Preview

Fingerprint Security

Powerful Essays
Open Document
Open Document
5677 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Fingerprint Security
CHAPTER I
1.1 Introduction:
These days, hot products like mobile phones, GPS and computers can be secured at the touch of a fingerprint. Designing in security at the start of a new product development process is more effective than adding it on later. Unlocking your mobile phone by scanning your fingerprint is not a thing of science fiction. It’s an everyday reality for millions of mobile phone users, the greatest proportion of who live in Asia. But designing-in security to mobile phones can be difficult. PIN codes and passwords take too long to enter and users often disable them. Since everyone has a unique fingerprint, biometric technology companies have shown that security at the touch of a fingerprint can be an alternative for portable electronic products. Fingerprint recognition can be implemented in essentially all mobile devices and has the right combination of security, cost and convenience for the end-user. It has the potential to be the single personal identifier that can work with every element of your IT security solution, from the mobile device to the PC, the network, servers, applications and whatever else might be required today, or tomorrow. Fingerprint recognition technology for mobile devices is poised to become the preferred user authentication solution mobile device security. Fingerprint tech is a standard security feature around the world. It works because no - two people not even identical twins have the same fingerprints. Believe it or not, fingerprinting is actually pretty old. It began in eighth-century in Japan. But this ancient approach to security is about to get a big upgrade. Since many smartphones have touch-sensitive screens, by definition, they work with your fingertips. All we need to do is convert that screen into a scanner that takes the place of a password. That way, it only works for you. If you lose your phone or someone steals it, the device goes dead.
1.2 BACKGROUND OF THE STUDY:
The analysis of fingerprints for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The Mayfield case is a textbook example of “false positive” fingerprint identification, in which an innocent person is singled out erroneously. But the case is hardly unique. Psychologist Erin Morris, who works with the Los Angeles County Public Defender's Office, has compiled a list of 25 false positives, going back several decades, that are now being used to challenge fingerprint evidence in US courts. Those challenges, in turn, are being fed by a growing unease among fingerprint examiners and researchers alike. They are beginning to recognize that the century-old fingerprint-identification process rests on assumptions that have never been tested empirically, and that the process does little to safeguard against unconscious biases of the…

    • 114 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Mobile Data Technology is connected to live scan these device works effectively together by how they link offenders together by fingerprints. The two device communicate by the information that they both hold these system helps the criminal justice field in many different but when officer are out in the field these systems help with solving a problem in a speedy amount of time. (Security Info Watch, 2010).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    DNA Fingerprinting

    • 1281 Words
    • 5 Pages

    After DNA samples are loaded into the sample wells, they are forced to move through the gel matrix. What size fragments (large vs. small) would you expect to move toward the opposite end of the gel most quickly Explain. 9.…

    • 1281 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Fingerprint debate

    • 943 Words
    • 4 Pages

    The value of fingerprinting and background checks is to make sure that the students are being protected. It is extremely important that for the safety of the students as well as the other teachers the school must do thorough background and fingerprinting checks. In doing background and fingerprinting checks you can tell the employer with pieces of information about the teachers background’s that can share credit reports, social Security number, criminal records, driving records, and education licenses. Every state has different rules involving the different charges that are placed on the teacher and how to handle them. The question that is asked frequently is, “What is the value of fingerprinting and background checks versus invasion of someone’s privacy?”…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Fingerprinting Process

    • 758 Words
    • 4 Pages

    Fingerprinting is an important process that many employers require in order for a person to obtain a job. Fingerprinting clearance is done to check a person’s background to make sure that he or she has never been convicted of a crime that would prevent him or her from obtaining the job in question. Jobs like teachers and day-care workers need to be fingerprinted to ensure that children who come into contact with these professionals are being taught and taken care of by someone who has not broken the law or been convicted of a crime.…

    • 758 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Home and business users alike are using biometric security. Through a biometric identifier, such as a fingerprint, biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The debate whether DNA Fingerprinting should be a requirement for all citizens, I believe that it shouldn’t be forced on us. Yes, it is definitely being used to solve criminal cases much easier, helping identify and prosecute the criminals. But then you have been many cases where an innocent person may have been convicted wrongly and its states that it can “mislead judges to make wrongful convictions” (Health Research Funding, 2014). According to Health Research Funding this DNA fingerprinting can also lead to discrimination and of course living in the world we live in that is a sensitive matter. For example if you were young and getting into trouble with the law, you will get your fingerprints taken. Now you’re an adult maybe trying to apply for a job and that record is now showing up and because of something that was done because you were young and bored. You just lost your chance to have a great job because of what you did when you were sixteen. Getting health coverage can be denied as well for having a criminal record. I do think those who are getting arrested for criminal charges, DUI should get there fingerprints taken have them in a database. Where for the rest of us I don’t think it is necessary and would feel violated. So no I don’t think the United States government should require all citizens to provide DNA fingerprinting.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Fingerprint removal

    • 309 Words
    • 2 Pages

    Fingerprints have been used for centuries to help put criminals behind bars and the innocent out of jail, but some fugitives believe they can alter themselves to have no fingerprints and therefore have no way of being traced. However, fingerprints are not easy to get rid of, but that does not stop those crazy enough to try.…

    • 309 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Palm Vein Technologies

    • 2873 Words
    • 12 Pages

    Palm vein technologies are one of the up coming technologies which is highly secure. It is the world’s first contactless personal identification system that uses the vein patterns in human palms to confirm a person’s identity. It is highly secure because it uses information contained within the body and is also highly accurate because the pattern of veins in the palm is complex and unique to each individual. Moreover, its contact less feature gives it a hygienic advantage over other biometric authentication technologies.…

    • 2873 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Digital Jewelry

    • 473 Words
    • 2 Pages

    Digital jewellry is the fashion jewelry with embedded intelligence. “Digital jewellery”can help you solve problems like forgotten passwords and security badges. “Digital jewelry” is a nascent catchphrase for wearable ID devices that contain personal information like passwords, identification, and account information. They have the potential to be all-in-one replacements for your driver's license, key chain, business cards, credit cards, health insurance card, corporate security badge, and loose cash. They can also solve a common dilemma of today's wired world – the forgotten password.…

    • 473 Words
    • 2 Pages
    Good Essays

Related Topics