SlideShare a Scribd company logo
Fingerprints recognition on
Smartphone
GCIT 1015 IT INNOVATIONS SHAPING OUR WORLD
16215532 LAM HO WAH GORDON
16220757 CHENG NGA MAN
16222504 YEUNG, ELAINE YU PING
16222598 TANG CHUN YI KELLY
26 October ,2016
Contents
Introduction of
fingerprints
recognition
Applications
Advantages &
disadvantages
Survey Results
Future development
and conclusion
Background
▶ Fingerprint identification is one of the most well-known and publicized
biometrics.
▶ As fingerprints offer a reliable means of personal identification , they have
been used for identification for over a century.
▶ And this technology is used in the mobile phone since 2007,by Toshiba.
Principle
▶ Capacitive fingerprint scanners are the type mostly used in smartphones. They
work properly if the distance is short enough so that electricity can be transferred
from the capacitors and the skin
▶ Fingerprint is unique and full of ridges and valleys. Ridges are closer to the
capacitor, and more electricity will flow away. Your fingerprint can be read by the
sensor due to this characteristic.
Type
▶ There are mainly two types of fingerprint recognition on smartphone. They are
swipe-style and one-touch/press style respectively.
▶ Swipe-style
During movement of the finger the electrical field will change dependent on the
distance between the sensor surface and the ridges and valleys of the fingerprint.
Video clip - Swipe style fingerprint recognition
Type
▶ One-touch/press style
With just a touch or a press of your device's Home button, the sensor quickly
reads your fingerprint and automatically unlocks your phone.
Video clip - One-touch/ press style
Components
▶ As shown in the diagram, each sensor consists of
arrays of cells. These cells have two conductor
plates, which are covered with an insulating layer.
Thus, they form a simple capacitor which is used to
store the charge.These sensors will then be
connected to an integrator. The output of the
integrator will be given to the input of an inverting
operational amplifier. This op-amp will consist of
hundreds of transistors, resistors and capacitors. This
op-amp is alters the input voltage with respect to the
reference voltage provided to the other input. The
non-inverting input is connected to the ground. The
inverting input is given to the reference voltage and
then to the feedback circuit. This feedback circuit is
given to the amplifier output and also includes the
two conductor plates.
Applications and examples
▶ 1.Unlock the mobile
Since everyone has unique fingerprint, it can be served as a personal identification
in the fingerprint recognition. People can unlock the phone by putting the finger on
Home button or swipe the finger from top to bottom of the sensor.It enhances the
security of the mobile phones.
▶ 2. Purchase in App stores
People now make payment while purchase applications in the App Store on their
iPhones and iPads and they are able to authorize Play Store purchases with the
fingerprint. This help them save time when online shopping.
▶ 3.Banking
Most banking apps have started integrating the fingerprint sensor, so we can
make transactions with a tap to the sensor.
Applications and examples
▶ 4. Use Home Button Without Pressing the Button
We can use the fingerprint sensor as an alternative for capacitive touch button,
you can install and use the app easyHome for Samsung from the Play Store.
▶ 5.Auto Login to Websites
The fingerprint sensor can act as a second layer of security while filling out the
credentials. Every time people log on requires the saved credentials, they will be
auto-logged into the website after the verification.
Advantages
1) Convenient
▶ It is convenient to use fingerprint recognition as it can be an alternative to your
password for online payment, simplifying the process of purchasing online, or for
locking and unlocking the devices, and we can remember fewer passwords. For
example, apple pay, you can use your fingerprint to make the payment and you
can buy apps, videos and musics on ITunes.
2) Secure
▶ It is secure to use fingerprint for recognition on smartphones because human
fingerprint contain unique whorls and ridges that would be difficult to be duplicate
and counterfeited.
Disadvantages
1) Sensitivity
▶ The device should be clean enough to facilitate effective scanning. The scanner
can be easily contaminated by dust or oil on our hands and lose its accuracy.
Also, the moisture on the home button or our fingertips can keep our fingerprints
from being registered.
2) May cause security problem toward the endpoint data protection
▶ devices using fingerprint for recognition may do not utilize a password to lock
their hardware. This can present a considerable threat to to endpoint data
protection. For example if an individual’s unlocked device is lost or stolen, hackers
have easy access to any sensitive content contain there.
Online Survey
▶ Target Audience: general public
▶ Information: Fingerprints recognition on Smartphone
▶ Website: https://goo.gl/forms/jfGgHOU8LbinVfgI3
Survey Results
▶ Most people think that it is
convenient and intelligent.
▶ A minority of people think
that it maybe not sensitive
enough or troublesome.
Survey Results
▶ A majority of people have
experiences on using this
technology, it shows that
this technology has high
popularity.
Survey Results
▶ Many people agree that this
technology is convenient and
secure enough after using it.
▶ But a minority of people think
that it may esay to have
technical problems.
Survey Results
▶ A majority of people think the
sensibility of the technology
still have the room of
improvement.
Further development & Conclusion
▶ According to a market research from IHS, approximately 50% of smartphones sold
by 2019 are expected to integrate an embedded fingerprint sensor. As we can see,
inevitably, smartphone with fingerprint recognition will become dominant in the
future.
▶ Although there are some concerns about the insecurity and inconvenience of the
fingerprint recognition technology , we all believe that it can be improved regarding
the breakthrough in science and technology. Fingerprint recognition, expectedly, will
be used for other purposes and beneficial to our daily life.
The End

More Related Content

What's hot

Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phone
ktcube
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
Security Session
 
Simple Touch Alarm
Simple Touch AlarmSimple Touch Alarm
Simple Touch Alarm
Shahrukh Javed
 
Cicret bracelet by M.Yaqoob
Cicret bracelet by M.YaqoobCicret bracelet by M.Yaqoob
Cicret bracelet by M.Yaqoob
YaqoobMalik
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
greatdaniel
 
AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)
AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)
AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)
sugiuralab
 
information about cicret bracelet and its specifications and working and oper...
information about cicret bracelet and its specifications and working and oper...information about cicret bracelet and its specifications and working and oper...
information about cicret bracelet and its specifications and working and oper...
mirabubakar1
 
Cicret bracelet
Cicret braceletCicret bracelet
Cicret bracelet
Athul Anand
 
Cicret Bracelet
Cicret BraceletCicret Bracelet
Cicret Bracelet
Rizwan Khattak
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
rahulmonikasharma
 
IRJET - Aid for Blind People using IoT
IRJET - Aid for Blind People using IoTIRJET - Aid for Blind People using IoT
IRJET - Aid for Blind People using IoT
IRJET Journal
 
IRJET- A Review on Iot Based Sign Language Conversion
IRJET-  	  A Review on Iot Based Sign Language ConversionIRJET-  	  A Review on Iot Based Sign Language Conversion
IRJET- A Review on Iot Based Sign Language Conversion
IRJET Journal
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
IRJET Journal
 
Embedded wrist watch
Embedded wrist watchEmbedded wrist watch
Embedded wrist watch
eSAT Publishing House
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 

What's hot (19)

Fingerprint recognitions on smart phone
Fingerprint recognitions on smart phoneFingerprint recognitions on smart phone
Fingerprint recognitions on smart phone
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Simple Touch Alarm
Simple Touch AlarmSimple Touch Alarm
Simple Touch Alarm
 
Cicret bracelet by M.Yaqoob
Cicret bracelet by M.YaqoobCicret bracelet by M.Yaqoob
Cicret bracelet by M.Yaqoob
 
Virtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe SolutionVirtual Merchant Mobile Swipe Solution
Virtual Merchant Mobile Swipe Solution
 
AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)
AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)
AroundSense: An Input Method for Gestures around a Smartphone (IDW '19)
 
information about cicret bracelet and its specifications and working and oper...
information about cicret bracelet and its specifications and working and oper...information about cicret bracelet and its specifications and working and oper...
information about cicret bracelet and its specifications and working and oper...
 
Cicret bracelet
Cicret braceletCicret bracelet
Cicret bracelet
 
Vehicle security system final report
Vehicle security system final reportVehicle security system final report
Vehicle security system final report
 
Cicret Bracelet
Cicret BraceletCicret Bracelet
Cicret Bracelet
 
IoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking SystemIoT and Fingerprint Based Door Looking System
IoT and Fingerprint Based Door Looking System
 
IRJET - Aid for Blind People using IoT
IRJET - Aid for Blind People using IoTIRJET - Aid for Blind People using IoT
IRJET - Aid for Blind People using IoT
 
Smart watch
Smart watchSmart watch
Smart watch
 
IRJET- A Review on Iot Based Sign Language Conversion
IRJET-  	  A Review on Iot Based Sign Language ConversionIRJET-  	  A Review on Iot Based Sign Language Conversion
IRJET- A Review on Iot Based Sign Language Conversion
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
SHERLOCK: Energy Efficient and Continuous Environment Sensing Android Applica...
 
Embedded wrist watch
Embedded wrist watchEmbedded wrist watch
Embedded wrist watch
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 

Viewers also liked

Actividad 3 tita
Actividad 3 titaActividad 3 tita
Actividad 3 tita
francia50
 
Waste management project
Waste management  projectWaste management  project
Waste management project
herbert chitongo
 
Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)
Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)
Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)
francia50
 
Preguntaesencial1.docx
Preguntaesencial1.docxPreguntaesencial1.docx
Preguntaesencial1.docx
francia50
 
bogger
boggerbogger
bogger
3ne1
 
Canvas. francy
Canvas. francyCanvas. francy
Canvas. francy
francyamu
 
Presentación generador de fichas para ut 2011
Presentación generador de fichas para ut 2011Presentación generador de fichas para ut 2011
Presentación generador de fichas para ut 2011DPS
 
Como Recuperar a tu Mujer Reporte Volumen 12
Como Recuperar a tu Mujer Reporte Volumen 12Como Recuperar a tu Mujer Reporte Volumen 12
Como Recuperar a tu Mujer Reporte Volumen 12
Marco Di Calderón
 
Fingerprints recognition on Smartphone
Fingerprints recognition on SmartphoneFingerprints recognition on Smartphone
Fingerprints recognition on Smartphone
stayforinfinite
 
PROBLEM SOLVING PRESENTATION
PROBLEM SOLVING  PRESENTATIONPROBLEM SOLVING  PRESENTATION
PROBLEM SOLVING PRESENTATIONherbert chitongo
 
Riesgo CARIES
Riesgo CARIESRiesgo CARIES
Riesgo CARIES
estefaniayasabes
 
Riesgo de caries
Riesgo de cariesRiesgo de caries
Riesgo de caries
estefaniayasabes
 
Materiales estéticos en odontopediatría
Materiales estéticos en odontopediatríaMateriales estéticos en odontopediatría
Materiales estéticos en odontopediatría
estefaniayasabes
 

Viewers also liked (14)

Actividad 3 tita
Actividad 3 titaActividad 3 tita
Actividad 3 tita
 
Waste management project
Waste management  projectWaste management  project
Waste management project
 
Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)
Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)
Fp me reporte aplicación aamtic_g construyendome sesión 2 (f)
 
Preguntaesencial1.docx
Preguntaesencial1.docxPreguntaesencial1.docx
Preguntaesencial1.docx
 
bogger
boggerbogger
bogger
 
Canvas. francy
Canvas. francyCanvas. francy
Canvas. francy
 
Pesquisa empresariado
Pesquisa empresariadoPesquisa empresariado
Pesquisa empresariado
 
Presentación generador de fichas para ut 2011
Presentación generador de fichas para ut 2011Presentación generador de fichas para ut 2011
Presentación generador de fichas para ut 2011
 
Como Recuperar a tu Mujer Reporte Volumen 12
Como Recuperar a tu Mujer Reporte Volumen 12Como Recuperar a tu Mujer Reporte Volumen 12
Como Recuperar a tu Mujer Reporte Volumen 12
 
Fingerprints recognition on Smartphone
Fingerprints recognition on SmartphoneFingerprints recognition on Smartphone
Fingerprints recognition on Smartphone
 
PROBLEM SOLVING PRESENTATION
PROBLEM SOLVING  PRESENTATIONPROBLEM SOLVING  PRESENTATION
PROBLEM SOLVING PRESENTATION
 
Riesgo CARIES
Riesgo CARIESRiesgo CARIES
Riesgo CARIES
 
Riesgo de caries
Riesgo de cariesRiesgo de caries
Riesgo de caries
 
Materiales estéticos en odontopediatría
Materiales estéticos en odontopediatríaMateriales estéticos en odontopediatría
Materiales estéticos en odontopediatría
 

Similar to Fingerprints recognition on Smartphone

An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
IJECEIAES
 
IRJET- Fingerprient based Vehicle Starter
IRJET-  	  Fingerprient based Vehicle StarterIRJET-  	  Fingerprient based Vehicle Starter
IRJET- Fingerprient based Vehicle Starter
IRJET Journal
 
UX Design and Issues in IOT
UX Design and Issues in IOTUX Design and Issues in IOT
UX Design and Issues in IOT
Ju Lim
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlanKart Griffin
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
LameesAnees
 
The User Experience of Near Field Communication
The User Experience of Near Field CommunicationThe User Experience of Near Field Communication
The User Experience of Near Field Communication
Memi Beltrame
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
ijtsrd
 
IRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET Journal
 
IRJET- Hand Movement Recognition for a Speech Impaired Person
IRJET-  	  Hand Movement Recognition for a Speech Impaired PersonIRJET-  	  Hand Movement Recognition for a Speech Impaired Person
IRJET- Hand Movement Recognition for a Speech Impaired Person
IRJET Journal
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
www.mairsturnstile.com
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
brijesh kumar
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET Journal
 
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
Caroline Charumathy
 
WIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docxWIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docx
AnimeshBasak13
 

Similar to Fingerprints recognition on Smartphone (20)

An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
 
IRJET- Fingerprient based Vehicle Starter
IRJET-  	  Fingerprient based Vehicle StarterIRJET-  	  Fingerprient based Vehicle Starter
IRJET- Fingerprient based Vehicle Starter
 
UX Design and Issues in IOT
UX Design and Issues in IOTUX Design and Issues in IOT
UX Design and Issues in IOT
 
DECAInnovationPlan
DECAInnovationPlanDECAInnovationPlan
DECAInnovationPlan
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
The User Experience of Near Field Communication
The User Experience of Near Field CommunicationThe User Experience of Near Field Communication
The User Experience of Near Field Communication
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
 
IRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired PeopleIRJET- Gesture Drawing Android Application for Visually-Impaired People
IRJET- Gesture Drawing Android Application for Visually-Impaired People
 
IRJET- Hand Movement Recognition for a Speech Impaired Person
IRJET-  	  Hand Movement Recognition for a Speech Impaired PersonIRJET-  	  Hand Movement Recognition for a Speech Impaired Person
IRJET- Hand Movement Recognition for a Speech Impaired Person
 
2 (2)
2 (2)2 (2)
2 (2)
 
PPT (2)
PPT (2)PPT (2)
PPT (2)
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
 
Google Glass
Google GlassGoogle Glass
Google Glass
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
 
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
REPORT: Competitive Intelligence Analysis on “Fingerprint detection in portab...
 
Gesture phones
Gesture phonesGesture phones
Gesture phones
 
WIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docxWIRELESS LOCKSYSTEM THROUGH OTP.docx
WIRELESS LOCKSYSTEM THROUGH OTP.docx
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Fingerprints recognition on Smartphone

  • 1. Fingerprints recognition on Smartphone GCIT 1015 IT INNOVATIONS SHAPING OUR WORLD 16215532 LAM HO WAH GORDON 16220757 CHENG NGA MAN 16222504 YEUNG, ELAINE YU PING 16222598 TANG CHUN YI KELLY 26 October ,2016
  • 3. Background ▶ Fingerprint identification is one of the most well-known and publicized biometrics. ▶ As fingerprints offer a reliable means of personal identification , they have been used for identification for over a century. ▶ And this technology is used in the mobile phone since 2007,by Toshiba.
  • 4. Principle ▶ Capacitive fingerprint scanners are the type mostly used in smartphones. They work properly if the distance is short enough so that electricity can be transferred from the capacitors and the skin ▶ Fingerprint is unique and full of ridges and valleys. Ridges are closer to the capacitor, and more electricity will flow away. Your fingerprint can be read by the sensor due to this characteristic.
  • 5. Type ▶ There are mainly two types of fingerprint recognition on smartphone. They are swipe-style and one-touch/press style respectively. ▶ Swipe-style During movement of the finger the electrical field will change dependent on the distance between the sensor surface and the ridges and valleys of the fingerprint. Video clip - Swipe style fingerprint recognition
  • 6. Type ▶ One-touch/press style With just a touch or a press of your device's Home button, the sensor quickly reads your fingerprint and automatically unlocks your phone. Video clip - One-touch/ press style
  • 7. Components ▶ As shown in the diagram, each sensor consists of arrays of cells. These cells have two conductor plates, which are covered with an insulating layer. Thus, they form a simple capacitor which is used to store the charge.These sensors will then be connected to an integrator. The output of the integrator will be given to the input of an inverting operational amplifier. This op-amp will consist of hundreds of transistors, resistors and capacitors. This op-amp is alters the input voltage with respect to the reference voltage provided to the other input. The non-inverting input is connected to the ground. The inverting input is given to the reference voltage and then to the feedback circuit. This feedback circuit is given to the amplifier output and also includes the two conductor plates.
  • 8. Applications and examples ▶ 1.Unlock the mobile Since everyone has unique fingerprint, it can be served as a personal identification in the fingerprint recognition. People can unlock the phone by putting the finger on Home button or swipe the finger from top to bottom of the sensor.It enhances the security of the mobile phones. ▶ 2. Purchase in App stores People now make payment while purchase applications in the App Store on their iPhones and iPads and they are able to authorize Play Store purchases with the fingerprint. This help them save time when online shopping. ▶ 3.Banking Most banking apps have started integrating the fingerprint sensor, so we can make transactions with a tap to the sensor.
  • 9. Applications and examples ▶ 4. Use Home Button Without Pressing the Button We can use the fingerprint sensor as an alternative for capacitive touch button, you can install and use the app easyHome for Samsung from the Play Store. ▶ 5.Auto Login to Websites The fingerprint sensor can act as a second layer of security while filling out the credentials. Every time people log on requires the saved credentials, they will be auto-logged into the website after the verification.
  • 10. Advantages 1) Convenient ▶ It is convenient to use fingerprint recognition as it can be an alternative to your password for online payment, simplifying the process of purchasing online, or for locking and unlocking the devices, and we can remember fewer passwords. For example, apple pay, you can use your fingerprint to make the payment and you can buy apps, videos and musics on ITunes. 2) Secure ▶ It is secure to use fingerprint for recognition on smartphones because human fingerprint contain unique whorls and ridges that would be difficult to be duplicate and counterfeited.
  • 11. Disadvantages 1) Sensitivity ▶ The device should be clean enough to facilitate effective scanning. The scanner can be easily contaminated by dust or oil on our hands and lose its accuracy. Also, the moisture on the home button or our fingertips can keep our fingerprints from being registered. 2) May cause security problem toward the endpoint data protection ▶ devices using fingerprint for recognition may do not utilize a password to lock their hardware. This can present a considerable threat to to endpoint data protection. For example if an individual’s unlocked device is lost or stolen, hackers have easy access to any sensitive content contain there.
  • 12. Online Survey ▶ Target Audience: general public ▶ Information: Fingerprints recognition on Smartphone ▶ Website: https://goo.gl/forms/jfGgHOU8LbinVfgI3
  • 13. Survey Results ▶ Most people think that it is convenient and intelligent. ▶ A minority of people think that it maybe not sensitive enough or troublesome.
  • 14. Survey Results ▶ A majority of people have experiences on using this technology, it shows that this technology has high popularity.
  • 15. Survey Results ▶ Many people agree that this technology is convenient and secure enough after using it. ▶ But a minority of people think that it may esay to have technical problems.
  • 16. Survey Results ▶ A majority of people think the sensibility of the technology still have the room of improvement.
  • 17. Further development & Conclusion ▶ According to a market research from IHS, approximately 50% of smartphones sold by 2019 are expected to integrate an embedded fingerprint sensor. As we can see, inevitably, smartphone with fingerprint recognition will become dominant in the future. ▶ Although there are some concerns about the insecurity and inconvenience of the fingerprint recognition technology , we all believe that it can be improved regarding the breakthrough in science and technology. Fingerprint recognition, expectedly, will be used for other purposes and beneficial to our daily life.