Abstrait

Preventing Mobility Device Intrusion And Theft Using Biometric Fingerprint Recognition

Vanitha.M, Vidhya Gandhi.P, Rajkumar.M, Rajkumar.S

Fingerprint based authentication system project is used to more secure your system compare to all other security device which uses biometric reader. In the project data from the finger print is send to the system through port and fingerprint reader is used to read the data from port and validate the data with your data (what ever entered). If the validation output success then the user would be allowed else it blocks the user to allow. The system has to use third party component to read or send the data through the serial port. In the project implementation you have to enter your data (user id and password) after register finger print, so data for the validation could be catch directly from finger print through the serial port. After read the data from serial port using third party component in biometric database FVC2004, it checks whether the entered by the user and reading data’s are match or not. After your successful validation (match) you can move ahead for further works else you can’t. In an existing system we secure the system through check whether the user id and password match with data’s in database or not, but it’s possible to steal the data from the database. So it’s not highly secured so go for the implementation of fingerprint based authentication system project. Fingerprint based authentication system project is more secured compare to all other securities, because you can’t stole any user information due to high security. Information stored in fingerprint is only known by the user so even through unknown person uses the fingerprint they can’t enter the correct data while we checking. If the third person uses fake finger print to access the system, which is also recognized and block the user to use. Finally we conclude no way to steal the user’s data and we can maintain the user’s information safely and securely, so fingerprint based authentication system is more secured compare to all other security device or system.

Avertissement: Ce résumé a été traduit à l'aide d'outils d'intelligence artificielle et n'a pas encore été examiné ni vérifié