1,237 research outputs found

    Body language, security and e-commerce

    Get PDF
    Security is becoming an increasingly more important concern both at the desktop level and at the network level. This article discusses several approaches to authenticating individuals through the use of biometric devices. While libraries might not implement such devices, they may appear in the near future of desktop computing, particularly for access to institutional computers or for access to sensitive information. Other approaches to computer security focus on protecting the contents of electronic transmissions and verification of individual users. After a brief overview of encryption technologies, the article examines public-key cryptography which is getting a lot of attention in the business world in what is called public key infrastructure. It also examines other efforts, such as IBM’s Cryptolope, the Secure Sockets Layer of Web browsers, and Digital Certificates and Signatures. Secure electronic transmissions are an important condition for conducting business on the Net. These business transactions are not limited to purchase orders, invoices, and contracts. This could become an important tool for information vendors and publishers to control access to the electronic resources they license. As license negotiators and contract administrators, librarians need to be aware of what is happening in these new technologies and the impact that will have on their operations

    A Prototype Model of an IoT-based Door System using Double-access Fingerprint Technique

    Get PDF
    Security of lives and properties remains a trending issue of optimal concern in the recent times. It is one of the major issues posing challenges to governments, establishments and individuals. Common security techniques such as the use of keys, passwords and cards are used in home environments and hotels for traditional authentication. Others include lock codes, mechanical doors or electronics RFID Card Door. However, compromise of these security techniques such as property theft and unauthorized entry by visitors and hotel staff is due to a single authenticated access method which is not trustworthy and reliable. This calls for an improved technique. An IoT-based Smart Door System Model that provide double access authentication through fingerprint modules is presented for hotel and guest houses in this paper. The proposed system architecture design specifies all the modules involved and the circuit diagram designed specifies various modules inter connectivity. The prototype implementation software developed in C programming language was tested with several series of captured templates. The prototype test conducted showed that the Smart door system developed responded only to fingerprint signature and unlocks the door when it matches with signatures captured during booking. Keywords: Arduino, biometry, fingerprint, sensor, smart door, Io

    Biometrics and Network Security

    Get PDF
    This paper examines the techniques used in the two categories of biometric techniques (physiological and behavioral) and considers some of the applications for biometric technologies. Common physiological biometrics include finger characteristics (fingertip [fingerprint], thumb, finger length or pattern), palm (print or topography), hand geometry, wrist vein, face, and eye (retina or iris). Behavioral biometrics include voiceprints, keystroke dynamics, and handwritten signatures

    The Application of Fuzzy Logic Controller to Compute a Trust Level for Mobile Agents in a Smart Home

    Get PDF
    Agents that travel through many hosts may cause a threat on the security of the visited hosts. Assets, system resources, and the reputation of the host are few possible targets for such an attack. The possibility for multi-hop agents to be malicious is higher compared to the one-hop or two-hop boomerang agents. The travel history is one of the factors that may allow a server to evaluate the trustworthiness of an agent. This paper proposes a technique to define levels of trust for multi-hop agents that are roaming in a smart home environment. These levels of trust are used later to determine actions taken by a host at the arrival of an agent. This technique uses fuzzy logic as a method to calculate levels of trust and to define protective actions in regard to those levels

    Design and implementation of a fingerprint-based biometric access control system

    Get PDF
    Security systems are often penetrated by sophisticated criminals, thus there is always a need for new solutions to be devised to give sufficient security to houses and other locations. The goal of this project is to build and deploy a fingerprint-based biometric access control system. The fingerprint is a pattern of ridges and valleys on the surface of a fingertip. Among various biometrics, fingerprint recognition is the most extensively and internationally accepted biometric because of its uniqueness, accuracy, cost-effectiveness, non-transferability, and ease of use. Presented is the system architecture for the system development that demonstrates component augmentation, detail extraction, and matching methodologies. MATLAB and the programming language C were used to develop a software application that was used to build algorithms for improvement, minutiae extraction, and matching processing. The software works by extracting meaningful features known as minutiae points from the person’s fingerprint, then records and stores these minutiae points to verify the person’s identity in the future.  The resulting minutiae information is used to find matching fingerprints and to register these fingerprints in the system database. Finally, a verification system and identification system were realized. The proposed automatic door access control system was implemented using the Arduino Atmega 328p microcontroller. The proposed system was tried-out in real-time, and its performance was deemed adequate

    Biometric Security for Cell Phones

    Get PDF
    Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this confidential data stored on cell phones? Studies have shown that even though most of the cell phone users are aware of the PIN security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea.biometrics, security, fingerprint, face recognition, cell phones

    IOT based Security System for Auto Identifying Unlawful Activities using Biometric and Aadhar Card

    Get PDF
    In today’s era, where thefts are consecutively increasing, especially in banks, jewelry shops, stores, ATMs, etc, there is a need to either develop a new system or to improve the existing system, due to which the security in these areas can be enhanced. However, the traditional methods (CCTV cameras, alarm buttons) to handle the security issues in these areas are still available, but they have lots of limitations and drawbacks. So, in order to handle the security issues, this paper describes how the biometric and IoT (Internet of Things) techniques can greatly improve the existing traditional security system. Our proposed system uses biometric authentication using the fingerprint and iris pattern with the strength of IoT sensors, microcontroller and UIDAI aadhar server to enhance the security model and to cut the need of keeping extra employees in monitoring the security system
    • …
    corecore