Preview

Embedded System

Powerful Essays
Open Document
Open Document
2930 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Embedded System
EMBEDDED SYSTEM PRESENTED BY,
G.GURU RAJ,
EEE, 3rd year,
g.gururaj2812@gmail.com.
ARUN RAJ,
EEE, 3rd year,

M.KUMARASAMY COLLEGE OF ENGINEERING.

KARUR

EXTENDED SECURITY FOR BANKING SECTOR USING

EMBEDDED SYSTEM

The world of today has high become a place with very high security but there are hackers (code breakers) and thieves who are trying to bring down this security system. So we need keep updating our security system. Here one of the system which is presently in function could be more secured using Biometrics and Embedded System. In this paper we have used the biometrics (finger print recognition) for security purpose and embedded system to automate the complete process. There many methods in providing security using biometrics we have gone for the finger print recognition. In embedded system we have gone for PIC micro controller (PIC16F877). Here our project is helping the banking sector to safe keep the credit cards so called the plastic money, ATM cards and the bank lockers. We have taken into consideration all factors that affect the security of the present system in those sectors and have given an updated version of security for them .

The biometrics have been used as the lock in providing security and the embedded system has been interface that connect the user and the automated system. We hope to give an better security for the society which needs to be a secured place live for us. We believe that our idea provides better security than the existing system.
EXTENDED SECURITY FOR BANKING SECTOR USING

EMBEDDED SYSTEM

WHAT IS EMBEDDED SYSTEM? As the name signifies, an embedded system is defined as the system into which the user’s logic or ideas are embedded. Embedded systems include a variety of hardware and software components, which perform

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4577 Words
    • 19 Pages

    When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database. The biometric feature must have the following characteristics:-(a) Universality, which means that every person should have the characteristic,(b) Uniqueness, two persons should not have the same term or measurement of Characteristic.(c) Permanence, the characteristic should be invariant with time.(d) Measurability, the characteristic can be quantified that is the origin of the Cameras used in biometric systems are generally either CCD (charge couple device) or CMOS(combined metal oxide semiconductor) image sensors. CCD is comparatively more costly than…

    • 4577 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    Home and occupational users alike are using biometric security. Through a biometric element, such as a fingerprint, devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Abstract: This article designated that DSP TMS320VC5416 takes the fingerprint signal the processor, using its assembly line code operating feature, and unifies the fingerprint recognition technology, uses in the burglar-proof door the design, realizes can distinguish master's bur…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    Home and business users alike are using biometric security. Through a biometric identifier, such as a fingerprint, biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    SSRN id2512567

    • 13967 Words
    • 62 Pages

    Chandra, A., and T. G. Calderon. 2003. Toward a biometric security layer in accounting systems.…

    • 13967 Words
    • 62 Pages
    Good Essays
  • Good Essays

    Biometrics is a unique and effective security technology that authenticates a person’s identity by verifying personal characteristics. Biometric devices grant users access to programs, systems, or rooms by analyzing some biometric identifier, such as a fingerprint or eye pattern. Two commonly used types of biometric security devices are fingerprint readers and iris recognition systems.…

    • 264 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Embedded System

    • 1779 Words
    • 8 Pages

    The above words aren’t the headlines of the newspaper but daily news everyone come across whenever we go through a newspaper or watching TV news. A person’s life is precious and meaningful to his loved ones. We, as responsible engineers felt a part of society to bring a system to avoid these mishaps. With the meteoric Embedded Systems along with microprocessor our designed system in preventing deaths and providing safe guided measures.…

    • 1779 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    In partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Engineering, this feasibility study entitled “Automatic Door Lock System Using Biometrics and MCU” has been prepared by Algene Frias, Jester Mallari and Von William Opelanio.…

    • 2972 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    This paper process an atm insecurity model that would combine a physical access card, apin and electronic facial recognition…

    • 1267 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Nowadays a lot of security devices were introduced like alarms, codes detectors, and biometric systems that we can use but biometrics system is the most effective and is the highest level of security system in our generation. Biometrics system refers to an automated system that can identify an individual by measuring their physical and behavioral uniqueness or patterns, and comparing it to those on record. It can identify fingerprints, face, iris, palm prints, signature, DNA, or retinas of an individual for easy and convenient verification ( www.ex-sight.com ). This system was first used by the Chinese in 14th century where merchants used children’s palm and footprints to distinguish them from one another.…

    • 336 Words
    • 2 Pages
    Good Essays

Related Topics