Passface a new authentication Technology
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
nit_cal
Active In SP
**

Posts: 237
Joined: Oct 2009
#1
29-10-2009, 02:18 PM


System Analysis
Problem Definition Identity verification is arguably the most important and certainly the most fundamental of IT security requirements: nearly all other functions in this field (such as access control, data confidentiality, digital signatures etc.) rely for their successful operation on some part of the system being able to confirm a person's identity. Unfortunately, in practice, proof of identity is consistently the weakest link in the security chain: the vast majority of Systems today still rely on passwords or PINs - in spite of their well-known shortcomings. The primary reason for this continued reliance on passwords has been an absence of practical alternatives. 1.2 Purpose of the System The main purpose of the system is to perform the crucial task of user authentication with consistent high- level of security, usability and reliability for all users. The user does not have to remember long sequence of strings or characters or number to login. The system employs (photographs of) faces as its "alphabet" and requires only familiarization and recognition on the part of the user. Secondly the systems provide efficient training for a new user .The system also assigns new set of pass faces to a new user

.pdf   Passface a new authentication Technology.pdf (Size: 510.62 KB / Downloads: 122)
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Graphical Password Authentication using Cued Click Points (CCP) project topics 14 13,391 31-10-2016, 02:06 PM
Last Post: Dhanabhagya
  Finding a New Approach to Measure the Operational Value of Intelligence for Military seminar flower 66 1,618 30-11-2015, 05:43 PM
Last Post: Guest
  intel centrino mobile technology ppt jaseelati 0 282 05-01-2015, 04:49 PM
Last Post: jaseelati
  MABS: Multicast Authentication Based on Batch Signature seminar class 20 12,346 03-07-2014, 06:19 PM
Last Post: Guest
  ThreeDimensional Password for More Secure Authentication pdf project girl 1 736 11-05-2014, 09:43 PM
Last Post: 1pradeep1
  SILENT SOUND TECHNOLOGY seminar poster 0 532 29-10-2013, 03:00 PM
Last Post: seminar poster
  Graphical Password authentication system seminar poster 0 610 29-10-2013, 12:05 PM
Last Post: seminar poster
  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering report seminar projects maker 0 469 28-09-2013, 04:36 PM
Last Post: seminar projects maker
  Optical Camouflage Using Retro-reflective Projection Technology pdf seminar projects maker 0 349 19-09-2013, 04:25 PM
Last Post: seminar projects maker
  A NEW LOSSLESS METHOD OF IMAGE COMPRESSION AND DECOMPRESSION USING HUFFMAN CODING project girl 1 1,140 17-09-2013, 04:01 PM
Last Post: Guest