SlideShare a Scribd company logo
1 of 2
Download to read offline
Biometric time clocks
The Pedanandipadu College Of Arts & Science. Biometrics ABSTRACT: In networking environment,
security is a crucial factor. It is not easy to maintain security to confidential matters using Password
security mechanism all the time. So, we need a good security mechanism for all categories of data like
confidential, secret, non-secret and public. The security mechanism that ful fill the security of all the
categories of data is Biometrics. This term Biometrics is a combination of two words, 'Bio' means 'life',
which is related to biological study and -˜Metric' means measurement. Thus Biometrics means "security
through human measurements". Security of pages in the Network is an important factor in Internet. As
the usage of Internet has tremendously increased, security has become a serious issue. So, we need a
security mechanism that provides a great security from all types of Hackers and Intruders. Biometrics
has solved all these problems and became a super security mechanism. As for every good, there is an
evil, there are some disadvantages for Biometrics too. But they are very minimal when compared to
other security mechanisms. They are some techniques used in Biometrics for security.
This paper presents the various techniques used in Biometrics. They are two types of techniques used in
Biometrics. They are Token-based security mechanism and secret based security mechanism. Biometrics
also provides Permissions depending on the type of users. The users may be of various types like System
Administrator, Database owners, Database object owners and Database users. This paper also presents
the various verification methods involved in Biometrics. The various verification methods are
psychological verification methods and behavioural verification methods. psychological verification
methods involve the verifications of finger prints, hand prints, face measurements, Retinal scans and
DNA analysis. Behavioural verification methods involve signatures, typing and voice. Finally this paper
ends with the Advantages and Limitations of biometric time clocks with a conclusion.
INTRODUCTION:
Biometrics is an advanced technology for superb security and authentication .The very term "biometric-
• represents biological measurement , in which "bio" means something that is related to the biological
study and "metric " means something, which is related to measurement. In network environment ,
security is a crucial factor. Providing security to the pages in the network is too difficult. Password is not
a good measurement for security. Good security mechanism is necessary on the Internet. Security in
different levels applies to various documents. Security depends on how security assign to documents.
Security depends on following categories.
1.Confidential 2.Secret 3.Non-secret 4.Public
Biometric is a technology where the password entry is you, which identifies Your psychological and
behavioral characteristics.
Confidential pages over the network require full security. Tampering of data in the page by third party
should not be allowed. In this case , biometrics are more useful and there will be no way to disturb the
page contents. First of all store all the data on biometrics in database after that tally the data of the user
with this data. If tally satisfies with backend then provide access to the user. Collecting information is
too difficult and storing in the database also needs more space.
There are two security methodologies in Biometrics, they are
1.Token-based security:It relies on the users special item token like card-id.
2.Secret based security:it relies on an individual secret id number like password.ANALYSIS:
METHODS OF VERIFICATION:
1).PSYCHOLOGICAL VERIFICATION METHOD:
Psychological Verification involves the verification of the organs of the human being, which will have
unique identification and does not match with others.
There are five types of verifications. These are:
I.Fingerprint.II.Handprint. III.Face measurement. IV. Retinal scans.V.DNA analysis.
I.Finger print:It is one of the security verification methods in which the authorized person is identified
through the unique finger prints. This method is popular since every person will have unique finger
prints. It involves the user placing his finger over a glass-plate, which resides over a high-resolution
camera, which uses optical or electromagnetic means to take its snapshot. For this verification method,
first of all some collection of authorized finger prints should be stored in the database, so that when a
person's finger prints are scanned by the finger print device, person's finger prints are compared with
the information of finger prints stored in the database. If match is found, the person is treated as an
authorized person and the person is granted the access permissions. Otherwise the person is considered
as an unauthorized person and access is denied. The device that is used in finger print verification
method is as follows: In US super market, customers give their credit card information and other
personal details to store and tie it with their fingerprint data. The next time, he can pay for purchases
without a fingerprint.

More Related Content

What's hot

IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET Journal
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docxAmir Khan
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationMayank Sachan
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252IJMER
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Florencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldFlorencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldWTHS
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksAIRCC Publishing Corporation
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structureijcsit
 
Mit project
Mit projectMit project
Mit projectAwhydot
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterBrian Gleeson
 

What's hot (20)

IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
Biometrics
BiometricsBiometrics
Biometrics
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Keystroke Dynamics Support For Authentication
Keystroke Dynamics Support For AuthenticationKeystroke Dynamics Support For Authentication
Keystroke Dynamics Support For Authentication
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Ea3212451252
Ea3212451252Ea3212451252
Ea3212451252
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Florencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile worldFlorencio Cano - Patient data security in a wireless and mobile world
Florencio Cano - Patient data security in a wireless and mobile world
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
Mobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing AttacksMobile Device Users’ Susceptibility To Phishing Attacks
Mobile Device Users’ Susceptibility To Phishing Attacks
 
Basics of IoT Testing
Basics of IoT TestingBasics of IoT Testing
Basics of IoT Testing
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Advanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke StructureAdvanced authentication scheme using a Predefined Keystroke Structure
Advanced authentication scheme using a Predefined Keystroke Structure
 
Mit project
Mit projectMit project
Mit project
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile Perimeter
 

Similar to Biometrics

Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryptionDeepák Soni
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesAdesh Singh
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric TechnologyAdoitya Kaila
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASHAkash Deep Maurya
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docxWaseelsultan
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technologypalsantosh
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital TrustBahaa Al Zubaidi
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 

Similar to Biometrics (20)

Biometric encryption
Biometric encryptionBiometric encryption
Biometric encryption
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics security
Biometrics securityBiometrics security
Biometrics security
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
Bio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devicesBio-metric Safety engineering in mobile devices
Bio-metric Safety engineering in mobile devices
 
Biometric Technology
Biometric TechnologyBiometric Technology
Biometric Technology
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Based Authentication AKASH
Biometrics Based Authentication AKASHBiometrics Based Authentication AKASH
Biometrics Based Authentication AKASH
 
Seetu
SeetuSeetu
Seetu
 
Cybersecurity governance-1.docx
Cybersecurity governance-1.docxCybersecurity governance-1.docx
Cybersecurity governance-1.docx
 
Biometric authentication
Biometric authenticationBiometric authentication
Biometric authentication
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biomatric technology
Biomatric technologyBiomatric technology
Biomatric technology
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Ai
AiAi
Ai
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Evolution of Digital Trust
Evolution of Digital TrustEvolution of Digital Trust
Evolution of Digital Trust
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 

Biometrics

  • 1. Biometric time clocks The Pedanandipadu College Of Arts & Science. Biometrics ABSTRACT: In networking environment, security is a crucial factor. It is not easy to maintain security to confidential matters using Password security mechanism all the time. So, we need a good security mechanism for all categories of data like confidential, secret, non-secret and public. The security mechanism that ful fill the security of all the categories of data is Biometrics. This term Biometrics is a combination of two words, 'Bio' means 'life', which is related to biological study and -˜Metric' means measurement. Thus Biometrics means "security through human measurements". Security of pages in the Network is an important factor in Internet. As the usage of Internet has tremendously increased, security has become a serious issue. So, we need a security mechanism that provides a great security from all types of Hackers and Intruders. Biometrics has solved all these problems and became a super security mechanism. As for every good, there is an evil, there are some disadvantages for Biometrics too. But they are very minimal when compared to other security mechanisms. They are some techniques used in Biometrics for security. This paper presents the various techniques used in Biometrics. They are two types of techniques used in Biometrics. They are Token-based security mechanism and secret based security mechanism. Biometrics also provides Permissions depending on the type of users. The users may be of various types like System Administrator, Database owners, Database object owners and Database users. This paper also presents the various verification methods involved in Biometrics. The various verification methods are psychological verification methods and behavioural verification methods. psychological verification methods involve the verifications of finger prints, hand prints, face measurements, Retinal scans and DNA analysis. Behavioural verification methods involve signatures, typing and voice. Finally this paper ends with the Advantages and Limitations of biometric time clocks with a conclusion. INTRODUCTION: Biometrics is an advanced technology for superb security and authentication .The very term "biometric- • represents biological measurement , in which "bio" means something that is related to the biological study and "metric " means something, which is related to measurement. In network environment , security is a crucial factor. Providing security to the pages in the network is too difficult. Password is not a good measurement for security. Good security mechanism is necessary on the Internet. Security in different levels applies to various documents. Security depends on how security assign to documents. Security depends on following categories. 1.Confidential 2.Secret 3.Non-secret 4.Public Biometric is a technology where the password entry is you, which identifies Your psychological and behavioral characteristics.
  • 2. Confidential pages over the network require full security. Tampering of data in the page by third party should not be allowed. In this case , biometrics are more useful and there will be no way to disturb the page contents. First of all store all the data on biometrics in database after that tally the data of the user with this data. If tally satisfies with backend then provide access to the user. Collecting information is too difficult and storing in the database also needs more space. There are two security methodologies in Biometrics, they are 1.Token-based security:It relies on the users special item token like card-id. 2.Secret based security:it relies on an individual secret id number like password.ANALYSIS: METHODS OF VERIFICATION: 1).PSYCHOLOGICAL VERIFICATION METHOD: Psychological Verification involves the verification of the organs of the human being, which will have unique identification and does not match with others. There are five types of verifications. These are: I.Fingerprint.II.Handprint. III.Face measurement. IV. Retinal scans.V.DNA analysis. I.Finger print:It is one of the security verification methods in which the authorized person is identified through the unique finger prints. This method is popular since every person will have unique finger prints. It involves the user placing his finger over a glass-plate, which resides over a high-resolution camera, which uses optical or electromagnetic means to take its snapshot. For this verification method, first of all some collection of authorized finger prints should be stored in the database, so that when a person's finger prints are scanned by the finger print device, person's finger prints are compared with the information of finger prints stored in the database. If match is found, the person is treated as an authorized person and the person is granted the access permissions. Otherwise the person is considered as an unauthorized person and access is denied. The device that is used in finger print verification method is as follows: In US super market, customers give their credit card information and other personal details to store and tie it with their fingerprint data. The next time, he can pay for purchases without a fingerprint.