100% found this document useful (1 vote)
512 views11 pages

De Report 2

This document is a report on a biometric security system project submitted by a group of 3 students - Manali Jagdish Rathod, Khyati Rajesh Nagrani, and Binal Ranchhod Ghediya - at the Government Engineering College in Gandhinagar, Gujarat, India under the guidance of their professor T.B. Sheth. The report describes the reverse engineering and prototyping phases of the project, including canvases, maps, and diagrams produced during the analysis and ideation stages, with the goal of developing a biometric security system using fingerprint recognition.

Uploaded by

Khyati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
512 views11 pages

De Report 2

This document is a report on a biometric security system project submitted by a group of 3 students - Manali Jagdish Rathod, Khyati Rajesh Nagrani, and Binal Ranchhod Ghediya - at the Government Engineering College in Gandhinagar, Gujarat, India under the guidance of their professor T.B. Sheth. The report describes the reverse engineering and prototyping phases of the project, including canvases, maps, and diagrams produced during the analysis and ideation stages, with the goal of developing a biometric security system using fingerprint recognition.

Uploaded by

Khyati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

GUJARAT TECHNOLOGICAL UNIVERSITY

GOVERNMENT ENGINERRING COLLEGE, GANDHINAGAR


A Report On-

BIOMETRIC SECURITY SYSTEM

Under subject of

DESIGN ENGINEERING –1A

B. E. II, Semester – III

Electronics and Communication Branch

Submitted by:

Group:

Sr. Name of The Student: Enrolment No.


No.
1 Manali Jagdish Rathod 160130111052
2 Khyati Rajesh Nagrani 160130111044
3 Ghediya Binal Ranchhod 160130111027

Under the guidance of :

T. B. Sheth

Head of the Department

KISHORE MARADIYA

Academic Year

(2017-2018)
Group Members Description:
Manali Rathod (Leader):

She is very enthusiastic. She is very dedicated to what she does. She is also
approachable.

Khyati Rajesh Nagrani:

She is very hardworking. She is very communicative. That helps others to feel
comfortable to express new ideas.

Binal Ghediya:

Any work given to her will be done very accurately and she is hard working too.
Introduction:

Organizations today are realizing the advantages of using bio-metric security


devices for protecting work computers, server rooms as well as other business
assets. In a corporate environment, it is of utmost importance that unauthorized
individuals are not allowed to access secure systems and networks. Moreover,
due to compliance reasons it is necessary to ensure that work-flow processes are
followed correctly and only certain employees have access to specific files.
Passwords would not be a good choice as they can be shared among co-workers.
Instead, companies can use fingerprint biometrics to regulate access to a
computer or server room as it will only allow the person with a positive
fingerprint match.

Bio-metric Systems are automated methods of verifying or recognizing the


identity of a living person on the basis of some physiological characteristics,
like a fingerprint or face pattern, or some aspects of behavior, like handwriting
or keystroke patterns. Some of the most used bio-metric characteristics are
shown in the picture below. A bio-metric system based
on physiological characteristics is more reliable than one which
adopts behavioural features, even if the latter may be easier to integrate within
certain specific applications.
Biometrics are automated methods of recognizing a person based on a
physiological or behavioural characteristic. Among the features measured are;
face, fingerprint, hand geometry, iris, retinal, signature, and voice.

Biometric technologies are becoming the foundation of an extensive array of


highly secure identification and personal verification solutions. As the level of
security breaches and transaction fraud increases, the need for highly secure
identification and personal verification technologies is becoming apparent.

Biometric-based solutions are able to provide for confidential financial


transactions and personal data privacy. The need for biometrics can be found
in federal, state and local governments, in the military, and in commercial
applications. Enterprise-wide network security infrastructures, government
IDs, secure electronic banking, investing and other financial transactions, retail
sales, law enforcement, and health and social services are already benefiting
from these technologies.

Biometric-based authentication applications include workstation, network, and


domain access, single sign-on, application logon, data protection, remote
access to resources, transaction security and Web security.

Trust in these electronic transactions is essential to the healthy growth of the


global economy. Utilized alone or integrated with other technologies such as
smart cards, encryption keys and digital signatures, biometrics are set to
pervade nearly all aspects of the economy and our daily lives. Utilizing
biometrics for personal authentication is becoming convenient and
considerably more accurate than current methods (such as the utilization of
passwords or PINs).

This is because biometrics links the event to a particular individual (a password


or token may be used by someone other than the authorized user), is
convenient (nothing to carry or remember), accurate (it provides for positive
authentication), can provide an audit trail and is becoming socially acceptable
and inexpensive.

The security field uses three different types of authentication:

 Something you know — a password, PIN, or piece of personal


information
 Something you have — a card key, smart card, or token (like a
Secure ID card)
 Something you are — a biometric.

Phase I: Reverse Engineering:

Reverse Engineering, also called as Back Engineering, is the process of extracting knowledge
or design information from any man-made thing and then re-producing it by following the
Design Process. Thus from a user’s point-of-view, there may be a need to modify some
feature or to add some features. Change in manufacturing processes or change in standards
or availability of new materials or components or the requirements for a more robust
product may lead the team of students to change some aspects of the product. The process
often involves disassembling something and analyzing its components and working in detail.

Discussion of Canvas:

 AEIOU Canvas:

AEIOU design worksheet is an interrelated framework that guides designers in


thinking through a problem or scenario from a variety of perspectives: activities,
environments, interactions, objects and users. It is useful in organizing thoughts,
observations and ideas into distinct categories.

Our AEIOU canvas is shown as follows:


 Empathy Mapping :

An empathy map is a collaborative tool that is used to gain a deeper insight into their
customers. Much like a user persona, an empathy map can represent a group of
users. It can explain how our product can help them. It also shares stories of people
who haven’t used the product and also think of stories by which lives of users can
change by using this product.

Our Empathy Mapping is shown as follows:


 Ideation Canvas:

An ideation canvas is a rough worksheet here ideas can be stretched into any limits or
dimensions. Ideation is not aimed at finding solutions to the defined problem, But to define
the best possible problem and stretch out its possible scope.

Our Ideation canvas is shown as follows:


 Product Development Canvas:

A product development canvas is the ground where in the best possible ideas, after the
ideation, are pitched and nurtured to develop. It broadens our horizon. It explains the
purpose of our product.

Our Product Development canvas is shown as follows:


 Mind Map:

Mind map is a graphical technique for visualizing connections between several ideas or
pieces of information. Mind mapping is used in note taking, problem solving and project
planning.

Our Mind Map is as shown as follows


Phase II: Prototype:

This phase converts ones ideas into physical model to help you further think on his/her product..

Our Prototype is as shown as follows:

You might also like