SlideShare a Scribd company logo
1 of 6
How Fingerprint
Scanners Work
SW assignment WEEK12
S1200005 Reina Kurato
Pick Up Keyword



 fingerprint scanners
 spy thrillers
 USB
 Biometrics
 identity security
What`s Mean ?

 Fingerprint scanners
Security technology to determine the computerized
fingerprint. It works by reading the fingerprint. It is more
reliable than password. Also, it is mainly used in places
such as condominiums and bank.

 Spy thrillers
This word mean is person who trying to break the security
such as spy are something that can be a threatening
presence.
 USB
This word is stands for Universal Serial Bus. It is available that
data are carry to several device by writing data. Therefor, it is
the most popular. a general-purpose interface standard as
computer peripherals.

 Biometrics
This is personal authentication technique that performed using
information of characteristics of the human body, or vital
organs and characteristics of behavior ,or hobby. For example
fingerprint, iris and voice print. This security technology that
has the high effect .

 Identity security
Use the security management function, you can achieve user
authentication when accessing the Web container and the EJB
container. Then it use user or password.
Important Sentence


 Computerized fingerprint scanners have been a mainstay
  of spy thrillers for decades, but up until recently, they
  were pretty exotic technology in the real world.


-> This sentence show that advanced authentication
security technology can be achieved with current
technology. Also it was like a dream in a long time ago. At
the same time, this show that development of security
technology around the world.
 Scanners have started popping up all over the place -- in
  police stations, high-security buildings and even on PC
  keyboards.
-> This sentence show that today, even if high-security
building such as police station security management is now
performed by keyboard operation. This is the culmination of
computer and security technology ever.



 We'll also see how fingerprint scanner security systems
  stack up to conventional password and identity card
  systems, and find out how they can fail.
->This sentence show that fingerprint scanner security is more
and more good effect by combine to password and identity
card systems. In order to improve the security effect, it relying
on a one technology rather than need to combine several
techniques.

More Related Content

What's hot

ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionAlan Quayle
 
IEEE Paper presentation
IEEE Paper presentationIEEE Paper presentation
IEEE Paper presentationArjun SK
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics OverviewKarthik Sarma
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless NetworksMichael Boman
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lylewebinos project
 
Hackers Hit Web Host
Hackers Hit Web HostHackers Hit Web Host
Hackers Hit Web Hostwebhostingguy
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of ThingsJIGAR MAKHIJA
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noidaDSC Delhi
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYJASHU JASWANTH
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Securitynoornabi16
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Mahmud Hossain
 
Introduction to python for cybersecurity pythonminna
Introduction to python for cybersecurity  pythonminnaIntroduction to python for cybersecurity  pythonminna
Introduction to python for cybersecurity pythonminnaTopeAbdulgafar
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsChromeInfo Technologies
 
iPhone forensics course overview
iPhone forensics course overviewiPhone forensics course overview
iPhone forensics course overviewSatish b
 

What's hot (19)

Cryptography
CryptographyCryptography
Cryptography
 
ciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack sessionciphertext presentation at Enterprise Connect 2018 TADHack session
ciphertext presentation at Enterprise Connect 2018 TADHack session
 
IEEE Paper presentation
IEEE Paper presentationIEEE Paper presentation
IEEE Paper presentation
 
IoT & Robotics Overview
IoT & Robotics OverviewIoT & Robotics Overview
IoT & Robotics Overview
 
Privacy in Wireless Networks
Privacy in Wireless NetworksPrivacy in Wireless Networks
Privacy in Wireless Networks
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lyle
 
Hackers Hit Web Host
Hackers Hit Web HostHackers Hit Web Host
Hackers Hit Web Host
 
Presentation on iot- Internet of Things
Presentation on iot- Internet of ThingsPresentation on iot- Internet of Things
Presentation on iot- Internet of Things
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Week12
Week12Week12
Week12
 
MOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITYMOBILE PHONE SECURITY./ MOBILE SECURITY
MOBILE PHONE SECURITY./ MOBILE SECURITY
 
Communication Security
Communication SecurityCommunication Security
Communication Security
 
IOT privacy and Security
IOT privacy and SecurityIOT privacy and Security
IOT privacy and Security
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
Introduction to python for cybersecurity pythonminna
Introduction to python for cybersecurity  pythonminnaIntroduction to python for cybersecurity  pythonminna
Introduction to python for cybersecurity pythonminna
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
TOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of ThingsTOP 6 Security Challenges of Internet of Things
TOP 6 Security Challenges of Internet of Things
 
iPhone forensics course overview
iPhone forensics course overviewiPhone forensics course overview
iPhone forensics course overview
 

Viewers also liked

Sovereign Business Resources
Sovereign Business ResourcesSovereign Business Resources
Sovereign Business Resourcespujad
 
11 Nic De Trvno Plus 5
11 Nic De  Trvno Plus 511 Nic De  Trvno Plus 5
11 Nic De Trvno Plus 5goligo66
 
Business e mails
Business e mailsBusiness e mails
Business e mailsyou-ly05
 
7 united way of perth huron
7 united way of perth huron7 united way of perth huron
7 united way of perth huronCharlotte Martin
 
Rekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolahRekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolahmonica_monik
 
Parts plantes (fins la tija)
Parts plantes (fins la tija)Parts plantes (fins la tija)
Parts plantes (fins la tija)MarcosCloud
 
SURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - OberflächeninspektionSURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - OberflächeninspektionNextSense GmbH
 
Fusion Homes Noida Extension
Fusion Homes Noida ExtensionFusion Homes Noida Extension
Fusion Homes Noida Extensionfusion1234
 

Viewers also liked (11)

Sovereign Business Resources
Sovereign Business ResourcesSovereign Business Resources
Sovereign Business Resources
 
11 Nic De Trvno Plus 5
11 Nic De  Trvno Plus 511 Nic De  Trvno Plus 5
11 Nic De Trvno Plus 5
 
VSR 85 AVENUE
VSR 85 AVENUEVSR 85 AVENUE
VSR 85 AVENUE
 
Secuencia Didcatica
Secuencia DidcaticaSecuencia Didcatica
Secuencia Didcatica
 
Business e mails
Business e mailsBusiness e mails
Business e mails
 
7 united way of perth huron
7 united way of perth huron7 united way of perth huron
7 united way of perth huron
 
Rekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolahRekapitulasi nilai akhir sekolah
Rekapitulasi nilai akhir sekolah
 
Parts plantes (fins la tija)
Parts plantes (fins la tija)Parts plantes (fins la tija)
Parts plantes (fins la tija)
 
SURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - OberflächeninspektionSURFILES DIRIS 3D - Oberflächeninspektion
SURFILES DIRIS 3D - Oberflächeninspektion
 
Classic-service
Classic-serviceClassic-service
Classic-service
 
Fusion Homes Noida Extension
Fusion Homes Noida ExtensionFusion Homes Noida Extension
Fusion Homes Noida Extension
 

Similar to Sw assignment week12

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Digital spectacle by using cloud computing
Digital spectacle by using cloud computingDigital spectacle by using cloud computing
Digital spectacle by using cloud computingMandar Pathrikar
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access systemAkshay Govekar
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber securityJetking
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemIRJET Journal
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmIRJET Journal
 
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...Vensoft Technologies
 

Similar to Sw assignment week12 (20)

3D - password
3D - password3D - password
3D - password
 
3d authentication
3d authentication3d authentication
3d authentication
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Digital spectacle by using cloud computing
Digital spectacle by using cloud computingDigital spectacle by using cloud computing
Digital spectacle by using cloud computing
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Network security
Network securityNetwork security
Network security
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
Need for cyber security
Need for cyber securityNeed for cyber security
Need for cyber security
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Smart Door Monitoring and Locking system
Smart Door Monitoring and Locking systemSmart Door Monitoring and Locking system
Smart Door Monitoring and Locking system
 
128 BIT WHAT?
128 BIT WHAT?128 BIT WHAT?
128 BIT WHAT?
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Crypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA AlgorithmCrypto Vision Bot Using RSA Algorithm
Crypto Vision Bot Using RSA Algorithm
 
BluBØX Intro
BluBØX IntroBluBØX Intro
BluBØX Intro
 
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...vensoft technologies http://www.ieeedeveloperslabs.in/  finger print based at...
vensoft technologies http://www.ieeedeveloperslabs.in/ finger print based at...
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Sw assignment week12

  • 1. How Fingerprint Scanners Work SW assignment WEEK12 S1200005 Reina Kurato
  • 2. Pick Up Keyword  fingerprint scanners  spy thrillers  USB  Biometrics  identity security
  • 3. What`s Mean ?  Fingerprint scanners Security technology to determine the computerized fingerprint. It works by reading the fingerprint. It is more reliable than password. Also, it is mainly used in places such as condominiums and bank.  Spy thrillers This word mean is person who trying to break the security such as spy are something that can be a threatening presence.
  • 4.  USB This word is stands for Universal Serial Bus. It is available that data are carry to several device by writing data. Therefor, it is the most popular. a general-purpose interface standard as computer peripherals.  Biometrics This is personal authentication technique that performed using information of characteristics of the human body, or vital organs and characteristics of behavior ,or hobby. For example fingerprint, iris and voice print. This security technology that has the high effect .  Identity security Use the security management function, you can achieve user authentication when accessing the Web container and the EJB container. Then it use user or password.
  • 5. Important Sentence  Computerized fingerprint scanners have been a mainstay of spy thrillers for decades, but up until recently, they were pretty exotic technology in the real world. -> This sentence show that advanced authentication security technology can be achieved with current technology. Also it was like a dream in a long time ago. At the same time, this show that development of security technology around the world.
  • 6.  Scanners have started popping up all over the place -- in police stations, high-security buildings and even on PC keyboards. -> This sentence show that today, even if high-security building such as police station security management is now performed by keyboard operation. This is the culmination of computer and security technology ever.  We'll also see how fingerprint scanner security systems stack up to conventional password and identity card systems, and find out how they can fail. ->This sentence show that fingerprint scanner security is more and more good effect by combine to password and identity card systems. In order to improve the security effect, it relying on a one technology rather than need to combine several techniques.