4. Electronic Immobilizer
Vehicle Tracking System
5. Cheap Method.
Protects the parts under
Generally used in race
6. Least expensive
Restricts access to
locking it in place.
7. Prevents access or
motion of vehicle.
Used in conjunction
with other methods.
Good against amateurs.
8. Unique VIN for each vehicle.
Etched on all important
VIN etched parts help in
easy identification of stolen
9. Most common method.
Most visually effective device.
Makes a loud noise and
notifies everyone nearby.
Best used in combination with
a hood lock.
10. Shuts down engine’s electrical
system when activated.
Usually hidden from burglars view.
Sometimes deactivated by a series
of actions rather than a switch.
11. Most expensive and most
Activated when a theft is
Stolen vehicle position tracked
Inbuilt in Audi, GM, Volkswagen
Fingerprint which go into deciding your genetic
make-up has a unique design.
A Fingerprint scanner reads the pattern of ridges
and valleys on fingers.
A fingerprint scanner is to discriminate someone in
both crime investigation and security.
13. Optical Scanner
o Optical scanning is way to get a image of
a finger and to determine whether the
pattern of ridges and valleys.
o Optical scanning and capacitance
scanning is a charge coupled device
(CCD) ; it is simply an array of light-
14. Capacitance Scanner
o A simple capacitive sensor is made up of
one or more semiconductor chips
containing an array of tiny cells ; tiny cells
include two conductor plates.
o To scan the finger shorts each amplifier’s
input and output to balance the integrator
• Conductor plates, insulating layer and
finger surface acts as a capacitor.
• Capacitor in a cell under a ridge has
greater capacitance than under a valley.
• This difference is converted to voltages.
• The scanner processor reads this voltage
to determine whether it’s a ridge or a valley.
• By combining the data from each cell an
overall picture of the fingerprint is obtained.
o Minutiae - concentrate on points where ridge lines end
or where one ridge splits into two (bifurcations).
o The scanner system software uses highly complex
algorithms to recognize and to measure the relative
positions of minutiae.
Physical attributes are much harder to fake than identity cards.
You can't guess a fingerprint pattern like you can guess a password.
You can't misplace your fingerprints, like you can misplace an access
Small storage space required for the biometric template, reducing the
size of the database memory required.
Optical scanners can be fooled by pictures.
Capacitive scanner are vulnerable to finger shaped
Cut off the owner’s finger in a worst-case scenario.
If fingerprint is stolen, it is irreplaceable and cannot be
used again, unlike Passwords.
Made by Chinavasion.
A complete system that has
A fingerprint ignition lock,
Dual band GSM (900/1800)
messaging system, and
Standard car alarm system.
Sends a text message alert instantly
in case of forced entry.
20. Text commands can be send to disable
certain functions (like cut-off fuel supply) or
receive status message (in motion or
Fingerprint scanner can be installed in any
location, even hidden from common view.
Sensitivity can be adjusted in case of bad
21. Fingerprint authentication in conjunction with other factors
can help in reducing auto theft. Fingerprint authentication
comes under biometrics and is a way fingerprints are
compared and matched. Fingerprint authentication has
many uses as in security purposes.
The process is simple, as in put your finger down. Trusted,
as in had stood the test of time. Fingerprints have been
used for identification for over 100 years. They are the
standard without question. In addition to signatures,
fingerprints are the only other form of identification that
have legal standing in our country.