Preview

Embedded System

Powerful Essays
Open Document
Open Document
2930 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Embedded System
EMBEDDED SYSTEM PRESENTED BY,
G.GURU RAJ,
EEE, 3rd year,
g.gururaj2812@gmail.com.
ARUN RAJ,
EEE, 3rd year,

M.KUMARASAMY COLLEGE OF ENGINEERING.

KARUR

EXTENDED SECURITY FOR BANKING SECTOR USING

EMBEDDED SYSTEM

The world of today has high become a place with very high security but there are hackers (code breakers) and thieves who are trying to bring down this security system. So we need keep updating our security system. Here one of the system which is presently in function could be more secured using Biometrics and Embedded System. In this paper we have used the biometrics (finger print recognition) for security purpose and embedded system to automate the complete process. There many methods in providing security using biometrics we have gone for the finger print recognition. In embedded system we have gone for PIC micro controller (PIC16F877). Here our project is helping the banking sector to safe keep the credit cards so called the plastic money, ATM cards and the bank lockers. We have taken into consideration all factors that affect the security of the present system in those sectors and have given an updated version of security for them .

The biometrics have been used as the lock in providing security and the embedded system has been interface that connect the user and the automated system. We hope to give an better security for the society which needs to be a secured place live for us. We believe that our idea provides better security than the existing system.
EXTENDED SECURITY FOR BANKING SECTOR USING

EMBEDDED SYSTEM

WHAT IS EMBEDDED SYSTEM? As the name signifies, an embedded system is defined as the system into which the user’s logic or ideas are embedded. Embedded systems include a variety of hardware and software components, which perform

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Abstract: This article designated that DSP TMS320VC5416 takes the fingerprint signal the processor, using its assembly line code operating feature, and unifies the fingerprint recognition technology, uses in the burglar-proof door the design, realizes can distinguish master's bur…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Home and business users alike are using biometric security. Through a biometric identifier, such as a fingerprint, biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems.…

    • 264 Words
    • 2 Pages
    Good Essays
  • Good Essays

    SSRN id2512567

    • 13967 Words
    • 62 Pages

    Chandra, A., and T. G. Calderon. 2003. Toward a biometric security layer in accounting systems.…

    • 13967 Words
    • 62 Pages
    Good Essays
  • Powerful Essays

    Embedded System

    • 1779 Words
    • 8 Pages

    The above words aren’t the headlines of the newspaper but daily news everyone come across whenever we go through a newspaper or watching TV news. A person’s life is precious and meaningful to his loved ones. We, as responsible engineers felt a part of society to bring a system to avoid these mishaps. With the meteoric Embedded Systems along with microprocessor our designed system in preventing deaths and providing safe guided measures.…

    • 1779 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Nowadays a lot of security devices were introduced like alarms, codes detectors, and biometric systems that we can use but biometrics system is the most effective and is the highest level of security system in our generation. Biometrics system refers to an automated system that can identify an individual by measuring their physical and behavioral uniqueness or patterns, and comparing it to those on record. It can identify fingerprints, face, iris, palm prints, signature, DNA, or retinas of an individual for easy and convenient verification ( www.ex-sight.com ). This system was first used by the Chinese in 14th century where merchants used children’s palm and footprints to distinguish them from one another.…

    • 336 Words
    • 2 Pages
    Good Essays

Related Topics