Abstract [eng] |
Automated access control systems are becoming increasingly integrated within any aspect of technology, be that IT or regular business appliances. Such systems can automatically control access to offices, premises or whole buildings. Systems, which require either PIN (Personal Identification Number), ID card or like to be used to authenticate one and allow access to protected area. Biometric systems, which are based on unique aspects of human physiology, came into wider usage only recently, when technological advances made such technology viable for wide application. Currently most biometric systems use fingerprints, iris, voice, face or a combination of them. Biometric access control systems are more reliable, because one cannot accidentally forget one’s eye or finger at home, biometric information cannot be stolen, lost, is hard to counterfeit and it takes human factor out of the equation. Using biometrics is as simple as putting one’s finger or eye to the scanner, saying phrase or just getting photographed by a camera, the systems handles everything else automatically. Nowadays, when IT systems development speed has gone way ahead of hardware capabilities, when IT is rapidly expanding into devices until recently thought to be incompatible with such technology (refrigerators, air conditioners, microwave ovens, etc.) and the world’s need for information is still accelerating, system developers even more frequently look up to distributed systems. However, distributed systems are not new: they have been around since invention of computer networks and there’s still not clear, which idea influenced the other’s emergence. Nonetheless, since then those two technologies have become inseparable. This work deals with distributed systems and their testing peculiarities, applicable testing methodologies and differences between distributed and local systems’ testing in pursuance of defining the most suitable method or combination of methods. Research is done by analyzing and applying different testing methodologies in testing of distributed system, known as Face Recognizing Access Control System. This particular system applies biometric data, particularly user’s face image, to verify ones permission to enter protected areapermission to enter protected area. |