1 / 14

NETWORK SECURITY THROUGH BIOMETRICS

A PAPER ON. NETWORK SECURITY THROUGH BIOMETRICS. P ALM VIEN T ECHNOLOGY. BY Sagar Pudi , B.TECH CSE JNTUK - VZM. INDEX. INTRODUCTION WHAT DOES IT MEAN? HOW DOES IT WORK? FEATURES APPLICATIONS CONCLUSION. INTRODUCTION.

hop
Download Presentation

NETWORK SECURITY THROUGH BIOMETRICS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A PAPER ON NETWORK SECURITYTHROUGH BIOMETRICS PALM VIEN TECHNOLOGY BY Sagar Pudi , B.TECH CSE JNTUK - VZM

  2. INDEX • INTRODUCTION • WHAT DOES IT MEAN? • HOW DOES IT WORK? • FEATURES • APPLICATIONS • CONCLUSION

  3. INTRODUCTION • In the ubiquitous network society, individuals can easily access information any time and any where. • Users are faced with the risk others can easily access information, Ex: PINCODE TECHNOLOGY • There was a need to introduce a technology that secures our data more efficiently from unlawful intervention.

  4. FUJITSU introduced four technologies namely 1.Voice recognition 2.Finger print 3.Face recognition 4.Palm vein. • Among them palm vein technology is most accurate one.

  5. What does it mean? • Palm vein pattern acts as security key. • It is unique and affable. • An individuals palm-vein image is scanned and converted by algorithms into data points. • These are compressed, encrypted & stored as orientation for future authentication.

  6. How does it works? • Pattern reading. • Authentication • Access to the environment.

  7. CATALOGUING: • Palm scanning. -> Infraredrays illuminate the palm for pattern capturing. -> Vein pattern is stored in the data base.

  8. Features: • Easier and penetrable. Highly securable: • Test basis • Declared -> PVT is most secured . False rejection rate : 0.01% False acceptance rate: 0.00008%

  9. Growth recognition HYGIENE CONCERN:- Sanitation • Contact less feature

  10. Applications: • Banking - Money withdrawl • Medicine - Disinfection • Atms- User recognise

  11. Personal Computers: • Vein sensor in mouse. Hospitals and libraries: • To maintain unique & secured records of patients and students.

  12. Conclusion • Presently this technology was being used in a wide range in Japan. • Threats abating. • Hoping for greater benefits.

  13. ??? Queries

  14. THANQ

More Related