SlideShare a Scribd company logo
How Fingerprint
Scanners Work
SW assignment WEEK12
S1200005 Reina Kurato
Pick Up Keyword



 fingerprint scanners
 spy thrillers
 USB
 Biometrics
 identity security
What`s Mean ?

 Fingerprint scanners
Security technology to determine the computerized
fingerprint. It works by reading the fingerprint. It is more
reliable than password. Also, it is mainly used in places
such as condominiums and bank.

 Spy thrillers
This word mean is person who trying to break the security
such as spy are something that can be a threatening
presence.
 USB
This word is stands for Universal Serial Bus. It is available that
data are carry to several device by writing data. Therefor, it is
the most popular. a general-purpose interface standard as
computer peripherals.

 Biometrics
This is personal authentication technique that performed using
information of characteristics of the human body, or vital
organs and characteristics of behavior ,or hobby. For example
fingerprint, iris and voice print. This security technology that
has the high effect .

 Identity security
Use the security management function, you can achieve user
authentication when accessing the Web container and the EJB
container. Then it use user or password.
Important Sentence


 Computerized fingerprint scanners have been a mainstay
  of spy thrillers for decades, but up until recently, they
  were pretty exotic technology in the real world.


-> This sentence show that advanced authentication
security technology can be achieved with current
technology. Also it was like a dream in a long time ago. At
the same time, this show that development of security
technology around the world.
 Scanners have started popping up all over the place -- in
  police stations, high-security buildings and even on PC
  keyboards.
-> This sentence show that today, even if high-security
building such as police station security management is now
performed by keyboard operation. This is the culmination of
computer and security technology ever.



 We'll also see how fingerprint scanner security systems
  stack up to conventional password and identity card
  systems, and find out how they can fail.
->This sentence show that fingerprint scanner security is more
and more good effect by combine to password and identity
card systems. In order to improve the security effect, it relying
on a one technology rather than need to combine several
techniques.

More Related Content

What's hot

Cryptography
CryptographyCryptography
Cryptography
Vedant Singh
 
ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack session
Alan Quayle
 
IEEE Paper presentation
IEEE Paper presentationIEEE Paper presentation
IEEE Paper presentation
Arjun SK
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
Karthik Sarma
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless NetworksMichael Boman
 
IOT Security
IOT SecurityIOT Security
IOT Security
Sylvain Martinez
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lylewebinos project
 
Hackers Hit Web Host
Hackers Hit Web HostHackers Hit Web Host
Hackers Hit Web Hostwebhostingguy
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
JIGAR MAKHIJA
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
DSC Delhi
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
JASHU JASWANTH
 
Communication Security
Communication SecurityCommunication Security
Communication Security
Axis Communications
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
noornabi16
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Mahmud Hossain
 
Introduction to python for cybersecurity pythonminna
Introduction to python for cybersecurity  pythonminnaIntroduction to python for cybersecurity  pythonminna
Introduction to python for cybersecurity pythonminna
TopeAbdulgafar
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
Jimmy Shah
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
ChromeInfo Technologies
 
iPhone forensics course overview
iPhone forensics course overviewiPhone forensics course overview
iPhone forensics course overviewSatish b
 

What's hot (19)

Cryptography
CryptographyCryptography
Cryptography
 
ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack session
 
IEEE Paper presentation
IEEE Paper presentationIEEE Paper presentation
IEEE Paper presentation
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lyle
 
Hackers Hit Web Host
Hackers Hit Web HostHackers Hit Web Host
Hackers Hit Web Host
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Week12
Week12Week12
Week12
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
Introduction to python for cybersecurity pythonminna
Introduction to python for cybersecurity  pythonminnaIntroduction to python for cybersecurity  pythonminna
Introduction to python for cybersecurity pythonminna
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
iPhone forensics course overview
iPhone forensics course overviewiPhone forensics course overview
iPhone forensics course overview
 

Viewers also liked

Sovereign Business Resources
Sovereign Business ResourcesSovereign Business Resources
Sovereign Business Resources
pujad
 
11 Nic De Trvno Plus 5
11 Nic De  Trvno Plus 511 Nic De  Trvno Plus 5
11 Nic De Trvno Plus 5
goligo66
 
Secuencia Didcatica
Secuencia DidcaticaSecuencia Didcatica
Secuencia Didcatica
Ivoon Leija Barrera
 
Business e mails
Business e mailsBusiness e mails
Business e mailsyou-ly05
 
7 united way of perth huron
7 united way of perth huron7 united way of perth huron
7 united way of perth huronCharlotte Martin
 
Rekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolahRekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolah
monica_monik
 
Parts plantes (fins la tija)
Parts plantes (fins la tija)Parts plantes (fins la tija)
Parts plantes (fins la tija)
MarcosCloud
 
SURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - OberflächeninspektionSURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - Oberflächeninspektion
NextSense GmbH
 
Classic-service
Classic-serviceClassic-service
Classic-service
Nikita Tolmachev
 
Fusion Homes Noida Extension
Fusion Homes Noida ExtensionFusion Homes Noida Extension
Fusion Homes Noida Extension
fusion1234
 

Viewers also liked (11)

Sovereign Business Resources
Sovereign Business ResourcesSovereign Business Resources
Sovereign Business Resources
 
11 Nic De Trvno Plus 5
11 Nic De  Trvno Plus 511 Nic De  Trvno Plus 5
11 Nic De Trvno Plus 5
 
VSR 85 AVENUE
VSR 85 AVENUEVSR 85 AVENUE
VSR 85 AVENUE
 
Secuencia Didcatica
Secuencia DidcaticaSecuencia Didcatica
Secuencia Didcatica
 
Business e mails
Business e mailsBusiness e mails
Business e mails
 
7 united way of perth huron
7 united way of perth huron7 united way of perth huron
7 united way of perth huron
 
Rekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolahRekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolah
 
Parts plantes (fins la tija)
Parts plantes (fins la tija)Parts plantes (fins la tija)
Parts plantes (fins la tija)
 
SURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - OberflächeninspektionSURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - Oberflächeninspektion
 
Classic-service
Classic-serviceClassic-service
Classic-service
 
Fusion Homes Noida Extension
Fusion Homes Noida ExtensionFusion Homes Noida Extension
Fusion Homes Noida Extension
 

Similar to Sw assignment week12

3D - password
3D - password3D - password
3D - password
BhavikParmar24
 
3d authentication
3d authentication3d authentication
3d authentication
sudheerpothu
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Digital spectacle by using cloud computing
Digital spectacle by using cloud computingDigital spectacle by using cloud computing
Digital spectacle by using cloud computing
Mandar Pathrikar
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
SonuSawant
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Network security
Network securityNetwork security
Network security
Ali Kamil
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET Journal
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
IOSR Journals
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
Sufiyan Arab
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
Jetking
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
Ahmed Sallam
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
IRJET Journal
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
Razorpoint Security
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
IRJET Journal
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
Jesica Trejo
 
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...
Vensoft Technologies
 

Similar to Sw assignment week12 (20)

3D - password
3D - password3D - password
3D - password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Digital spectacle by using cloud computing
Digital spectacle by using cloud computingDigital spectacle by using cloud computing
Digital spectacle by using cloud computing
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Network security
Network securityNetwork security
Network security
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 

Sw assignment week12

  • 1. How Fingerprint Scanners Work SW assignment WEEK12 S1200005 Reina Kurato
  • 2. Pick Up Keyword  fingerprint scanners  spy thrillers  USB  Biometrics  identity security
  • 3. What`s Mean ?  Fingerprint scanners Security technology to determine the computerized fingerprint. It works by reading the fingerprint. It is more reliable than password. Also, it is mainly used in places such as condominiums and bank.  Spy thrillers This word mean is person who trying to break the security such as spy are something that can be a threatening presence.
  • 4.  USB This word is stands for Universal Serial Bus. It is available that data are carry to several device by writing data. Therefor, it is the most popular. a general-purpose interface standard as computer peripherals.  Biometrics This is personal authentication technique that performed using information of characteristics of the human body, or vital organs and characteristics of behavior ,or hobby. For example fingerprint, iris and voice print. This security technology that has the high effect .  Identity security Use the security management function, you can achieve user authentication when accessing the Web container and the EJB container. Then it use user or password.
  • 5. Important Sentence  Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. -> This sentence show that advanced authentication security technology can be achieved with current technology. Also it was like a dream in a long time ago. At the same time, this show that development of security technology around the world.
  • 6.  Scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. -> This sentence show that today, even if high-security building such as police station security management is now performed by keyboard operation. This is the culmination of computer and security technology ever.  We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail. ->This sentence show that fingerprint scanner security is more and more good effect by combine to password and identity card systems. In order to improve the security effect, it relying on a one technology rather than need to combine several techniques.