Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview

Size: px
Start display at page:

Download "Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview"

Transcription

1 Computer System Fundamentals, Prof. Hill, 1/20/2007 Computer Enabled Biometric Devices: A Fingerprint Scanner Hardware Overview Submitted by: Alex Getty Getty 1

2 With the current mindset of a consumer edging more and more towards security with threats of identity theft and terrorism looming on the horizon, there is a world in need of a savior of data security. Identity theft was marked at the fastest growing crime in the nation for the year 2005 which is perhaps something to get excited about (Holzman 1). The savior may yet be very close at hand, your fingertips to be precise. Biometrics are becoming a large part of computer security by means of physical authentication in the corporate, government, and private sectors. With the growing use of these technologies it is necessary to understand the implementation and execution of these products. Biometric devices come in a wide variety implementations, each of which recognizes a unique pattern in the human body which is inherently random enough to make the chances of multiples near impossible. Vein patterns, Irises, Retinas, Fingerprints, voice prints, and palm prints are all relatively unique. Fingerprints are formed much like the hills and valleys of the earth by wind and weather. The way fingerprints are created is differs only in that they are formed from the inherently random pattern of a combination of the position of the fetus in the womb, the density and makeup of the amniotic fluid surrounding the baby, as well as innumerable other environmental factors. Even identical twins do not share the same fingerprint, making this quite possibly the best unique human identifiers and subsequently the one of the best authentication methods. Fingerprint scanners are the most cost effective implementation of biometrics in the work place and at home. Their compact size and easy installation offer the most ease of use with the most security provided. Fingerprint scanners analyze the ridges and valleys in fingerprints in order to determine a match against a fingerprint that has been Getty 2

3 enrolled or added to the authentication system. A fingerprint is matched using software that checks for minutiae within the fingerprint. The software often checks for patterns in the fingerprints and not a full match. Because fingerprint scanners most often do not get a perfect image of the print they must do their analysis from point to point measurements. Two points are taken and then the distance is measured, the software then checks for features between the points such as bifurcations (where one ridge of a fingerprint splits into two ridges) or the ending or beginning of ridges and which direction they go in. The algorithms in the software check the new image compared to the image on record and make comparisons in the minutiae until a sufficient match percentage is reached. Most manufacturers keep their match percentage secret but it would seem that the average is close to percent on up. Fingerprint scanners generally differ in how they acquire the image to do the analysis. The scanners are usually classified as either an optical scanner or a capacitance scanner. An optical scanner works with a charge coupled device (CCD) at its core which is the same type of light sensor array found in digital cameras. A CCD us an array of photosensitive diodes that react by generating an electrical signal in reaction to light photons that it is exposed to. These diodes, called photosites, record pixels on an image. They are generally concerned with whether the area above the photosite is light or dark. The scanner normally has its own light source of one or a cluster of LEDs which light up the platen for this purpose. The electronic signal from the photosites then goes through an analog-to-digital converter to get the information to the analysis software but only after the scanner processor makes sure the CCD captured a clear image of the fingerprint. The CCD output is normally an inverted image of the fingerprint, or the darker areas Getty 3

4 represent the ridges and the light areas represent the valleys between the ridges. The image only ever makes it to the analysis software after intense scrutiny by the onboard scanner processor, making sure the image is crisp, properly exposed, and as close to smudge free as the software limits allow (Beal 1). A capacitance scanner works in a different fashion. While the capacitance scanner also checks for light and dark pixels, it works through capacitors using electrical current. The diagram shows a capacitive sensor which contains a series of cells, each of which contain two small conductor plates that are less than the width of the ridge of a fingerprint across. The capacitive cells are then covered in a layer of insulating material. Capacitive sensor array used in capacitive fingerprint scanners, diagram is only partial and shows one inverting operational amplifier engaged (ridges) while the other is disengaged (valleys) The sensor output is then fed into an integrator which is an electrical circuit built around an inverting operational amplifier, details of which are beyond the scope of this paper. Getty 4

5 The inverting amplifier alters a supply voltage, alteration of which is based on the relative voltage of two inputs, the inverting terminal and the non-inverting terminal. (Harris 4) The non-inverting terminal is connected to ground where the inverting terminal is connected to a reference voltage supply and a feedback loop. The feedback loop includes the conductor plates. The two conducting plates form a crude capacitor, along with the surface of the finger which acts as a third conducting plate when pressed against the insulating layer (Harris 4). The distance from the conductors to the finger surface changes the total capacitance of the capacitor. The capacitor under a ridge should have a higher capacitance than one under a valley because of this property. When the scanner puts together all of the signals from the capacitors it can put together an accurate picture of what the fingerprint looks like. The main advantage of a capacitance scanner over an optical scanner is that it requires an actual fingerprint shape as opposed to a pattern of light and dark which is required by an optical scanner, thus making the scanner harder to trick and subsequently smaller due to the lack of a CCD or LED array inside the unit. Two phase authentication is growing in the corporate sector and is categorized by one thing you have, usually an RSA card, and one thing you know, usually your password. Fingerprint scanners can be implemented in one phase, or multi-phase depending on the intended layer of security. The home user may wish to implement only one phase, logging into a computer account, account, or anything else simply by touching his or her finger on a platen. In a corporate environment it may be desirable to have a fingerprint read along with a password authentication. Since most scanners interface with the computer via USB and some older or industrial applications interface Getty 5

6 via RS-232 there should be little to no performance tradeoff for the extra security the hardware adds. The technology is relatively cheap, most often under $200 for a nice unit and is easy to deploy in the corporate or private computing environment with little software setup involved. CCD based units are often cheaper than Capacitance based units but can be tricked more easily by using a picture or facsimile of a fingerprint. There have been proofs of concepts that have arisen with fooling a CCD based scanner at least one in five times using a gelatin based fingerprint positive from a silly putty negative. (Rutter 1) The threat of an organization being compromised by Jell-O is relatively minimal however. Even so, one would need to get a fingerprint into a silly putty mold in order to get the negative. There are pros and cons to the hardware itself as well as the two major implementations of it, so deciding comes down to the end user in terms of price, size, and security. It s nothing that a paper can decide for you. A fingerprint scanner can be a great investment for your security. For the small cost of a USB unit, the security of the workstation or server is increased many-fold. The enrollment systems that come with the devices are easy to install and configure on Windows and Linux making the rollout little more than plugging in the unit, installing the software, and placing the finger on the platen or capacitor array. The technology of a human s random fingerprint has been around for centuries, and it s doubtful that it will change in the near future. This fact alone promises return on your investment in a fingerprint scanner, whether you choose a CCD based scanner or a capacitance scanner. Getty 6

7 Works Cited Beal, Vangie. "How Fingerprint Scanners Work." Webopedia. 18 Nov Jan < fingerprint.asp>. "Biometric security for protecting IT assets." Privaris Jan < Harris, Tom. "How Fingerprint Scanners Work." How Stuff Works. 24 Oct Jan < Holzman, Carey. "Recipe: Biometrics for Systems Builders." TechBuilder. 6 Sept Jan < Rutter, Daniel. "Thinking Putty defeats Biometric Fingerprint Scanners!" Crazy Aaron's Puttyworld. Dan's Data. 22 Jan < Getty 7

Touch Screen Technology. Taking apart a tablet

Touch Screen Technology. Taking apart a tablet Touch Screen Technology Topics covered: 1) Resistance, Capacitance, Charge, Voltage, and Current 2) Introduction to simple circuits Taking apart a tablet For example, an ipad2 Touchscreen Motherboard Lots

More information

Assignment 1 Biometric authentication

Assignment 1 Biometric authentication Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4

More information

Penetration Testing Biometric System

Penetration Testing Biometric System Penetration Testing Biometric System A Penetration Testers Guide to Finger Print Authentication [FB1H2S aka Rahul Sasi] http://fb1h2s.com http://www.garage4hackers.com Presented @ NullCon International

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

May 2010. For other information please contact:

May 2010. For other information please contact: access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.

More information

Biometric authentication systems today and in the future

Biometric authentication systems today and in the future Biometric authentication systems today and in the future Birgit Kaschte Computer Science Department University of Auckland birgit@kaschte.de 24 October 2005 Abstract. Biometric data has been a widely discussed

More information

22 nd NISS Conference

22 nd NISS Conference 22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

MAS.836 HOW TO BIAS AN OP-AMP

MAS.836 HOW TO BIAS AN OP-AMP MAS.836 HOW TO BIAS AN OP-AMP Op-Amp Circuits: Bias, in an electronic circuit, describes the steady state operating characteristics with no signal being applied. In an op-amp circuit, the operating characteristic

More information

WHITE PAPER. Let s do BI (Biometric Identification)

WHITE PAPER. Let s do BI (Biometric Identification) WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an

More information

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria

More information

Analog control unit for mobile robots

Analog control unit for mobile robots Analog control unit for mobile robots Soldering kit for experimentation For Fischertechnik robots and others Most diverse functions Requires no programming Patented sensor technology Summary We are pleased

More information

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger. According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI Biometrics: Advantages for Employee Attendance Verification InfoTronics, Inc. Farmington Hills, MI Biometric technology offers advanced verification for employees in every industry. Because biometric systems

More information

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker

More information

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg

- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg marketing@litestar.com.sg Biometric Systems Biometrics

More information

Fingerprint Based Biometric Attendance System

Fingerprint Based Biometric Attendance System Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265

More information

SCB Access Single Sign-On PC Secure Logon

SCB Access Single Sign-On PC Secure Logon SCB Access Single Sign-On PC Secure Logon Manage all your passwords One smart card to access all your applications past & future Multi-factor authentication Dramatically increase your security Save $150

More information

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based

More information

Fooling Fingerprint Scanners - Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner

Fooling Fingerprint Scanners - Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner 4 th Australian Information Warfare and IT Security Conference 2003 Fooling Fingerprint Scanners - Biometric Vulnerabilities of the Precise Biometrics 100 SC Scanner Antti Stén, Antti Kaseva, Teemupekka

More information

Research Article. ISSN 2347-9523 (Print) *Corresponding author Nathan David Email:

Research Article. ISSN 2347-9523 (Print) *Corresponding author Nathan David Email: Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):868-873 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

L-1 Fingerprint Reader Solutions. V-Flex 4G

L-1 Fingerprint Reader Solutions. V-Flex 4G L- Fingerprint Reader Solutions V-Flex 4G 4G Biometric Performance Redefined with a Flexible and Powerful Device to Secure any Size Premises Advanced Features Large Template Storage Capacity (0,000 in

More information

QUICK START GUIDE FOR DEMONSTRATION CIRCUIT 956 24-BIT DIFFERENTIAL ADC WITH I2C LTC2485 DESCRIPTION

QUICK START GUIDE FOR DEMONSTRATION CIRCUIT 956 24-BIT DIFFERENTIAL ADC WITH I2C LTC2485 DESCRIPTION LTC2485 DESCRIPTION Demonstration circuit 956 features the LTC2485, a 24-Bit high performance Σ analog-to-digital converter (ADC). The LTC2485 features 2ppm linearity, 0.5µV offset, and 600nV RMS noise.

More information

What the Future of Online Banking Authentication Could Be

What the Future of Online Banking Authentication Could Be Universal Banking Solution System Integration Consulting Business Process Outsourcing Banking on Internet and mobile is gaining popularity The Pew Internet & American Life Project Tracking survey of December

More information

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

XYPRO Technology Brief: Stronger User Security with Device-centric Authentication Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication

More information

Sensors and Cellphones

Sensors and Cellphones Sensors and Cellphones What is a sensor? A converter that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument What are some sensors we use every

More information

Framework for Biometric Enabled Unified Core Banking

Framework for Biometric Enabled Unified Core Banking Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty

More information

SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9

SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9 SE05: Getting Started with Cognex DataMan Bar Code Readers - Hands On Lab Werner Solution Expo April 8 & 9 Learning Goals: At the end of this lab, the student should have basic familiarity with the DataMan

More information

Section 3. Sensor to ADC Design Example

Section 3. Sensor to ADC Design Example Section 3 Sensor to ADC Design Example 3-1 This section describes the design of a sensor to ADC system. The sensor measures temperature, and the measurement is interfaced into an ADC selected by the systems

More information

ECE 480 - Design Team 4 Hot Strip Mill Centerline Tracking 10/10/13

ECE 480 - Design Team 4 Hot Strip Mill Centerline Tracking 10/10/13 ECE 480 - Design Team 4 Hot Strip Mill Centerline Tracking 10/10/13 Facilitator Dr. Selin Aviyente Team Members Bryan Blancke Mark Heller Jeremy Martin Daniel Kim Sponsor ArcelorMittal Project Liaison

More information

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY

HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY HARDENED MULTI-FACTOR AUTHENTICATION INCREASES ENTERPRISE PC SECURITY INSTEAD OF A SECURITY PROBLEM, ENDPOINTS BECOME PART OF THE SECURITY SOLUTION SUMMARY The internet and mobility have made enterprise

More information

Electronics for Analog Signal Processing - II Prof. K. Radhakrishna Rao Department of Electrical Engineering Indian Institute of Technology Madras

Electronics for Analog Signal Processing - II Prof. K. Radhakrishna Rao Department of Electrical Engineering Indian Institute of Technology Madras Electronics for Analog Signal Processing - II Prof. K. Radhakrishna Rao Department of Electrical Engineering Indian Institute of Technology Madras Lecture - 18 Wideband (Video) Amplifiers In the last class,

More information

Voice Authentication for ATM Security

Voice Authentication for ATM Security Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India rahulrsharma999@gmail.com Abstract: Voice authentication system captures the

More information

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student

More information

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)

Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA) Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected

More information

Photonic Reservoir Computing with coupled SOAs

Photonic Reservoir Computing with coupled SOAs Photonic Reservoir Computing with coupled SOAs Kristof Vandoorne, Wouter Dierckx, David Verstraete, Benjamin Schrauwen, Roel Baets, Peter Bienstman and Jan Van Campenhout OSC 2008: August 26 Intelligence

More information

OA101 Fingerprint Time attendance system Preface

OA101 Fingerprint Time attendance system Preface Preface Honorable customers, Thanks for choosing products of this company. OA101, with world cutting edge technologies fingerprint recognition, computer communication, as well as microelectronics, is considered

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Forensic Science Lesson 3: Trace Evidence Analysis

Forensic Science Lesson 3: Trace Evidence Analysis Forensic Science Lesson 3: Trace Evidence Analysis History Alphonse Bertillon 1883 Created the first systematic system of individual classification & identification Detailed description of subject, full-length

More information

Precision Diode Rectifiers

Precision Diode Rectifiers by Kenneth A. Kuhn March 21, 2013 Precision half-wave rectifiers An operational amplifier can be used to linearize a non-linear function such as the transfer function of a semiconductor diode. The classic

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

COMPARISON OF VARIOUS BIOMETRIC METHODS

COMPARISON OF VARIOUS BIOMETRIC METHODS COMPARISON OF VARIOUS BIOMETRIC METHODS Rupinder Saini, Narinder Rana Rayat Institute of Engineering and IT errupindersaini27@gmail.com, narinderkrana@gmail.com Abstract This paper presents comparison

More information

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION

Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2

More information

Asterisk: The Future of Your Phone Service

Asterisk: The Future of Your Phone Service Asterisk: The Future of Your Phone Service What is an Asterisk PBX? Overview Asterisk is an open source / open standards hybrid phone system that uses standard computer hardware and software to unite all

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Operational Amplifier as mono stable multi vibrator

Operational Amplifier as mono stable multi vibrator Page 1 of 5 Operational Amplifier as mono stable multi vibrator Aim :- To construct a monostable multivibrator using operational amplifier 741 and to determine the duration of the output pulse generated

More information

Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration

Each ievo reader needs its own network cable, as each reader has its own IP address. Ensure this has been taken into consideration WELCOME ievo would like to thank you for purchasing our product. ievo advise the use of a. Ensure you have calculated the correct power supply amp rating if you are connecting the ievo board and other

More information

DIGITAL-TO-ANALOGUE AND ANALOGUE-TO-DIGITAL CONVERSION

DIGITAL-TO-ANALOGUE AND ANALOGUE-TO-DIGITAL CONVERSION DIGITAL-TO-ANALOGUE AND ANALOGUE-TO-DIGITAL CONVERSION Introduction The outputs from sensors and communications receivers are analogue signals that have continuously varying amplitudes. In many systems

More information

Data Security 2. Implement Network Controls

Data Security 2. Implement Network Controls UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which

More information

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute

N Stage Authentication with Biometric Devices. Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute N Stage Authentication with Biometric Devices Presented by: Nate Rotschafer Sophomore Peter Kiewit Institute Revised: July 8, 2002 N Stage Authentication Outline Background on Authentication General Network

More information

Mobile Device Management

Mobile Device Management Mobile Device Management The objective of this document is to provide you with context about mobile device management, for both ipad and Mac, to enable you to have a relevant conversation with your customer

More information

Digital Persona Fingerprint Reader Installation

Digital Persona Fingerprint Reader Installation Digital Persona Fingerprint Reader Installation The link to download the Fingerprint Reader Software for AXIS-ACH is http://corpcu.com/fingerprint-reader-software This will begin the download for the drivers.

More information

HandPunch. Overview. Biometric Recognition. Installation. Is it safe?

HandPunch. Overview. Biometric Recognition. Installation. Is it safe? HandPunch Overview Biometric Recognition Installation This section describes the HandPunch series of biometric scanners from RSI (Recognition Systems). These instructions apply to all the different HandPunch

More information

Biometrics Unique, simple, convenient

Biometrics Unique, simple, convenient Biometrics Unique, simple, convenient Biometrics Unique personal identification.. Simply place your finger on the sensor - job done! As convenient as it gets. 2 Why biometrics? Your benefits at a glance

More information

Prof. Dr. M. H. Assal

Prof. Dr. M. H. Assal Prof. Dr. M. H. Assal AS 26/10/2014 Computer hardware is the collection of physical elements that comprise a computer system Computer hardware can be classified as following: o Input devices o Output devices

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

Acano solution. Security Considerations. August 2015 76-1026-01-E

Acano solution. Security Considerations. August 2015 76-1026-01-E Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration

More information

YubiKey with Password Safe

YubiKey with Password Safe Authentication concepts Author: Felicia King Authentication concepts Single-factor authentication Single-factor authentication is inherently flawed. Hackers and criminals install keystroke loggers, screen

More information

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century

Cent ralized Out -Of-Band Aut hent ic at ion Syst em. Authentication Security for the 21 st Century Cent ralized Out -Of-Band Aut hent ic at ion Syst em Security for the 21 st Century Presented by: Southeast Europe Cybersecurity Conference Sophia, Bulgaria September 8-9, 2003 Introduction Organizations

More information

Nexus Technology Review -- Exhibit A

Nexus Technology Review -- Exhibit A Nexus Technology Review -- Exhibit A Background A. Types of DSL Lines DSL comes in many flavors: ADSL, ADSL2, ADSL2+, VDSL and VDSL2. Each DSL variant respectively operates up a higher frequency level.

More information

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,

More information

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH

FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH FINGERPRINT CLEAN HANDS ONLY DRY HANDS THOROUGHLY ROLL FINGERS FROM NAIL-TO-NAIL NOTE THE CORES AND DELTAS TAKE IMPRESSIONS IN CORRECT ORDER PRODUCE

More information

A Security Survey of Strong Authentication Technologies

A Security Survey of Strong Authentication Technologies A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication

More information

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone)

Threat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone) Threat Modelling for Web Application Deployment Ivan Ristic ivanr@webkreator.com (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /

More information

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu.

Fall 2009. Lecture 1. Operating Systems: Configuration & Use CIS345. Introduction to Operating Systems. Mostafa Z. Ali. mzali@just.edu. Fall 2009 Lecture 1 Operating Systems: Configuration & Use CIS345 Introduction to Operating Systems Mostafa Z. Ali mzali@just.edu.jo 1-1 Chapter 1 Introduction to Operating Systems An Overview of Microcomputers

More information

W38 / W35 GLOBAL TIME ATTENDANCE. AGW Systems

W38 / W35 GLOBAL TIME ATTENDANCE. AGW Systems W38 / W35 GLOBAL TIME ATTENDANCE AGW Systems TIME ATTENDANCE HOW TO CHOOSE YOUR SYSTEM WHAT IS MY BEST CHOICE? The first step in selecting your time attendance system is to know clearly how much information

More information

Expertise for biometric solution

Expertise for biometric solution Expertise for biometric solution Biometrics Solutions from Kaba Kaba is the leading manufacturer for biometric solutions in time and attendance, shop floor data collection and access control. From the

More information

Digital to Analog Converter. Raghu Tumati

Digital to Analog Converter. Raghu Tumati Digital to Analog Converter Raghu Tumati May 11, 2006 Contents 1) Introduction............................... 3 2) DAC types................................... 4 3) DAC Presented.............................

More information

BehavioSec participation in the DARPA AA Phase 2

BehavioSec participation in the DARPA AA Phase 2 BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper

More information

GENERAL POWER SYSTEM WIRING PRACTICES APPLIED TO TECNADYNE DC BRUSHLESS MOTORS

GENERAL POWER SYSTEM WIRING PRACTICES APPLIED TO TECNADYNE DC BRUSHLESS MOTORS 1/5/2006 Page 1 of 6 GENERAL POWER SYSTEM WIRING PRACTICES APPLIED TO TECNADYNE DC BRUSHLESS MOTORS 1. Introduction The purpose of this application note is to describe some common connection and filtering

More information

The Development of a Pressure-based Typing Biometrics User Authentication System

The Development of a Pressure-based Typing Biometrics User Authentication System The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.

More information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored

More information

Experiment 8 : Pulse Width Modulation

Experiment 8 : Pulse Width Modulation Name/NetID: Teammate/NetID: Experiment 8 : Pulse Width Modulation Laboratory Outline In experiment 5 we learned how to control the speed of a DC motor using a variable resistor. This week, we will learn

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

GenTech Practice Questions

GenTech Practice Questions GenTech Practice Questions Basic Electronics Test: This test will assess your knowledge of and ability to apply the principles of Basic Electronics. This test is comprised of 90 questions in the following

More information

IT Infrastructure: Hardware and Software

IT Infrastructure: Hardware and Software IT Infrastructure: Hardware and Software LEARNING OBJECTIVES What are the components of IT infrastructure? What are the major computer hardware, data storage, input, and output technologies used in business?

More information

RF Network Analyzer Basics

RF Network Analyzer Basics RF Network Analyzer Basics A tutorial, information and overview about the basics of the RF Network Analyzer. What is a Network Analyzer and how to use them, to include the Scalar Network Analyzer (SNA),

More information

Doc Ref: 2015.06.01.002. 602.783.1112 baselayer.com 2015 BASELAYER TECHNOLOGY, LLC

Doc Ref: 2015.06.01.002. 602.783.1112 baselayer.com 2015 BASELAYER TECHNOLOGY, LLC TM 602.783.1112 baselayer.com 2015 BASELAYER TECHNOLOGY, LLC TM D400E Data Module (60Hz) The EDGE D400E is designed to meet high power density requirements for both the HPC and Web Scale environments while

More information

Fingerprint Enrollment Procedures

Fingerprint Enrollment Procedures Fingerprint Enrollment Procedures 1 Version 1.1 December 1, 2003 Last Update April 1, 2004 COPYRIGHT Copyright 2003 Ringdale. All rights reserved. No part of this publication may be reproduced, transmitted,

More information

Access Control Using Smartcard And Passcode

Access Control Using Smartcard And Passcode IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676 Volume 4, Issue 5 (Jan. - Feb. 2013), PP 29-34 Access Control Using Smartcard And Passcode Omorogiuwa Eseosa 1., Uhunmwangho

More information

W a d i a D i g i t a l

W a d i a D i g i t a l Wadia Decoding Computer Overview A Definition What is a Decoding Computer? The Wadia Decoding Computer is a small form factor digital-to-analog converter with digital pre-amplifier capabilities. It is

More information

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.

Biometric Security: Client-Server Systems. Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key. Biometric Security: Client-Server Systems Mira LaCous VP Technology & Development BIO-key International, Inc. 651-789-6117 Mira.LaCous@bio-key.com The Session Private vs Public / Personal vs Public Forms

More information

Product Guide. We will reduce costs while improving performance, reliability, compliance and security.

Product Guide. We will reduce costs while improving performance, reliability, compliance and security. Product Guide 2014 We will reduce costs while improving performance, reliability, compliance and security. We manage EVERY aspect of functionality of a complete IT department As complex as an enterprise

More information

NFC & Biometrics. Christophe Rosenberger

NFC & Biometrics. Christophe Rosenberger NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,

More information

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database.

Reporting works by connecting reporting tools directly to the database and retrieving stored information from the database. Print Audit 6 - Step by Step Walkthrough IMPORTANT: READ THIS BEFORE PERFORMING A PRINT AUDIT 6 INSTALLATION Print Audit 6 is a desktop application that you must install on every computer where you want

More information

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device CHOOSING THE RIGHT PORTABLE SECURITY DEVICE A guideline to help your organization chose the Best Secure USB device Introduction USB devices are widely used and convenient because of their small size, huge

More information

AC-DC Converter Application Guidelines

AC-DC Converter Application Guidelines AC-DC Converter Application Guidelines 1. Foreword The following guidelines should be carefully read prior to converter use. Improper use may result in the risk of electric shock, damaging the converter,

More information

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction

More information

Optical Sensor Interface for AFX Digital LED Timer/Counter by George Warner, Jan. 2003 warnergt@ptd.net

Optical Sensor Interface for AFX Digital LED Timer/Counter by George Warner, Jan. 2003 warnergt@ptd.net Optical Sensor Interface for AFX Digital LED Timer/Counter by George Warner, Jan. 200 warnergt@ptd.net Abstract This paper presents a design for an optical sensor interface to an AFX Digital LED Timer/Counter.

More information

The Benefits of an Industry Standard Platform for Enterprise Sign-On

The Benefits of an Industry Standard Platform for Enterprise Sign-On white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed

More information

2 FACTOR + 2. Authentication WAY

2 FACTOR + 2. Authentication WAY 2 FACTOR + 2 WAY Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5

More information

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY

More information

MegaMatcher Case Study

MegaMatcher Case Study MegaMatcher Case Study Sri Lanka Foreign Employment Passport Tracking & AFIS System System integrator Cenmetrix developed the CenAFIS solution for the Sri Lanka Bureau of Foreign Employment. The Automated

More information

Machine Safety Design: Safety Relays Versus a Single Safety Controller

Machine Safety Design: Safety Relays Versus a Single Safety Controller Machine Safety Design: Safety Relays Versus a Single Safety Controller Technical and Commercial Considerations A White Paper presented by: Mike Garrick Product Marketing Lead Specialist INTERFACE Relays

More information

The Do s and Don ts of Pressure Transducers

The Do s and Don ts of Pressure Transducers The Do s and Don ts of Pressure Transducers ABSTRACT When specifying a pressure transducer for a process measurement, a number of items have to be considered. Some of the more important ones are discussed

More information