300DZ of Simcom company finished setting and dismissing the prevention of message or call and controlled the car’s states remotely through AT instructions.It has showed in practice that compared with the traditional autoguard system,this system could not only identify the owner singly,but also improve the security and reliability.So it has achieved the unity between intellectualized safeguard and remote control.

An ECDLP-Based Randomized Key RFID Authentication Protocol

Operational and security requirements for RFID systems such as system scalability, anonymity and anti-cloning are difficult to obtain due to constraints in area, memory, etc. Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algorithms. However, it has been shown that it is inevitable to use public-key cryptographic algorithms to satisfy these requirements [1]. Moreover, general public-key cryptography based authentication protocols are vulnerable in terms of anonymity, which is shown in this paper. Accordingly, we design a new authentication protocol named EC-RAC using EC (Elliptic Curve) cryptography. EC-RAC can be proved for its security in the generic group model and is carefully designed to minimize its computational workload. Moreover, we present the implementation results of EC-RAC to show its feasibility for RFID systems.

Hash-Based RFID Tag Mutual Authentication Scheme with Retrieval Efficiency

RFID system is a promising automatic identification technology that use communication via radio waves to identify and track moving objects. RFID systems, however, are susceptible to a variety of security problems and fundamental solutions to RFID security vulnerabilities have not yet been proposed.


This paper proposes an RFID tag mutual authentication scheme that resists security threats posed by inherent characteristics of low-cost RFID systems. The proposed scheme utilize the modulo operation to improve the efficiency of tag retrieval in the back-end server and employs the hash function to provide enhanced security.

Research on RFID Application in the Pharmacy Logistics System

The quality and safety of pharmacy, which have become essential for the lives of the residents, directly concerns people's health and security. The pharmacy logistics is still at the starting stage and exists a lot of problems at present in our country, so it would affect the management and monitoring of the pharmacy quality, bringing the security menace. The first section of this paper analyses the characteristics of radio frequency identification (short for RFID) technology and the pharmacy logistics system. Then RFID technology is introduced into the Pharmacy Logistics System, that is to expound the application of RFID in the pharmacy logistics system, the service level of the pharmacy logistics system would be upgraded, and the supervision of the pharmacy would be strengthened

Proposal of the Disaster-Relief Training System Using the Electronic Triage Tag

When there are a lot of injured people at a largescale disaster site, medical staff first do triage. Triage is to decide the priority for treatment depending on the degree of everity or urgency of injured people. Paper triage tags are used now to show their condition and to record information on injuries. We do research that collect information of injured people by using electronic triage tags which replace the current paper tags. To do prompt and accurate emergency medical services with electronic tags at a disaster site, it is important for medical staff to engage in a disaster-relief training using them on a daily basis. So we propose the disaster-relief training system using the electronic triage tag. This system supports to develop the scenarios of injured people information and transport information. We let the electronic triage tag generate vital signs of injured people constantly.

A Generic Framework for Three-Factor Authentication

As part of the security within distributed systems, various services and resources need protection from unauthorized use. Remote authentication is the most commonly used method to determine the identity of a remote client. This paper investigates a systematic approach for authenticating clients by three factors, namely password, smart card, and biometrics. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems. In addition, our framework retains several practice-friendly properties of the underlying two-factor authentication, which we believe is of independent interest.

A Sophisticated RFID Application on Multi-Factor Authentication

Authentication is the process of verifying a user’s credentials when they are requesting services from any secure system. The most commonly form of authentication is the single-factor authentication, which only requires one factor for the user to log into the system. In this case, the username and password together act as a singlefactor. A more secure technique is the multi-factor authentication, which requires more than one factor to gain access into a particular system. In this paper, we propose a RFID Factor Authentication Application (RFAA); an enhanced technique from SofToken [1] that acts as a technique for two-factor authentication. The RFAA not only sustains the next level of security but also is proven to prevent most of security breaches

A Credit Card Transactions Involving Mutual Authentication between Cardholder & Merchant

Electronic Commerce (e-Commerce) and ease in the onsite transactions have led to the exponential growth in the acceptance of credit cards among consumers of all the sections. But despite their remarkable advantages, consumers are still reluctant in their use, especially for online transactions and reason being the increasing credit card fraud rate. A number of security models have been proposed and deployed for secure online transactions but the sharing of sensitive credit card data over the Internet has made online transactions vulnerable to threats. In this paper, we discuss and analyze the current developments in online authentication procedures including biometrics, one-time-password systems and use of mobile device and Public Switched Telephone Network for cardholder authentication. Then we propose a complete new framework for both onsite and online (Internet shopping) credit card transactions.

User Input Pattern-Based Authentication Method to Prevent Mobile E-Financial Incidents

Owing to the increase in the use of mobile banking services, mobile banking has become an attractive target for attackers. Even though many security measures are taken with current mobile services, some threats against mobile devices such as physical theft or penetration from the remote side are still unsolved. We proposed a novel approach to prevent e-financial incidents by analyzing the input patterns of mobile banking users such as how long it takes a user to input data into a mobile device, and the normal finger pressure levels when using a touch screen. We can distinguish the differences between an original user's usage pattern and an attacker's usage pattern.

OTP-Based Two-Factor Authentication Using Mobile Phones

Two-factor authentication (2FA) provides improved protection, since users are prompted to provide something they know and something they have. This method delivers a higher level of authentication assurance, which is essential for online banking security. Many banking systems have satisfied the 2FA requirements by sending a One Time Password (OTP), something possessed, through an SMS to the user’s phone device. Unfortunately, international roaming and SMS costs and delays put restrictions on this system reliability. This paper presents a novel two-factor authentication scheme whereby a user’s device produces multiples OTPs from an initial seed using the proposed production scheme. The initial seed is produced by the communications partners’ unique parameters. Applying the many from one function to a certain seed removes the requirement of sending SMS-based OTPs to users, and reduces the restrictions caused by the SMS system.

A Standalone RFID Indoor Positioning System using Passive Tags

Indoor positioning systems (IPSs) locate objects in closed structures such as office buildings, hospitals, stores, factories, and warehouses, where Global Positioning System devices generally do not work. Most available systems apply wireless concepts, optical tracking, and/or ultrasound. This paper presents a standalone IPS using radio frequency identification (RFID) technology. The concept is based on an object carrying an RFID reader module, which reads low-cost passive tags installed next to the object path. A positioning system using a Kalman filter is proposed. The inputs of the proposed algorithm are the measurements of the backscattered signal power propagated from nearby RFID tags and a tag-path position database. The proposed algorithm first estimates the location of the reader, neglecting tag-reader angle-path loss. Based on the location estimate, an iterative procedure is implemented, targeting the estimation of the tag-reader angle-path loss, where the latter is iteratively compensated from the received signal strength information measurement. Experimental results are presented, illustrating the high performance of the proposed positioning system.