SlideShare a Scribd company logo
1 of 6
Download to read offline
How Fingerprint Scanners Work




         writer: Junya Sato
    Partner:Yosuke Takabatake
About fingerprint authentication
We must do in order to use any password
authentication which usually machine.
However, if you've known someone, it takes
time to change the password each time.
Therefore, using fingerprint authentication
system of the user's hand appeared recently.
This system is Will bring a great change in our
lives in the future.
The problem with fingerprint authentication

There is also still a problem fingerprint There is
also still a problem fingerprint authentication.
Let's work with the user's fingerprint has taken
has been. Then, they can fathom the
authentication system without difficulty even in
other people. So there is no sense of security.
So, it is not necessarily safe.
Current fingerprint authentication
In terms of life, the fingerprint authentication
device is currently used in various places. It is
also used to unlock mobile phones. Type to
scan the fingerprint authentication more than
once in order to prevent by others appeared. It
is something that someone else stole the
fingerprint as well as much, if be read more
than once, the fingerprint will be difficult to
read. There, the intention of the inventor if
Pumped out.
In Business
In many cases, such as fingerprint
authentication system is usually installed in the
room as a work of fingerprint authentication in
the plane of the business, is conducted by the
Institute or secret projects. Since this is
dangerous or confidential information that
should not be known only to some of the
humans are abound. So, it is should I cut off
from the outside world more completely.
Combination with other systems
Only the fingerprint authentication system, we
will not be able to deal with when they are
exceeded fingerprint authentication. Therefore,
by using multiple authentication systems
simultaneously, and each other to cover each
other. It also leads to the strengthening of
security through the use of multiple systems.

More Related Content

Viewers also liked

4359 amparo ortega guerrero
4359  amparo ortega guerrero4359  amparo ortega guerrero
4359 amparo ortega guerrero2015andes
 
Lit review-Thomas Acton
Lit review-Thomas ActonLit review-Thomas Acton
Lit review-Thomas ActonThomas Actn
 
Rationalizing socializing allocation_changes
Rationalizing socializing allocation_changesRationalizing socializing allocation_changes
Rationalizing socializing allocation_changesThavron Solutions
 
More than 40 work-life balance tips from dad entrepreneurs
More than 40 work-life balance tips from dad entrepreneursMore than 40 work-life balance tips from dad entrepreneurs
More than 40 work-life balance tips from dad entrepreneursAndreea Ayers
 
Crew pack pdf
Crew pack pdfCrew pack pdf
Crew pack pdfSam Moles
 
российская федерация
российская федерацияроссийская федерация
российская федерацияvy177wjU
 

Viewers also liked (7)

4359 amparo ortega guerrero
4359  amparo ortega guerrero4359  amparo ortega guerrero
4359 amparo ortega guerrero
 
Lit review-Thomas Acton
Lit review-Thomas ActonLit review-Thomas Acton
Lit review-Thomas Acton
 
Rationalizing socializing allocation_changes
Rationalizing socializing allocation_changesRationalizing socializing allocation_changes
Rationalizing socializing allocation_changes
 
More than 40 work-life balance tips from dad entrepreneurs
More than 40 work-life balance tips from dad entrepreneursMore than 40 work-life balance tips from dad entrepreneurs
More than 40 work-life balance tips from dad entrepreneurs
 
Crew pack pdf
Crew pack pdfCrew pack pdf
Crew pack pdf
 
российская федерация
российская федерацияроссийская федерация
российская федерация
 
Licencias creative recommons
Licencias creative recommonsLicencias creative recommons
Licencias creative recommons
 

Similar to Presentation michael(1)

week12_fingerprint
week12_fingerprintweek12_fingerprint
week12_fingerprints1190099
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comwww.mairsturnstile.com
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12you-ly05
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Crypto UX and Mass Adoption
Crypto UX and Mass AdoptionCrypto UX and Mass Adoption
Crypto UX and Mass AdoptionPranay Prateek
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...EECJOURNAL
 
assignment
assignmentassignment
assignments1190098
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxlynettearnold46882
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptxTrushaKyada
 

Similar to Presentation michael(1) (20)

sw11-hw
sw11-hwsw11-hw
sw11-hw
 
week12_fingerprint
week12_fingerprintweek12_fingerprint
week12_fingerprint
 
A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
 
Sw assignment week12
Sw assignment week12Sw assignment week12
Sw assignment week12
 
Password Pill
Password Pill Password Pill
Password Pill
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3d authentication
3d authentication3d authentication
3d authentication
 
Crypto UX and Mass Adoption
Crypto UX and Mass AdoptionCrypto UX and Mass Adoption
Crypto UX and Mass Adoption
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...
The use of Eye Gaze Gesture Interaction Artificial Intelligence Techniques fo...
 
C0210014017
C0210014017C0210014017
C0210014017
 
Privateproxies
PrivateproxiesPrivateproxies
Privateproxies
 
assignment
assignmentassignment
assignment
 
assignment
assignmentassignment
assignment
 
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docxDIGITAL FORENSIC 25In this chapter, youll learn more about.docx
DIGITAL FORENSIC 25In this chapter, youll learn more about.docx
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
3d passwords
3d passwords 3d passwords
3d passwords
 

More from aizunoinu

Adb business-e-mail
Adb business-e-mailAdb business-e-mail
Adb business-e-mailaizunoinu
 
Adb business-e-mail
Adb business-e-mailAdb business-e-mail
Adb business-e-mailaizunoinu
 
Adb business-e-mail
Adb business-e-mailAdb business-e-mail
Adb business-e-mailaizunoinu
 
マイケルプレゼン
マイケルプレゼンマイケルプレゼン
マイケルプレゼンaizunoinu
 
Presentation michael
Presentation michaelPresentation michael
Presentation michaelaizunoinu
 
Presentation michael
Presentation michaelPresentation michael
Presentation michaelaizunoinu
 
Presentation b ....michael
Presentation b ....michaelPresentation b ....michael
Presentation b ....michaelaizunoinu
 

More from aizunoinu (12)

Adb business-e-mail
Adb business-e-mailAdb business-e-mail
Adb business-e-mail
 
Adb business-e-mail
Adb business-e-mailAdb business-e-mail
Adb business-e-mail
 
Adb business-e-mail
Adb business-e-mailAdb business-e-mail
Adb business-e-mail
 
Interview
InterviewInterview
Interview
 
Rirekisyo
RirekisyoRirekisyo
Rirekisyo
 
Rirekisyo
RirekisyoRirekisyo
Rirekisyo
 
Report1
Report1Report1
Report1
 
Rirekisyo
RirekisyoRirekisyo
Rirekisyo
 
マイケルプレゼン
マイケルプレゼンマイケルプレゼン
マイケルプレゼン
 
Presentation michael
Presentation michaelPresentation michael
Presentation michael
 
Presentation michael
Presentation michaelPresentation michael
Presentation michael
 
Presentation b ....michael
Presentation b ....michaelPresentation b ....michael
Presentation b ....michael
 

Presentation michael(1)

  • 1. How Fingerprint Scanners Work writer: Junya Sato Partner:Yosuke Takabatake
  • 2. About fingerprint authentication We must do in order to use any password authentication which usually machine. However, if you've known someone, it takes time to change the password each time. Therefore, using fingerprint authentication system of the user's hand appeared recently. This system is Will bring a great change in our lives in the future.
  • 3. The problem with fingerprint authentication There is also still a problem fingerprint There is also still a problem fingerprint authentication. Let's work with the user's fingerprint has taken has been. Then, they can fathom the authentication system without difficulty even in other people. So there is no sense of security. So, it is not necessarily safe.
  • 4. Current fingerprint authentication In terms of life, the fingerprint authentication device is currently used in various places. It is also used to unlock mobile phones. Type to scan the fingerprint authentication more than once in order to prevent by others appeared. It is something that someone else stole the fingerprint as well as much, if be read more than once, the fingerprint will be difficult to read. There, the intention of the inventor if Pumped out.
  • 5. In Business In many cases, such as fingerprint authentication system is usually installed in the room as a work of fingerprint authentication in the plane of the business, is conducted by the Institute or secret projects. Since this is dangerous or confidential information that should not be known only to some of the humans are abound. So, it is should I cut off from the outside world more completely.
  • 6. Combination with other systems Only the fingerprint authentication system, we will not be able to deal with when they are exceeded fingerprint authentication. Therefore, by using multiple authentication systems simultaneously, and each other to cover each other. It also leads to the strengthening of security through the use of multiple systems.