Breaking the Kubernetes Kill Chain: Host Path Mount
finger print sensing
1. Presented to : Shailesh Panwar Presented by :
Shivank Negi
III SEM (CSE)
HNBGU
Srinagar Garhwal
2.
3. What is finger print sensing
Introduction
User convenience
Application
History
Types
Conclusion
4.
5.
6. Finger print recognization system is Finger
print recognization system is under biometric
application used under biometric application
used to increase the user security. Generally
the biometric systems Generally the systems
operats in two modes
Verification
Identification
7.
8. 8
Heavy Web users have an average of 21 passwords; 81% of
users select a common password (the most common password
is the word «password») and 30% write their passwords down
or store them in a file. (2002 NTA Monitor Password Survey)
11. 11
1750 B.C.- people in Babylon used
fingerprints to sign their identity on
clay tablets
300 B.C.-Emperors of China used
personalized clay seals
14. A fingerprint pattern is comprised of a A
fingerprint pattern is comprised of a
sequence of Ridges and Valleys. In a
fingerprint image, the ridges appear as
dark lines dark lines while the valleys
are the light areas between the ridges.
15. The three basic types of these singular regions
The three basic types of these singular regions
are loop, delta, and whorl.
16.
17.
18. Ink and paper are
the tried-and-true
way to take
fingerprints, but
technology has
found ways to
eliminate
smudges and ink
stains.
19. 19
Sensing by projecting
an image of the
fingerprint onto a
camera by total internal
reflection.
20. 20
The most commonly found type of fingerprint
scanner used today is the capacitive scanner.
Instead of creating a traditional image of a
fingerprint, capacitive fingerprint scanners use
arrays tiny capacitor circuits to collect data about
a fingerprint.
21. The latest fingerprint scanning technology to
enter the smartphone space is an ultrasonic
sensor, which was first announced to be inside
the Le Max Pro smartphone.
To actually capture the details of a fingerprint,
the hardware consists of both an ultrasonic
transmitter and a receiver.
22. 22
Secure logins via keyboard modules
User identification
Biometric door locks
Credit card security
Weapon activation
Theft protection
23.
24. The controller based system the trasitions of
the user and providing the security for locker
system and even more for passport verification
using a finger print scanner is followed