933 resultados para Fingure Print Authentication
Resumo:
In the last years there was an exponential growth in the offering of Web-enabled distance courses and in the number of enrolments in corporate and higher education using this modality. However, the lack of efficient mechanisms that assures user authentication in this sort of environment, in the system login as well as throughout his session, has been pointed out as a serious deficiency. Some studies have been led about possible biometric applications for web authentication. However, password based authentication still prevails. With the popularization of biometric enabled devices and resultant fall of prices for the collection of biometric traits, biometrics is reconsidered as a secure remote authentication form for web applications. In this work, the face recognition accuracy, captured on-line by a webcam in Internet environment, is investigated, simulating the natural interaction of a person in the context of a distance course environment. Partial results show that this technique can be successfully applied to confirm the presence of users throughout the course attendance in an educational distance course. An efficient client/server architecture is also proposed. © 2009 Springer Berlin Heidelberg.
Resumo:
Cryptographic systems are safe. However, the management of cryptographic keys of these systems is a tough task. They are usually protected by the use of password-based authentication mechanisms, which is a weak link on conventional cryptographic systems, as the passwords can be easily copied or stolen. The usage of a biometric approach for releasing the keys is an alternative to the password-based mechanisms. But just like passwords, we need mechanisms to keep the biometrical signal safe. One approach for such mechanism is to use biometrical key cryptography. The cryptographic systems based on the use of biometric characteristics as keys are called biometrical cryptographic systems. This article presents the implementation of Fuzzy Vault, a biometrical cryptographic system written in Java, along with its performance evaluation. Fuzzy Vault was tested on a real application using smartcards.
Resumo:
OBJECTIVE: To analyze discourses on workplace psychological harassment in print media. METHODOLOGICAL PROCEDURES: Documental study on workplace psychological harassment that analyzed news stories published in three major newspapers of the State of Sao Paulo (southeastern Brazil) between 1990 and 2008. Discourse analysis was performed to identify discursive practices that reflect the phenomenon of psychological harassment in today's society, explanations for its occurrence and impact on workers' health. RESULT ANALYSIS: This theme emerged in the media through the dissemination of books, academic research production and laws. It was initially published in general news then in jobs and/or business sections. Discourses on compensation and precautionary business practices and coping strategies are widespread. Health-related aspects are foregone under the prevailing money-based rationale. Corporate cultures are permissive regarding psychological harassment and conflicts are escalated while working to achieve goals and results. Indifference, embarrassment, ridicule and demean were common in the news stories analyzed. CONCLUSIONS: The causal explanations of workplace harassment tend to have a psychological interpretation with emphasis on individual and behavioral characteristics, and minimizing a collective approach. The discourses analyzed trivialized harassment by creating caricatures of the actors involved. People apprehend its psychological content and stigmatization which contributes to making workplace harassment an accepted practice and trivializing work-related violence.
Resumo:
In questa tesi si andrà a presentare la realizzazione di un sistema che permette di autenticare la sim di un cellulare, quindi di verificare che un determinato numero di telefono sia realmente nelle mani dell'utente, attraverso servizi di messaggistica online come WhatsApp o Telegram. Il bisogno di questo progetto nasce dal fatto che molte delle attuali applicazioni presenti sul mercato utilizzano sms per autenticare la reale appartenenza di un numero telefonico ad un determinato utente, ma questo comporta un notevole dispendio di soldi, dato che per inviare un gran numero di sms, bisogna sottoscrivere un abbonamento a servizi Gateway Sms che permettono di inviare sms ad un determinato numero dopo aver ricevuto i relativi dati dal mittente.
Resumo:
A new fragile logo watermarking scheme is proposed for public authentication and integrity verification of images. The security of the proposed block-wise scheme relies on a public encryption algorithm and a hash function. The encoding and decoding methods can provide public detection capabilities even in the absence of the image indices and the original logos. Furthermore, the detector automatically authenticates input images and extracts possible multiple logos and image indices, which can be used not only to localise tampered regions, but also to identify the original source of images used to generate counterfeit images. Results are reported to illustrate the effectiveness of the proposed method.
Resumo:
Pacific States National Print Biennial University of Hawaii, Hilo Dec 2012-April 2013
Resumo:
Over the past several years, a number of design approaches in wireless mesh networks have been introduced to support the deployment of wireless mesh networks (WMNs). We introduce a novel wireless mesh architecture that supports authentication and authorisation functionalities, giving the possibility of a seamless WMN integration into the home's organization authentication and authorisation infrastructure. First, we introduce a novel authentication and authorisation mechanism for wireless mesh nodes. The mechanism is designed upon an existing federated access control approach, i.e. the AAI infrastructure that is using just the credentials at the user's home organization in a federation. Second, we demonstrate how authentication and authorisation for end users is implemented by using an existing web-based captive portal approach. Finally, we observe the difference between the two and explain in detail the process flow of authorized access to network resources in wireless mesh networks. The goal of our wireless mesh architecture is to enable easy broadband network access to researchers at remote locations, giving them additional advantage of a secure access to their measurements, irrespective of their location. It also provides an important basis for the real-life deployment of wireless mesh networks for the support of environmental research.
Resumo:
Clinical efficacy of aerosol therapy in premature newborns depends on the efficiency of delivery of aerosolized drug to the bronchial tree. To study the influence of various anatomical, physical, and physiological factors on aerosol delivery in preterm newborns, it is crucial to have appropriate in vitro models, which are currently not available. We therefore constructed the premature infant nose throat-model (PrINT-Model), an upper airway model corresponding to a premature infant of 32-wk gestational age by three-dimensional (3D) reconstruction of a three-planar magnetic resonance imaging scan and subsequent 3D-printing. Validation was realized by visual comparison and comparison of total airway volume. To study the feasibility of measuring aerosol deposition, budesonide was aerosolized through the cast and lung dose was expressed as percentage of nominal dose. The airway volumes of the initial magnetic resonance imaging and validation computed tomography scan showed a relative deviation of 0.94%. Lung dose at low flow (1 L/min) was 61.84% and 9.00% at high flow (10 L/min), p < 0.0001. 3D-reconstruction provided an anatomically accurate surrogate of the upper airways of a 32-wk-old premature infant, making the model suitable for future in vitro testing.