Computer Science, asked by devkadiwala, 11 months ago

please write a preface for my computer project


OOOIRKIOOO: may I know what is your topic
like java, oracle,mysql etc
devkadiwala: FINGERPRINTS AND BIOMETRICS
OOOIRKIOOO: OK
devkadiwala: THANK YOU
devkadiwala: can you create a certificate plz
OOOIRKIOOO: WHAT CERTIFICATE ?

Answers

Answered by OOOIRKIOOO
1

The traditional user verification technique does not provide proper security. But BIOMETRICS makes it possible to authenticate an individual's identity based on one's unique personal characteristics. So implementing biometric in computer networks is a challenging technique. In this paper, we have given a brief introduction to biometrics, their working and their role in computer networks. Traditionally, access to these networks involves the use of a network login ID associated with a password or personal identification number (PIN). Biometrics will change all of this. In this paper, we have a new semantic that uses existing password based systems, while eliminating user's knowledge of their passwords for network security along with its function, working and setup. This semantic was later developed as a BioconX software in which the server uses one or more biometric database to map users' physical characteristics and a SQL database as a repository for user and application information. Any SQL that supports an ODBC interface can be used for this purpose. Passwords stored in the database are encrypted. These techniques will span the entire information globe irrespective of the increased costs when compared to the level of security they offer. INTRODUCTION: The biometric login process just described offers a significant improvement over the security of simple passwords and actually makes the user's life easier, rather than imposing a new burden. Instead of manually typing user names and passwords, all users need to do is click a button and lay their thumb or finger over the scan window on the keyboard or mouse. The BIOCONX software uses one or more databases to compare our fingerprints or other characteristics. Since the fingerprint of everyone in this world is unique these can be used for strong authentication. [1] The software processes fingerprint images by locating the minutiae points; that is, the points where fingerprint ridges terminate or bisect. With increasing in network vulnerability, the need for checking the users entering the networks is a major problem. These biometric technologies provide us a strong base solution for this problem. The method can be used in both government and private organization. We will show you the implementation of fingerprint authentication in electronic voting. [1] We have developed the application using C++. We are using the file system to store values which can be stored in a secure database in future. These applications with proper modification will definitely help the election commission of India to conduct elections in an honest manner. Currently we are working at implementing this software 100% practical, at least in a LAN. If all the hurdles are cleared, this technology is going to be a great boon in the field of security



devkadiwala: THANKS
OOOIRKIOOO: ANYTIME
Similar questions