Open Access
Application Design of the Iris Recognition Technology in the Access Control Management System
Author(s) -
Liangli Yu,
Kefeng Li,
Jian Zheng
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/719/1/012040
Subject(s) - computer science , scalability , iris recognition , identity (music) , identification (biology) , access control , iris (biosensor) , biometrics , controller (irrigation) , identity management , data collection , database server , database , artificial intelligence , computer security , statistics , physics , botany , mathematics , acoustics , agronomy , biology
This design is a method of implementing the iris-recognition-based access control management system, including the identity collection device, database server, infrared range finder, iris recognition device, and access controller. The identity collection device collects the target personnel’s identity signals on site and outputs iris information. When a target person attempts to enter a door, the infrared range finder needs to work with the identity collection device to start the iris recognition device. The identity collection device will promptly and accurately collect the iris information, and then send the extracted iris information to the database server. The database server compares the received iris information with that previously stored in the database and quickly determines whether the iris information is legal based on the comparison results. If it is legal, the access controller sends a signal to the electric control lock to open the door and the person can enter the door. Otherwise, the person cannot enter the door. This design integrates the infrared sensing technology, human-computer interaction technology, data transmission technology, and communication technology. It utilizes the iris recognition algorithm in the iris recognition technology to improve the precision of recognition. Therefore, this design can efficiently identify and authenticate personal identity. In addition, this design features high reliability, low cost, small volume, complete functionality, and strong scalability on information collection.