Electronics Technology


Fingerprint sensor status analysis

11 August 2004 Electronics Technology Information Security

There is no doubt that the adoption of fingerprint-identification technology will have many advantages and significant impact on our daily lives.

Each human fingerprint has its own unique characteristics enabling this technology to be potentially used in a number of different applications that include PDAs, mobile devices, keyless systems, computers, and physical access for buildings, homes, vehicles, etc.

Fingerprint sensors are very small and very easy to use. You do not have a problem with someone forgetting their password or losing their IC card. Your fingers are always with you and the fingerprint has long been accepted as a secure standard of people-recognition and authentication.

Fingerprint analysis technology consists of different steps: image acquisition; extraction of the finger print data; template storage.

Image acquisition

There are different kinds of sensors available on the market based on different technologies.

* Capacitive sensors: This technology usually consists of an array of capacitor electrodes where the sensors measure the capacitance between an array of plates formed on the silicon surface, and the skin contacting the surface of the sensor directly above it. When a finger presses on the sensor it creates varying capacitance across the chip corresponding to the ridges and troughs of the fingerprint. The rate of change of the potential (voltage) on the capacitor plate is proportional to the capacitance seen by the capacitor plate, through the relation: iref = Cdv/dt

A pixel that is under a fingerprint ridge discharges slowly, and vice-versa, a pixel under a fingerprint trough discharges rapidly. This difference in the discharge rate is detected through sample/hold circuitry and converted to a 256-bit grey scale output. In this manner, fingerprint images can be detected.

Capacitive sensors are supplied, for example, from Fujitsu. It offers two kinds of sensor, the single-touch sensor the MBF200, and the 'swipe' sensor the MBF310 - both capacitive solid-state devices with 500 dpi resolution (50 µm pitch). The MBF200 has 12,8 x 15,0 mm sensor area and the MBF310 a 16,1 x 6,5 mm sensor area. The MBF200 has one of three bus interfaces: 8-bit microprocessor bus interface; integrated USB full-speed interface; or integrated serial peripheral interface. The MBF310 has one of two bus interfaces: 8-bit microprocessor bus interface; or integrated serial peripheral interface.

* Thermal sensors: Thermal sensors use a layout similar to those of capacitive types, but they measure the temperature differential between the sensor pixels that are in contact with the ridges, and those under the troughs that are not in contact. There is, therefore, a detectable temperature difference to map the fingerprint pattern.

Thermal sensors are supplied, for example, from Atmel, ie, its FingerChip series, the AT77C101B, AT77C104B and FCD4B14, all 500 dpi resolution with 50 x 50 µm pixel pitch. Image zones are: 0,4 x 14 mm, image array 8 x 280 (2240 pixels) for AT77C101B; 0,4 x 11,6 mm, image array 8 x 232 (1856 pixels) for AT77C104B; image zone 0,4 x 14 mm, image array 8 x 280 (2240 pixels) for FCD4B14.

Extracting the fingerprint data

Usually this function is performed by the software. There are different kinds of software available on the market that digitise the image and create a template of data, or minutia, unique to the fingerprint. The size of these templates are generally 200 to 400 bytes, corresponding to a map of around 20 minutiae points, but in certain cases where more minutiae points are required to achieve an effective fingerprint capture, the size is around 1,5 KB. The system tests for matches between the extracted minutia template and a candidate template. A common method of gauging the quality of the algorithm itself is through the well-known FAR (false accept rates) and FRR (false reject rates) figure, but in any case, this figure should be carefully considered before judging the quality of the algorithm.

Template storage

The most common way to store the different templates in an embedded system is by using a flash memory device. The quantity of template stored is dependent of course, on the size of the template data and the size of the flash memory. In some cases the template storage is managed from an external database.

Final considerations

The market has considerable expectations for this system, and in principle we can say that the system should be reliable and robust, which means the sensor must be very highly protected in terms of surface coatings, resistance versus abrasion, scratch and chemical agent level and ESD (electrostatic discharge).

The algorithm should work for everyone in a consistent way, this means with very high efficiency and reliability and with a very good FAR/FRR figure. This is really important since there are some people from whom it can be very difficult to capture a fingerprint image (for example, people that practice extreme sports like free-climbing) because the fingerprint pattern could be damaged. Even so, the end-user cannot accept mistakes or failures.

The system should be able to work in combination with different standards, for example in an environment such as smartcard readers where a standard format might be necessary. This could include an encryption system (for example 3DES), which should be easily connected to another piece of equipment like an add-on board. In practice the end-user expects a very highly secure system. The security element should not only be related to the application itself but also the template information that is stored. It should also, of course, be very easy to use and be available at a reasonable price.

In recent years fingerprint sensing technology has made some advancement and is now mature enough to start growing in volume for a number of different applications.



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

High-reliability isolation amplifiers
EBV Electrolink Analogue, Mixed Signal, LSI
The VIA series of isolation amplifiers from Vishay are designed to deliver exceptional thermal stability and precise measurement capabilities.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
First NVMe SSD Built with 8th-gen BiCS FLASH
EBV Electrolink Computer/Embedded Technology
KIOXIA recently announced the development and prototype demonstration of its new KIOXIA CM9 Series PCIe 5.0 NVMe SSDs, which incorporates CMOS directly Bonded to Array technology.

Read more...
IMU with dual-sensing capability
EBV Electrolink Analogue, Mixed Signal, LSI
ST’s 6-axis inertial measurement unit integrates a dual accelerometer up to 320g and embedded AI for activity tracking and high-impact sensing.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Battery monitoring and balancing IC
EBV Electrolink Power Electronics / Power Management
The TLE9009DQU from Infineon is a multi-channel battery monitoring and balancing IC crafted for Li-Ion battery packs.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved