amazon

Friday, August 14, 2015

FINGER PRINTAUTHENTICATION

 FINGER PRINTAUTHENTICATION


ABSTRACT       
        
           The project is based upon the Employee login into a company securely. It is defined as a technique to maintain all the employees detail and attendances of an employee when the employee enter in the office using their finger prints.

            Here a collection of values like employee details, fingerprint, address, designation, etc are collected in a database which is maintained by The HR of that company. When the collected fingerprints and the employee thumbs are matched to its Value in database, then the employee is right to enter into the company
.
            Front End: Asp.net with C#
            Back End: Sql Server

Project description

Web administration is the back end of Web development. Administrators keep the Web servers up and running, make sure the hosting continues to work; the servers are secure and keep track of the logs. Web administration is a vital part of any Web operation and understanding the back end will help a Web designer understand how it all works together.

            The project is mainly divided into three modules namely

·         Authentication module
·         Admin module
·         User module


     
AUTHENTICATION MODULE
                  
                   This module is common with both user and administrator. Here a smart card is given to the Employee with personal details along with their finger print code in it.
                         If user finger print matches with corresponding database, the user is authenticated and allowed to access the application. If it fails an error message is displayed.

ADMIN MODULE:
·         This module creates admin and edits new employee and employee details   respectively.   
·         Admin has right to create and edit a new department and assign it to an Employee.
·         Admin schedules work and the due time to complete the work for an employee.
·         Generates report describing work done by an employee day by day

USER MODULE:
·         This module allows the user to put attendances by authenticating the print.                        
·         Look over the work assigned and the due date to complete.
                       
·         Request for leave if needs by filling leave form.
                                                            




System ANALYSIS

Existing system
            The plus ID security device from Privacies is a personal, mobile biometric fob, which uses fingerprint biometrics to secure access to buildings/ facilities (physical access) and computers and networks (logical access).
            Plus ID has a self-contained fingerprint scanner and secure processor to verify its owner's identity using fingerprint authentication.
            Advancements in technology has made possible to build rugged and reliable Biometric authentication systems, and the costs of biometrics authentication systems have been dropping as reliability is improving.
The key steps involved in Fingerprint authentication system are:
·         Image capture - Using scanning devices available in the market
·         Image recognition - Using standard algorithms
·         Template creation - Using standard algorithms
·         Matching - Using application and standard algorithms
                        Cal soft Labs built a fingerprint authentication system. The broad overview of the system is as shown below:




PROPOSED SYSTEM
                     In the proposed schemes, sender 'S' and receiver 'R' each has a pair of private and public keys, which are issued by a trusted key distribution center (KDC).
                        The private and public keys of the sender are KSPrv and KSPub, while private and public keys of the receiver are KRPrv and KRPub, respectively.
                        Our deniable authentication scheme is based on Nyberg-Rappel’s signature method, by using discrete logarithm problem (DLP) and hash function computation, whose security has been proved by many contemporary researchers.
                         In the following subsection, we present our protocols.









                                   


No comments:

Post a Comment