CrazyEngineers
Howdy guest!
Dear guest, you must be logged-in to participate on CrazyEngineers. We would love to have you as a member of our community. Consider creating an account or login.
Replies
  • Kaustubh Katdare

    AdministratorJan 8, 2009

    Again, how about sharing your progress? Or your project is still lingering in the 'ideation' stage?

    *boy! I talk like an MBA*
    Are you sure? This action cannot be undone.
    Cancel
  • Ashraf HZ

    MemberJan 8, 2009

    Ideation? rofl! Why can't "idea" be used on it's own?

    I think, with regards to the fingerprint system, is to make a sort of block diagram linking different parts of the system. That would make things clearer for yourself 😀
    Are you sure? This action cannot be undone.
    Cancel
  • Lock-Os

    MemberJan 8, 2009

    Hm, interesting idea. We could use some more background information though on the device and it's use. If you need help thinking about all the compents involved, try to think about the flow of information as well as the different functions that are required.
    Are you sure? This action cannot be undone.
    Cancel
  • Ashraf HZ

    MemberJan 8, 2009

    Ya know, they are tricky stuff. We had a lab which required fingerprint authentication, and it took so many retries for the system to record a valid fingerprint to put in the database. After some annoyances, the system was put offline and the old key and padlock was used 😛

    I had a glance at one of the FYP titles on offer at my campus. It was a hand geometry authentication system. Instead of the fingerprints, it was the shape of the hand that would authenticate a person. The shape would be scanned, rotated (if hand was placed at a different angle), and correlated with a database by matching specific points on the geometry of the hand. I think that would have a more success rate in detection. Maybe 😉
    Are you sure? This action cannot be undone.
    Cancel
  • Lock-Os

    MemberJan 8, 2009

    Well, the other thing about the fingerprint is the oil on the skin messing up the reading as well. Of course, even a tiny paper cut would throw it off as well.

    Maybe you could use height as a biometric input along with an ID card, that way, it's kind of a double security system. It wouldn't be to hard to measure that, and by using the ID card, you match that person's height to the information on the ID card You could also put some basic sensors to tell if a person is squatting or using a box to adjust height, although that advanced tech might be a bit too much.
    Are you sure? This action cannot be undone.
    Cancel
  • Ashraf HZ

    MemberJan 8, 2009

    I think you're on to something. Perhaps we can perform multiple authentication simultaneously.. so in addition with biometric, ID and height, we can add voice too. It's not that hard. So, a "pass" might require at least 3 out of 4 authentication methods. At least we don't have to truly rely on one.

    The key is to make it easy for the user to perform the tests at the same time.
    Are you sure? This action cannot be undone.
    Cancel
  • Lankythekid

    MemberOct 3, 2009

    Curious did this project ever come to a completion..? and i do like the idea of including multiple authentication procedures for security!

    "Again, how about sharing your progress? Or your project is still lingering in the 'ideation' stage?

    *boy! I talk like an MBA*"

    LOLL!
    Are you sure? This action cannot be undone.
    Cancel
  • Manish Goyal

    MemberOct 3, 2009

    hey krithika ...for your information
    currently this system is working in Lovely University,Punjab,India
    Are you sure? This action cannot be undone.
    Cancel
Home Channels Search Login Register