CUTTING EDGE TECHNOLOGIES FINGER PRINT READER Made by: Noor-e-Basr Class: XI.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

Fingerprints.
Dactyloscopist Fingerprint expert.
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Fingerprints. Fingerprints as a Forensic Tool Fingerprints as a means of identification has been around as long as 3000 years ago Used forensically since.
Finger Printing. What is finger printing? A finger print is a mark left behind after the ridges on the fingers, hands, toes or feet touch an object.
PRESENTED BY : DUA RAZA CLASS IX. FINGERPRINT IDENTIFICATION Among all the biometric techniques, fingerprint- based identification is the oldest method.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
How it works. When the user places their finger on Fingerprint Recognition Device (FRD) for the first time, the fingerprint is scanned and a 3-D fingerprint.
Chapter 4 Fingerprints Kendall/Hunt.
NIST Special Publication Biometric Data Specification for Personal Identity Verification March 3, 2006 Update.
Microsoft Passport Waldemar Swiercz.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
Marjie Rodrigues
INTEGRATED JUSTICE SYSTEM 1 INTEGRATED JUSTICE SYSTEM FINGERPRINT PROCESSES.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
The Impact of Physical Security on Network Security
CJ328 Unit 3-Review Things you should know Fingerprints contain unique, individual characteristics Galton details are level two details or individual characteristics.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
UBC – Computer Security October 4, 2007 Gordon Ross – President VIRTUAL PERCEPTIONSYSTEMS INC.
8 th Grade Forensic Science A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Software BrandsState the Type of Software each Brand below is Microsoft Access Database Microsoft Excel Spread sheet Microsoft Outlook Microsoft.
ACOS 2.2, 2.3 Print Classification Henry System- adopted in 1901, looked at ridge patterns on all 10 fingers, but only accommodated 100,000 sets of prints.
What are fingerprints? Impressions left on any surface composed of patterns made by the friction ridges – Same definitions could apply to toe, foot, or.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
CUTTING EDGE TECHNOLOGIES PREPARED BY : LAIBA FATIMA CLASS: XI.
Lesson 4-Access Control Solution
Fingerprints. Fingerprinting System of identification based on the classification of finger ridge patterns System of identification based on the classification.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Kendall/Hunt Publishing Company
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
Fingerprinting Process of recording or inking the fingers on a fingerprint card in its respective order with light pressure by rolled or plain methods.
Daily Trivia The earliest dated prints of the ridged skin on human hands and feet were made about 4,000 years ago during the pyramid building era in Egypt.
ATM with Biometric Technology Group 7 Priyanka Hulsurkar. Suryadevara Sai Krishna. Adwait Mulye.
Fingerprints. Summary  What are fingerprints?  How are fingerprints analyzed?  How are fingerprints collected?
A Closer Look at Fingerprints Image from ftp://sequoyah.nist.gov/pub/nist_internal_reports/ir_6534.pdf T. Trimpe 2007
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Fingerprints Ch. 4 and some of Ch. 9. Journal Determine the Henry Number for the following: L W A A L A L W L A.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Fingerprinting Dr. Walker.
A Closer Look at Fingerprints
At the end of each day the evening manager at each store enters a code into the cash register, after which the cash register connects to the central computer.
Input Devices.
FLTCC Forensic Science
Fingerprints.
Fingerprints.
Dactyloscopy Dactyl Skopien
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
حقوق الملكية الفكرية إعداد الطالبة: مها عبدالله
Fingerprints.
Fingerprints Lecture 1.
Margaret Brown 3rd period October 14, 2007
Fingerprints Vocabulary
A Closer Look at Fingerprints
Operating Systems Security
A Closer Look at Fingerprints
Making a Match.
A Closer Look at Fingerprints
Fingerprints Science & Tech 11.
A Closer Look at Fingerprints
Fingerprints.
Fingerprints: Methods of Detection
Fingerprints.
Presentation transcript:

CUTTING EDGE TECHNOLOGIES FINGER PRINT READER Made by: Noor-e-Basr Class: XI

FINGER PRINT READER FINGER PRINT READER IS A DEVICE THAT WAS SOLD BY MICROSOFT PRIMARILY TARGETED AT HOME AND SMALL BUSINESS USERS WHICH HAS BEEN DISCONTINUED. THE FIRST FINGER PRINT READER WAS RELEASED SEPTMBER, USERS OF FINGER PRINT READER COULD REGISTER ANY FINGER UP TO TEN SINCE THE SOFTWARE HAS THE CAPABILITY TO STORE ALL TEN FINGERS FOR A SINGLE USER. LOGIN NAMES AND PASSWORDS ASSOCIATED WITH REGISTERED FINGER PRINTS ARE STORED IN A DATA BASE LOCATED IN THE USER’S COMPUTER.

THE DEVICE COULD BE USEFUL IN A PUBLIC ENVIRONMENT, WHERE IT MAY PREVENT OTHERS FROM SEEING PASSWORDS FROM BEING KEYED IN. FINGERPRINT IDENTIFICATION KNOWN AS HAND PRINT IDENTIFICATION, IS THE PROCESS OF COMPARING TWO INSTANCES OF FRICTION RIDGE SKIN IMPRESSIONS, FOR HUMAN FINGERS OR TOES, OR EVEN THE PALM OF THE HAND OR SOLE OF THE FOOT TO DETERMINE WHETHER THESE IMPRESSIONS COULD HAVE COME FROM THE SAME INDIVIDUAL. FINGER PRINT READER

AN INTENTIONAL RECORDING OF FRICTION RIDGES IS USUALLY MADE WITH BLACK PRINTER’S INK ROLLED ACROSS A CONTRASTING WHITE BACKGROUND TYPICALLY A WHITE CARD. FINGER PRINT IMAGE ACQUISITION IS CONSIDERED TO BE THE MOST ARTIFICIAL STEP IN AN AUTOMATED FINGER PRINT AUTHENTICATION SYSTEM, AS IT DETERMINES THE FINAL FINGER PRINT IMAGE QUALITY, WHICH HAS A DRASTIC EFFECT ON THE OVER ALL SYSTEM PERFORMANCE.

VARIOUS SCHOOLS HAVE IMPLEMENTED FINGER PRINT LOCKS OR MADE A RECORD OF CHILDREN’S FINGER PRINTS. IN THE UNITED KINGDOM THERE HAVE BEEN FINGER PRINT LOCKS IN HOLLAND PARK SCHOOL IN LONDON, AND CHILDREN’S FINGER PRINTS ARE STORED IN DATA BASES. THE NON- GOVERNMENTAL ORGANIZATIONS [NGO] PRIVACY INTERNATIONAL IN 2002 MADE THE CAUTIONARY ANNOUNCEMENT THAT TENS OF THOUSANDS OF UK SCHOOL CHILDREN WERE BEING FINGER PRINTED BY SCHOOLS, OFTEN WITHOUT KNOWLEDGE OR CONSENT OF THEIR PARENTS. FINGER PRINT READER