SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
How Fingerprint Scanners Work
Name:Ryo Obata

No:s1150052

1. Introduction to How Fingerprint Scanners Work
  Without dozens of years are going to pass after the fingerprint
authentication function came to be equipped with by a computer,
however being used only at a place handling high information
technology for the dozens of years; of the generalization was not
done.
  However, during these past several years, as for the fingerprint
authentication function, it came to be supposed at every place.
The high technique called this fingerprint authentication is used
at the many places including the lock function of the keyboard of a
police station and the PC or the apartment and provides safe
security for our life.
2. Fingerprint Basics
  The human lasting fingerprint is one of the strange things. I
have the identification card which can completely prove one
oneself who the human being is made accidentally, and cursed it
on a finger-tip. These are the existence that I had on a finger by a
specific reason.
  I give an order to a fetus growing by genetic code of DNA, and
the human body changes it into the figure which makes the
human being the human being. However, a fingerprint is
completely a random element and is the strange existence that I
do not resemble closely even if I meet by the relations that the
blood leads to.
3. Optical Scanner
  A fingerprint scanner function includes two basic work. It is a
function I agree with the form of the finger-tip as a pattern from
the image that got it being necessary to obtain a fingerprint
beforehand and the form of the finger-tip which I obtained
beforehand, or to recognize.
  When it gets the image of the finger, there are some recognition
methods, but it is an optical reader with the CCD cameras
recently to become mainstream. These are things used in a digital
camera or a video camera, and a scan begins when I put a finger
to the glass plate and I print the place that is gloomy to light up
the upheaval of the fingerprint of the finger and a bright place
clearly and can arrest you.
4. Capacitance Scanner
 The fingerprint scanner to grind like an optics scanner starts a
mountain and the image of the valley to make a fingerprint.
However, not print using the light for, the condenser scanner is
going to catch the image of the fingerprint by canceling an electric
current. The sensor consists of a semiconductor chip consisting of
a large number of small aggregate, and I am very than one of the
fingerprints one existing on a finger small, and the electric
current recovering completely can thin them.
  A war becomes as a fingerprint the part by reading the voltage
corresponding to each when the scanner recognizes a finger;
distinguish it whether do not come true. I let the form of the
fingerprint make ends meet as one piece of data by reading every
data with sensor sequence.
5. Analysis
   I generally use the shape of various fingerprints as form to
show by a movie or the TV program, but this is not the method
that is practical when I compare the form of the fingerprint.
Because I can let the shape see in the different form by comparing
it even if I use the thing of the same form, I cannot completely
compare it. In addition it is dangerous to use the data of the
fingerprint by a comparison to make that I steal the shapes of the
fingerprint preparation.
  Therefore many fingerprint authentication systems compare the
specific characteristic part of the fingerprint. I authenticate a
target fingerprint precisely by I concentrate on it, and confirming
only a characteristic place parting to place that the line of the
fingerprint begins, and is over, two.
6.Lots More Information

  Some methods that can check whom security system appoints in
the user who admitted it exist. Most systems check security with
"lasting thing" "things knowing". It is an identification of
identification and is checked with passwords. However, I do not
necessarily wear these and I forget it in some cases and may not
wear it.
  However, a fingerprint authentication does not have it. This is
because the human being cannot lose one of the human elements
called the fingerprint. These stigmata imitate it and help it in
security greatly because it is very difficult to forget it.

Mais conteúdo relacionado

Mais procurados (10)

Graphics
GraphicsGraphics
Graphics
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense Technology
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Secugen Hamster Plus Fingerprint Reader
Secugen Hamster Plus Fingerprint ReaderSecugen Hamster Plus Fingerprint Reader
Secugen Hamster Plus Fingerprint Reader
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Smart quill
Smart quillSmart quill
Smart quill
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 

Destaque (8)

The nightmare before christmas
The nightmare before christmasThe nightmare before christmas
The nightmare before christmas
 
SW2-homework10
SW2-homework10SW2-homework10
SW2-homework10
 
English
EnglishEnglish
English
 
sw10-hw
sw10-hwsw10-hw
sw10-hw
 
Nightmare before christmas
Nightmare before christmasNightmare before christmas
Nightmare before christmas
 
sw-hw12
sw-hw12sw-hw12
sw-hw12
 
S1150052_week9
S1150052_week9S1150052_week9
S1150052_week9
 
Meaning of Pollution Maps - for Friends in Japan
Meaning of Pollution Maps - for Friends in JapanMeaning of Pollution Maps - for Friends in Japan
Meaning of Pollution Maps - for Friends in Japan
 

Semelhante a sw11-hw

Presentation michael(1)
Presentation michael(1)Presentation michael(1)
Presentation michael(1)
aizunoinu
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
s1190106
 

Semelhante a sw11-hw (20)

Roy
RoyRoy
Roy
 
assignment
assignmentassignment
assignment
 
assignment
assignmentassignment
assignment
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Week12
  Week12  Week12
Week12
 
Presentation michael(1)
Presentation michael(1)Presentation michael(1)
Presentation michael(1)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Kadai2
Kadai2Kadai2
Kadai2
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Roy b2
Roy b2Roy b2
Roy b2
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics application
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

sw11-hw

  • 1. How Fingerprint Scanners Work Name:Ryo Obata No:s1150052 1. Introduction to How Fingerprint Scanners Work Without dozens of years are going to pass after the fingerprint authentication function came to be equipped with by a computer, however being used only at a place handling high information technology for the dozens of years; of the generalization was not done. However, during these past several years, as for the fingerprint authentication function, it came to be supposed at every place. The high technique called this fingerprint authentication is used at the many places including the lock function of the keyboard of a police station and the PC or the apartment and provides safe security for our life.
  • 2. 2. Fingerprint Basics The human lasting fingerprint is one of the strange things. I have the identification card which can completely prove one oneself who the human being is made accidentally, and cursed it on a finger-tip. These are the existence that I had on a finger by a specific reason. I give an order to a fetus growing by genetic code of DNA, and the human body changes it into the figure which makes the human being the human being. However, a fingerprint is completely a random element and is the strange existence that I do not resemble closely even if I meet by the relations that the blood leads to.
  • 3. 3. Optical Scanner A fingerprint scanner function includes two basic work. It is a function I agree with the form of the finger-tip as a pattern from the image that got it being necessary to obtain a fingerprint beforehand and the form of the finger-tip which I obtained beforehand, or to recognize. When it gets the image of the finger, there are some recognition methods, but it is an optical reader with the CCD cameras recently to become mainstream. These are things used in a digital camera or a video camera, and a scan begins when I put a finger to the glass plate and I print the place that is gloomy to light up the upheaval of the fingerprint of the finger and a bright place clearly and can arrest you.
  • 4. 4. Capacitance Scanner The fingerprint scanner to grind like an optics scanner starts a mountain and the image of the valley to make a fingerprint. However, not print using the light for, the condenser scanner is going to catch the image of the fingerprint by canceling an electric current. The sensor consists of a semiconductor chip consisting of a large number of small aggregate, and I am very than one of the fingerprints one existing on a finger small, and the electric current recovering completely can thin them. A war becomes as a fingerprint the part by reading the voltage corresponding to each when the scanner recognizes a finger; distinguish it whether do not come true. I let the form of the fingerprint make ends meet as one piece of data by reading every data with sensor sequence.
  • 5. 5. Analysis I generally use the shape of various fingerprints as form to show by a movie or the TV program, but this is not the method that is practical when I compare the form of the fingerprint. Because I can let the shape see in the different form by comparing it even if I use the thing of the same form, I cannot completely compare it. In addition it is dangerous to use the data of the fingerprint by a comparison to make that I steal the shapes of the fingerprint preparation. Therefore many fingerprint authentication systems compare the specific characteristic part of the fingerprint. I authenticate a target fingerprint precisely by I concentrate on it, and confirming only a characteristic place parting to place that the line of the fingerprint begins, and is over, two.
  • 6. 6.Lots More Information Some methods that can check whom security system appoints in the user who admitted it exist. Most systems check security with "lasting thing" "things knowing". It is an identification of identification and is checked with passwords. However, I do not necessarily wear these and I forget it in some cases and may not wear it. However, a fingerprint authentication does not have it. This is because the human being cannot lose one of the human elements called the fingerprint. These stigmata imitate it and help it in security greatly because it is very difficult to forget it.