Preview

Srs - Fingerprint Verification System

Powerful Essays
Open Document
Open Document
3876 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Srs - Fingerprint Verification System
IT Engineering Project

Fingerprint Verification for Smartcards

System Requirement Specifications

Version 1.3

July 22nd 1999

Project Supervisor: Jan Machotka (PES)

Sponsor: Motorola

University Of South Australia

School of Physics and Electronic Systems Engineering Preface

The System Requirements Specification is one of the critical documents since it identifies the aims and goals of the project. This is important to the success of the project since it clearly outlines what the development team must achieve in order to classify the project to be complete. A strict definition of this type also enables the project team to outline the necessary means to achieve these goals. If this step is not carried out correctly the project can encounter delays caused by changes to the requirements brought about by developers and customers, thus altering the project schedule. Table of Contents

1 INTRODUCTION 4
1.1 SYSTEM PURPOSE 4
1.2 SYSTEM SCOPE 4
1.3 DEFINITIONS, ACRONYMS, AND ABBREVIATIONS 5
1.4 PROJECT GROUP 6
1.5 REFERENCES 7
1.6 SYSTEM OVERVIEW 8
2 GENERAL SYSTEM DESCRIPTION 9
2.1 SYSTEM CONTEXT 9
2.2 SYSTEM MODES AND STATES 10
2.3 MAJOR SYSTEM CONDITIONS 10
2.4 MAJOR SYSTEM CONSTRAINTS 11
2.5 ASSUMPTIONS AND DEPENDENCIES 11
2.5.1 Assumptions relating to users: 11
2.5.2 Assumptions relating to the system: 11
2.5.3 Dependencies in the system: 11
2.6 OPERATIONAL SCENARIOS 12
3 SYSTEM COMPATIBILITIES, CONDITIONS AND CONSTRAINTS 12
3.1 PHYSICAL 12
3.1.1 Adaptability 12
3.1.2 Environmental Conditions 13
3.2 SYSTEM PERFORMANCE CHARACTERISTICS 13
3.3 SYSTEM SECURITY 13
3.4 INFORMATION MANAGEMENT 14
3.5 SYSTEM OPERATIONS 14
3.5.1 System Human Factors 14
3.5.2 System Maintenance 15
3.5.3 System Reliability 15
3.6 POLICY AND REGULATION 16
HISTORY OF SRS 17

Table of Figures

FIGURE 1 - SYSTEM OVERVIEW 7
FIGURE 2 SYSTEM CONNECTIVITY 8 1 Introduction

This is a System Requirements Specification for the Final



References: Baskerville, R (1998), Security and Privacy of Information and Information Systems, [Online accessed 8th April 1999]. URL: http://cis.gsu.edu/~rbaskerv/cis8680/index.html Gerck, E (1997), Overview of certification Systems, [Online accessed 31st March 1999]. Pfleeger, Charles P (1997), Security in computing, Prentice Hall, Upper Saddle River, NJ. Priisalu, J (1995), A Frequently asked Questions List (FAQ) for alt.technology.smartcards, [Online accessed 20th March 1999]. URL: http://www.ioc.ee/atsc/faq.html Reinert, Lawrence A, Luther, Stephen C (1997), User Authentication Techniques Using Public Key Certificates. Part 1: Certificate Options, National Security Agency, Department of Defense, USA. Reinert, Lawrence A, Luther, Stephen C (1997), User Authentication Techniques Using Public Key Certificates. Part 2: Authentication Information Including Biometrics, National Security Agency, Department of Defense, USA. Reinert, Lawrence A, Luther, Stephen C (1998), Authentication Protocols for Smart Cards, National Security Agency, Department of Defense, USA.

You May Also Find These Documents Helpful

  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

     User names and passwords  Patents and copyrights  Source code  Diplomatic information  Financial data NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    With the use of computers and networks, there is also a large focus on security. Whenever there is sensitive data being stored and transferred through computer networks, there is the risk of unauthorized individuals gaining access to this information. To lower these chances, we have several different pieces of software and also require multiple passwords that are unique to each authorized individual and a requirement to change the passwords…

    • 791 Words
    • 4 Pages
    Good Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    References: Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., ... & Vigneron, L. (2005, January). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification (pp. 281-285). Springer Berlin Heidelberg.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Bist

    • 10365 Words
    • 42 Pages

    RECURSIVE PSEUDO EXHAUSTIVE TWO-PATTERN GENERATION A PROJECT REPORT LIST OF CONTENTS | | | | | | | | | | CHAPTER TITLE PAGE NO NO ABSTRACT i LIST OF FIGURES ii LIST OF TABLES iv LIST OF ABBREVIATION v 1 INTRODUCTION 01 1.1 AIM 01 1.2 LITERATURE REVIEW 01 2 System analysis 04 2.1 EXISTING 04…

    • 10365 Words
    • 42 Pages
    Powerful Essays