Preview

Biometric Security System on Laptop Computer Using Fingerprint-Based Power Switch

Good Essays
Open Document
Open Document
273 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Biometric Security System on Laptop Computer Using Fingerprint-Based Power Switch
Biometric Security System on Laptop Computer Using Fingerprint-based Power Switch
Description of the Title
The study sought to devise a system to protect every laptop computer from hacking and unwanted file sharing due to usage without permission by unauthorized users. The researcher utilized fingerprint-based biometric security system on the power switch of personal computer, thus making it unquestionably “personal and confidential “.

Nature of the Project

The fingerprint-based biometric security system on personal laptop computer is more accessible, secured, accountable and accurate. It is in the registered fingerprint where an account is created for hassle-free admission to the system. Furthermore, transactions do not consume much time and effort since the information needed to connect and to access one’s account is already automated.

Why the project is selected ? This projected is selected for reasons enumerated as follows ; 1. To develop protection to personal computers from unauthorized users 2. It uses fingerprint based biometric security system to make it unique , personal and cannot be copied .

Objectives This study aims to develop and devise a system in which only an authorized person could gain access on the most important data and information stored in the computer Specifically, the study aimed to answer the following questions:
1. How should the system be designed and developed in order to:
a. Secure the user’s data from hacking or sharing,
b. Provide an account security for the computer user,
c. Ensure that the system is protected against alteration and not prone to errors?
2. What is the level of performance of the system based on the following criteria:
a. Reliability
b. Accessibility
c. Efficiency
d.

You May Also Find These Documents Helpful

  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets?…

    • 306 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Air Wright case study

    • 1396 Words
    • 5 Pages

    Today if we are talking about computer security there are different terminologies that contribute in making the outline of computer security. It is the combination of different processes and mechanism by which important and sensitive information are secluded from publication and tampering by unauthorized persons. The major focus of computer security is to protect information and critical data from unauthorized usage. Computer security has deep roots in Information technology industry. Security in IT can be defined as a branch of computer science which is related to control of different kinds of risks associated with critical data. This can be done only if the authorized person dealing with the system network or administration secures this information with good software and servers which are designed to work heavily.…

    • 1396 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Research Paper

    • 271 Words
    • 2 Pages

    In the 1800’s Francis Henry Galton undertook the first definitive study of fingerprints. He developed a methodology of classifying them for filing. In 1892 Galton published a book called “Fingerprints”. The book contained the first statistical proof supporting the uniqueness of his method of personal identification. Galton’s work went on to describe the basic principles of the present fingerprinting identification system that we use today.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometrics

    • 774 Words
    • 2 Pages

    This paper will discuss biometrics and the concerns that individuals have regarding their privacy. People tend to resist biometrics as a method of identification because of their concerns that their privacy will be invaded or belief that the technology is too intrusive on their personal lives. In this paper, some of the current privacy problems related to biometrics will be discussed. A few of the mechanisms that could mitigate these problems and concerns will be identified. In addition, some methods of biometrics that would not meet with undue resistance from potential users will be recommended to my manager to replace password-based access controls. This paper is intended to provide the reader with an overview of biometrics and to also address the associated privacy concerns.…

    • 774 Words
    • 2 Pages
    Good Essays
  • Good Essays

    At this point we discuss why a computerized information system is either more or less secure than traditional methods. One of the primary ideas behind computers is that the computer key or password is unique for each person or group and can be changed as often as necessary with no cost other than time. Changing a real lock, however, is difficult because all of the keys for that lock must be changed which requires more time and of course money which is not as effective for running a business.…

    • 1528 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Security

    • 5677 Words
    • 23 Pages

    These days, hot products like mobile phones, GPS and computers can be secured at the touch of a fingerprint. Designing in security at the start of a new product development process is more effective than adding it on later. Unlocking your mobile phone by scanning your fingerprint is not a thing of science fiction. It’s an everyday reality for millions of mobile phone users, the greatest proportion of who live in Asia. But designing-in security to mobile phones can be difficult. PIN codes and passwords take too long to enter and users often disable them. Since everyone has a unique fingerprint, biometric technology companies have shown that security at the touch of a fingerprint can be an alternative for portable electronic products. Fingerprint recognition can be implemented in essentially all mobile devices and has the right combination of security, cost and convenience for the end-user. It has the potential to be the single personal identifier that can work with every element of your IT security solution, from the mobile device to the PC, the network, servers, applications and whatever else might be required today, or tomorrow. Fingerprint recognition technology for mobile devices is poised to become the preferred user authentication solution mobile device security. Fingerprint tech is a standard security feature around the world. It works because no - two people not even identical twins have the same fingerprints. Believe it or not, fingerprinting is actually pretty old. It began in eighth-century in Japan. But this ancient approach to security is about to get a big upgrade. Since many smartphones have touch-sensitive screens, by definition, they work with your fingertips. All we need to do is convert that screen into a scanner that takes the place of a password. That way, it only works for you. If you lose your phone or someone steals it, the device goes dead.…

    • 5677 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    Currently,theft has been done in lot of places in our society while considering safety issues this idea is proposed.The objective of this paper is to design the IMAGE based door opening and closing system and also increase the security in banks, collegesand homes based on biometric system. The biometric person authentication technique based on the pattern of the human iris is well suitable for application to any access control system requiring a high level of security. Today, biometric recognition is a common and reliable way to authenticate the identification of a person based on physiological or behavioral characteristics. So in thispaper if iris is matched the door it will be opened otherwise it will not be open. IR sensor used to detect the human in or out.By using this concept,we can avoid the theft in bank&home.It also used in various places in our society to avoid theft.The result of our idea is done in MATLAB & the simulation&Hardware Result are shown in this paper. This idea is very useful in banks, offices, shops etc..…

    • 2104 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Technology and Risks

    • 775 Words
    • 3 Pages

    When technology constantly evolving, it is becoming increasingly difficult to keep confidential info safe. As consumers, we protect our PC with virus protection and malware, we make sure to block our Wi-Fi to keep intruders out and of course we never share our information over the internet.…

    • 775 Words
    • 3 Pages
    Good Essays