Your SlideShare is downloading. ×
0
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Mini Project  Internet Security Mechanisms
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Mini Project Internet Security Mechanisms

2,314

Published on

The following resources come from the 2009/10 B.Sc in Media Technology and Digital Broadcast (course number 2ELE0076) from the University of Hertfordshire. All the mini projects are designed as level …

The following resources come from the 2009/10 B.Sc in Media Technology and Digital Broadcast (course number 2ELE0076) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes.

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,314
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
34
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Mini Project – Internet Security Mechanisms Application of a fingerprint reader in Windows using Java Author: University of Hertfordshire Date created : Date revised : 2009 Abstract The following resources come from the 2009/10 BSc in Internet Technology and E-Commerce (course number 2ELE0076) from the University of Hertfordshire. All the mini projects are designed as level two modules of the undergraduate programmes. The objectives of this module are to develop and program a Finger Print Reader as part of a security system, and understand related issues to achieve a simple yet secure identification process: • Understanding the Java API of a commercial Finger Print Reader • Modification of existing Java source code in the "BlueJ" Integrated Development Environment. • Communicating with Windows and a database to achieve runtime interactivity with the Reader. This project requires an understanding of a medium complexity Java API. The student will be expected to develop code that will automatically show the corresponding photograph of an individual. The project provides students with an awareness of developing commercial Java software within the Windows OS environment. © University of Hertfordshire 2009. This work is licensed under a Creative Commons Attribution 2.0 License .
  • 2. Project Overview <ul><li>Project Structure </li></ul><ul><li>Your objectives on Project Day 1 and Day 2 </li></ul><ul><li>Research resources </li></ul><ul><li>Project Work – Preparatory Day </li></ul><ul><li>Project Work - Day 1 </li></ul><ul><li>Project Work - Day 2 </li></ul><ul><li>After the project – the report </li></ul><ul><li>Questions please … </li></ul><ul><li>Credits </li></ul><ul><li>In addition to the resources found below there are supporting documents which should be used in combination with this resource. Please see: </li></ul><ul><li>Mini Projects - Introductory presentation. </li></ul><ul><li>Mini Projects - E-Log. </li></ul><ul><li>Mini Projects - Staff & Student Guide. </li></ul><ul><li>Mini Projects - Standard Grading Criteria. </li></ul><ul><li>Mini Projects - Reflection. </li></ul><ul><li>You will also need the ‘Mini Project- Internet Security Mechanisms’ text document. </li></ul>
  • 3. Project Structure <ul><li>Spread over 3 weeks </li></ul><ul><li>One session each Friday 11 - 6pm (break 1 - 2pm) </li></ul><ul><ul><li>1st Preparatory Project Introductory Lecture </li></ul></ul><ul><ul><ul><ul><ul><li>and time for lab practise </li></ul></ul></ul></ul></ul><ul><ul><li>2nd Project Day 1 </li></ul></ul><ul><ul><li>3rd Project Day 2 </li></ul></ul><ul><li>5 to 6 hours per class </li></ul>
  • 4. Your objectives on Project Day 1 and Day 2 <ul><li>Will be set at the beginning of the day </li></ul><ul><li>You will then spend time planning, modifying class diagrams, writing pseudocode and then implementing the actual code to achieve the objective of the day. </li></ul>
  • 5. Research resources <ul><li>There are many but for this project Google can be used to good effect. </li></ul>
  • 6. Project Work – Preparatory Day <ul><li>Introductory Lecture (2hrs) </li></ul><ul><ul><li>Overview of the GrFinger software package </li></ul></ul><ul><ul><li>Overview of existing Java code structure </li></ul></ul><ul><ul><li>Interfacing Java code with the Windows OS </li></ul></ul><ul><li>Lab Preparation Session (3hrs) </li></ul><ul><ul><li>Objective: To use the currently installed application to get used to the way in which the fingerprints are captured, extracted, enrolled, and then verified. </li></ul></ul><ul><ul><li>sketch the existing classes and methods in the “Util” class using the hard copy of the source code provided. </li></ul></ul><ul><li>Assessment </li></ul><ul><ul><li>Progress achieved in understanding the way in which the classes and methods function in driving the fingerprint reader. </li></ul></ul>
  • 7. Project Work - Day 1 <ul><li>Your objective for the day will be specified </li></ul><ul><li>Your work ... </li></ul><ul><ul><li>Development of your task list form </li></ul></ul><ul><ul><ul><li>Outcome of each task specified </li></ul></ul></ul><ul><ul><ul><li>Estimated & Actual Completion Times </li></ul></ul></ul><ul><ul><li>Assessor signs off your task sheet </li></ul></ul><ul><li>Upload your source code project files and onto StudyNet at the end of the day. </li></ul>
  • 8. Project Work - Day 2 <ul><li>Your new objective for the day will again be specified </li></ul><ul><li>Your work ... </li></ul><ul><ul><li>Development of your Logbook form </li></ul></ul><ul><ul><ul><li>Outcome of each task specified </li></ul></ul></ul><ul><ul><ul><li>Estimated & Actual Completion Times </li></ul></ul></ul><ul><ul><li>Assessor signs off your Logbook </li></ul></ul><ul><li>Upload your source code project files onto StudyNet at the end of the day. </li></ul>
  • 9. After the project – the report <ul><li>Write a report (see the assignment briefing sheet) to be uploaded onto StudyNet in .pdf format on or before Friday 20 February (1 week after the last day of this project) </li></ul><ul><li>Report must include a self-assessment sheet </li></ul>
  • 10. Questions please …
  • 11. This resource was created by the University of Hertfordshire and released as an open educational resource through the Open Engineering Resources project of the HE Academy Engineering Subject Centre. The Open Engineering Resources project was funded by HEFCE and part of the JISC/HE Academy UKOER programme. © University of Hertfordshire 2009                  This work is licensed under a Creative Commons Attribution 2.0 License . The name of the University of Hertfordshire, UH and the UH logo are the name and registered marks of the University of Hertfordshire. To the fullest extent permitted by law the University of Hertfordshire reserves all its rights in its name and marks which may not be used except with its written permission. Microsoft product screen shots reprinted with permission from Microsoft Corporation. Microsoft, Windows, .NET, and SharePoint are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The JISC logo is licensed under the terms of the Creative Commons Attribution-Non-Commercial-No Derivative Works 2.0 UK: England & Wales Licence.  All reproductions must comply with the terms of that licence. The HEA logo is owned by the Higher Education Academy Limited may be freely distributed and copied for educational purposes only, provided that appropriate acknowledgement is given to the Higher Education Academy as the copyright holder and original publisher.

×