SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
How Fingerprint Scanners Work
Name:Ryo Obata

No:s1150052

1. Introduction to How Fingerprint Scanners Work
  Without dozens of years are going to pass after the fingerprint
authentication function came to be equipped with by a computer,
however being used only at a place handling high information
technology for the dozens of years; of the generalization was not
done.
  However, during these past several years, as for the fingerprint
authentication function, it came to be supposed at every place.
The high technique called this fingerprint authentication is used
at the many places including the lock function of the keyboard of a
police station and the PC or the apartment and provides safe
security for our life.
2. Fingerprint Basics
  The human lasting fingerprint is one of the strange things. I
have the identification card which can completely prove one
oneself who the human being is made accidentally, and cursed it
on a finger-tip. These are the existence that I had on a finger by a
specific reason.
  I give an order to a fetus growing by genetic code of DNA, and
the human body changes it into the figure which makes the
human being the human being. However, a fingerprint is
completely a random element and is the strange existence that I
do not resemble closely even if I meet by the relations that the
blood leads to.
3. Optical Scanner
  A fingerprint scanner function includes two basic work. It is a
function I agree with the form of the finger-tip as a pattern from
the image that got it being necessary to obtain a fingerprint
beforehand and the form of the finger-tip which I obtained
beforehand, or to recognize.
  When it gets the image of the finger, there are some recognition
methods, but it is an optical reader with the CCD cameras
recently to become mainstream. These are things used in a digital
camera or a video camera, and a scan begins when I put a finger
to the glass plate and I print the place that is gloomy to light up
the upheaval of the fingerprint of the finger and a bright place
clearly and can arrest you.
4. Capacitance Scanner
 The fingerprint scanner to grind like an optics scanner starts a
mountain and the image of the valley to make a fingerprint.
However, not print using the light for, the condenser scanner is
going to catch the image of the fingerprint by canceling an electric
current. The sensor consists of a semiconductor chip consisting of
a large number of small aggregate, and I am very than one of the
fingerprints one existing on a finger small, and the electric
current recovering completely can thin them.
  A war becomes as a fingerprint the part by reading the voltage
corresponding to each when the scanner recognizes a finger;
distinguish it whether do not come true. I let the form of the
fingerprint make ends meet as one piece of data by reading every
data with sensor sequence.
5. Analysis
   I generally use the shape of various fingerprints as form to
show by a movie or the TV program, but this is not the method
that is practical when I compare the form of the fingerprint.
Because I can let the shape see in the different form by comparing
it even if I use the thing of the same form, I cannot completely
compare it. In addition it is dangerous to use the data of the
fingerprint by a comparison to make that I steal the shapes of the
fingerprint preparation.
  Therefore many fingerprint authentication systems compare the
specific characteristic part of the fingerprint. I authenticate a
target fingerprint precisely by I concentrate on it, and confirming
only a characteristic place parting to place that the line of the
fingerprint begins, and is over, two.
6.Lots More Information

  Some methods that can check whom security system appoints in
the user who admitted it exist. Most systems check security with
"lasting thing" "things knowing". It is an identification of
identification and is checked with passwords. However, I do not
necessarily wear these and I forget it in some cases and may not
wear it.
  However, a fingerprint authentication does not have it. This is
because the human being cannot lose one of the human elements
called the fingerprint. These stigmata imitate it and help it in
security greatly because it is very difficult to forget it.

Mais conteúdo relacionado

Mais procurados

Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its applicationArnab Podder
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense TechnologyJawhar Ali
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Secugen Hamster Plus Fingerprint Reader
Secugen Hamster Plus Fingerprint ReaderSecugen Hamster Plus Fingerprint Reader
Secugen Hamster Plus Fingerprint ReaderAlvin Gom
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2Haruki0428
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners WorkShota Suzuki
 

Mais procurados (10)

Graphics
GraphicsGraphics
Graphics
 
Report on Finger print sensor and its application
Report on Finger print sensor and its applicationReport on Finger print sensor and its application
Report on Finger print sensor and its application
 
Sw week12-b
Sw week12-bSw week12-b
Sw week12-b
 
powerpoint presentation on sixth sense Technology
powerpoint presentation  on sixth sense Technologypowerpoint presentation  on sixth sense Technology
powerpoint presentation on sixth sense Technology
 
Eigo1 1
Eigo1 1Eigo1 1
Eigo1 1
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Secugen Hamster Plus Fingerprint Reader
Secugen Hamster Plus Fingerprint ReaderSecugen Hamster Plus Fingerprint Reader
Secugen Hamster Plus Fingerprint Reader
 
Week 12 slide_2
Week 12 slide_2Week 12 slide_2
Week 12 slide_2
 
Smart quill
Smart quillSmart quill
Smart quill
 
How Fingerprint Scanners Work
How Fingerprint Scanners WorkHow Fingerprint Scanners Work
How Fingerprint Scanners Work
 

Destaque

The nightmare before christmas
The nightmare before christmasThe nightmare before christmas
The nightmare before christmasMichelleSoiffer99
 
SW2-homework10
SW2-homework10SW2-homework10
SW2-homework10RyoObata
 
S1150052_week9
S1150052_week9S1150052_week9
S1150052_week9RyoObata
 
Meaning of Pollution Maps - for Friends in Japan
Meaning of Pollution Maps - for Friends in JapanMeaning of Pollution Maps - for Friends in Japan
Meaning of Pollution Maps - for Friends in Japanhahatoko_blogspot_com
 

Destaque (8)

The nightmare before christmas
The nightmare before christmasThe nightmare before christmas
The nightmare before christmas
 
SW2-homework10
SW2-homework10SW2-homework10
SW2-homework10
 
English
EnglishEnglish
English
 
sw10-hw
sw10-hwsw10-hw
sw10-hw
 
Nightmare before christmas
Nightmare before christmasNightmare before christmas
Nightmare before christmas
 
sw-hw12
sw-hw12sw-hw12
sw-hw12
 
S1150052_week9
S1150052_week9S1150052_week9
S1150052_week9
 
Meaning of Pollution Maps - for Friends in Japan
Meaning of Pollution Maps - for Friends in JapanMeaning of Pollution Maps - for Friends in Japan
Meaning of Pollution Maps - for Friends in Japan
 

Semelhante a sw11-hw

assignment
assignmentassignment
assignments1190098
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Presentation michael(1)
Presentation michael(1)Presentation michael(1)
Presentation michael(1)aizunoinu
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behs1190106
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comwww.mairsturnstile.com
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics applicationDivya Shah
 

Semelhante a sw11-hw (20)

Roy
RoyRoy
Roy
 
assignment
assignmentassignment
assignment
 
assignment
assignmentassignment
assignment
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Week12
  Week12  Week12
Week12
 
Presentation michael(1)
Presentation michael(1)Presentation michael(1)
Presentation michael(1)
 
Biometrics
BiometricsBiometrics
Biometrics
 
Week12
Week12Week12
Week12
 
Week12
Week12Week12
Week12
 
In this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_behIn this article_we_ll_examine_the_secrets_beh
In this article_we_ll_examine_the_secrets_beh
 
Kadai2
Kadai2Kadai2
Kadai2
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Roy b2
Roy b2Roy b2
Roy b2
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.comFingerprint turnstile - Mairsturnstile.com
Fingerprint turnstile - Mairsturnstile.com
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics application
Biometrics applicationBiometrics application
Biometrics application
 

Último

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 

Último (20)

Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 

sw11-hw

  • 1. How Fingerprint Scanners Work Name:Ryo Obata No:s1150052 1. Introduction to How Fingerprint Scanners Work Without dozens of years are going to pass after the fingerprint authentication function came to be equipped with by a computer, however being used only at a place handling high information technology for the dozens of years; of the generalization was not done. However, during these past several years, as for the fingerprint authentication function, it came to be supposed at every place. The high technique called this fingerprint authentication is used at the many places including the lock function of the keyboard of a police station and the PC or the apartment and provides safe security for our life.
  • 2. 2. Fingerprint Basics The human lasting fingerprint is one of the strange things. I have the identification card which can completely prove one oneself who the human being is made accidentally, and cursed it on a finger-tip. These are the existence that I had on a finger by a specific reason. I give an order to a fetus growing by genetic code of DNA, and the human body changes it into the figure which makes the human being the human being. However, a fingerprint is completely a random element and is the strange existence that I do not resemble closely even if I meet by the relations that the blood leads to.
  • 3. 3. Optical Scanner A fingerprint scanner function includes two basic work. It is a function I agree with the form of the finger-tip as a pattern from the image that got it being necessary to obtain a fingerprint beforehand and the form of the finger-tip which I obtained beforehand, or to recognize. When it gets the image of the finger, there are some recognition methods, but it is an optical reader with the CCD cameras recently to become mainstream. These are things used in a digital camera or a video camera, and a scan begins when I put a finger to the glass plate and I print the place that is gloomy to light up the upheaval of the fingerprint of the finger and a bright place clearly and can arrest you.
  • 4. 4. Capacitance Scanner The fingerprint scanner to grind like an optics scanner starts a mountain and the image of the valley to make a fingerprint. However, not print using the light for, the condenser scanner is going to catch the image of the fingerprint by canceling an electric current. The sensor consists of a semiconductor chip consisting of a large number of small aggregate, and I am very than one of the fingerprints one existing on a finger small, and the electric current recovering completely can thin them. A war becomes as a fingerprint the part by reading the voltage corresponding to each when the scanner recognizes a finger; distinguish it whether do not come true. I let the form of the fingerprint make ends meet as one piece of data by reading every data with sensor sequence.
  • 5. 5. Analysis I generally use the shape of various fingerprints as form to show by a movie or the TV program, but this is not the method that is practical when I compare the form of the fingerprint. Because I can let the shape see in the different form by comparing it even if I use the thing of the same form, I cannot completely compare it. In addition it is dangerous to use the data of the fingerprint by a comparison to make that I steal the shapes of the fingerprint preparation. Therefore many fingerprint authentication systems compare the specific characteristic part of the fingerprint. I authenticate a target fingerprint precisely by I concentrate on it, and confirming only a characteristic place parting to place that the line of the fingerprint begins, and is over, two.
  • 6. 6.Lots More Information Some methods that can check whom security system appoints in the user who admitted it exist. Most systems check security with "lasting thing" "things knowing". It is an identification of identification and is checked with passwords. However, I do not necessarily wear these and I forget it in some cases and may not wear it. However, a fingerprint authentication does not have it. This is because the human being cannot lose one of the human elements called the fingerprint. These stigmata imitate it and help it in security greatly because it is very difficult to forget it.