Research on Vehicle Owner Identification Based on Intelligent System

There are three commonly used identification technologies: password technology, smart card technology (including USB KEY, IC card and RFID technology) and biometric technology; among them, the tone technology has been used up to now because of its ease of use, but the security risks of password technology have also hindered it. In the high-end market; smart card technology and biometric technology use its inherent security features in the field of identity authentication, but smart card technology also has the inconvenience of input and memory passwords. Similarly, biometric technology also has certain Security breach.

The smart card-based fingerprint recognition technology is adopted in the system to authenticate the owner's identity. The owner needs to collect his own living fingerprint image before using the car. Then the system will automatically extract the fingerprint characteristics of the owner and use the fingerprint feature as a template to exist the smart card and system. Before starting the vehicle, the system will require the user to provide live fingerprints and smart cards for authentication. Only the licensor can make the car, such as an unauthorized person, will not be able to start the engine.

1 system structure

The smart card-based fingerprint recognition technology stores the fingerprint (plain text or ciphertext) of the owner on the smart card, and adds a fingerprint identification system on the card reader device of the smart card. When the card reading device reads the information on the card, it reads together The fingerprint of the card holder can be confirmed by comparing the fingerprint module on the card with the fingerprint of the card holder. The true owner of the card holder can be confirmed. After the fingerprint comparison in the card is successful, the living fingerprint is collected for on-site verification. Cardholders can use the car only after the two have been verified successfully. The smart card reading and writing and fingerprint recognition technologies are all completed by an embedded system, as shown in Figure 1.

The reading and writing module in the figure completes the data interaction process with the smart card, including data reading and writing and the two-way authentication process of the card and the module; the collector is responsible for collecting the fingerprint image of the user; the MCU is the center of the whole system, and it completes all the fingerprint identification algorithms. The process; in addition, such a system should also be equipped with a certain storage medium for storing the fingerprint features of all users; the drive control is used to control the various components of the car that need to be authenticated, and the display and keyboard portions are used to provide interaction to the user. Module interface.

Vehicle owner intelligent identification system structure

2 Smart card structure

The smart card mentioned here is a chip with a CPU, memory and other peripherals integrated with the size of the calling card. As shown in Figure 2, Infineon's SLE66CL160S chip is actually a dual-interface smart card chip that supports contact and contactless communication.

As shown in Figure 2, the SLE66CLI60S has two communication interfaces: a contact interface and a contactless interface (RE interface). The RAM is used as an internal work unit, and is an area for storing command parameters, return results, security status, temporary work keys, and temporary data in data processing; ROM is an area for storing operating systems in the card; EEPROM is an area for storing user application data. . In addition to the two interface modules and the permanent components of the microcontroller system (CPU, interrupt handler, external RAM, ROM, clock, etc.), this CPU card chip also contains several special components: random number generator, CRC module and EC2/ DES modules, which play a key role in implementing the security mechanism of the CPU card. The random number generator is used for internal and external authentication and anti-collision processes; the CRC module is used for data block CRC check data generation in contactless communication; the EC2/DES module is a data hardware encryption module that implements ECC and DES encryption algorithms, and its speed It is much faster than the encryption program implemented by software.

3 fingerprint identification process

In this system, only the security features of the smart card are used to store the fingerprint features, and all other processing processes are completed outside the card. There are two issues to be aware of here: one is the time of data transmission and authentication in the card, and the other is security authentication. Since the data of a fingerprint image after feature extraction is generally only a few hundred bytes, and the memory of the smart card chip usually has a size of several tens of kilobytes, a large number of user fingerprint features and personal information can be stored. Figure 3 shows the process of fingerprint recognition based on smart card.

Fingerprint identification process

4 Safety certification process

The system is safe for smart card and fingerprint identification technology. Therefore, in order to protect the smart card and fingerprint features, the system uses the single key cryptographic algorithm based authentication scheme shown in Figure 4, which includes the following three processes.

First: the internal certification process. This process is used to authenticate the card. The terminal sends a piece of data for authentication to the smart card, and the smart card encrypts with its own internal authentication key and returns the ciphertext, and then the terminal decrypts with the same key, if the decrypted data is the same as the original data. The authentication is successful, otherwise the authentication fails.

second. External certification process. This process is used to authenticate the terminal. First, the terminal sends a random number command to the card, and then encrypts the random number of the card with its own external authentication key and sends it to the card, and then the card decrypts the ciphertext with the same key, if the plaintext with the same number of followers is obtained. The authentication is successful, otherwise the authentication fails.

Third: verification and comparison process. The smart card transmits the existing feature template TD and the ciphertext with the hash value of the TD to the terminal, and the terminal decrypts and verifies the hash value with the same key to ensure whether the data is complete during the transmission. Then, feature LD and TD are extracted from the fingerprint images collected in the field for feature comparison, and the purpose of access control is achieved according to the result of the comparison.

5 performance analysis

A good system - general evaluation of these aspects: social and user recognition, anti-attack, accuracy of certification, ease of use, and ease of maintenance and management. The following will analyze its performance from several aspects. First of all, it has a high degree of social and user recognition, because fingerprint technology is the most mature and widely used technology in biometric technology, and has been recognized by the majority of users. Secondly, this authentication scheme enhances the system's anti-attack capability, using a two-factor authentication scheme until 1 plus 1 is greater than 2. Again, the user is also very convenient and fast to use, it only needs to provide a smart card and collect fingerprints in the field without the need to provide a key. Finally, this system solution is also easy to maintain and manage, except for human intervention during registration, and other processes are done automatically. In addition, although the system performs a 1:N comparison, because the user's fingerprint is small in the system, the entire comparison time is very fast, no more than 1.5 seconds, which is a time that the user can endure.

(Text / 1, Qingdao University of Science and Technology, 2, Beihua University, 3, Jilin City Center Hospital Qu Pingping Li Changli)

Customized Curling Wand Iron for Travel. Our travel Hair Curling Wand is designed with all the smart features. A heat-resistant travel case and universal dual voltage (110-220 V ) perfect for travelling. Adjustable digital temperature control design travel hair curling tongs, suitable for men and women, thick, curly, wavy and frizzy hair types. The Travel Size Hair Curling Iron feature multiple heat settings for customized styling and less heat-related damage. Welcome your business negotiation!

Travel Curling Iron

Travel Curling Iron,Flat Iron Hair Curling,Travel Size Hair Curling Iron,Heated Travel Hair Curlers

Gold Beauty Limited. , https://www.goldbeautyltd.com