0% found this document useful (0 votes)
54 views

Table of Contents

The document contains a table of contents and list of figures for a paper on password authentication. It discusses earlier work, textual passwords, numerical passwords, biometric passwords, and the proposed system's methodology and demonstrations.

Uploaded by

shasmhank2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

Table of Contents

The document contains a table of contents and list of figures for a paper on password authentication. It discusses earlier work, textual passwords, numerical passwords, biometric passwords, and the proposed system's methodology and demonstrations.

Uploaded by

shasmhank2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

TABLE OF CONTENTS

Abstract i
Acknowledgement ii
Table of Contents iii
List of Figures iv

Chapter No Title Page No


Introduction 1
1.1 Scope of Work 1
1.2 Objective 1
1 1.3 Research 1
1.3.1 Earlier Work 1
1.3.2 Present Evolution 1
Literature Survey 2
2.1 Password 2
2.1.1 Textual Passwords 2
2 2.1.2 Numerical Passwords 3
2.1.3 Biometric Passwords 3
2.2 Present System 4
2.3 Proposed System 5
Methodology 6
3.1 Implementation 6
3.1.1 Problem Statement 6
3 3.1.2 Working Mechanism 7
3.1.3 Application 7
3.2 Demonstration 7
3.2.1 Virtual Demonstration 7
3.2.2 Physical Demonstration 10
Conclusion 14
Reference 15

iii
LIST OF FIGURES
Fig. No Figure Name Page No.
2.1 Alphanumeric Password 2
2.2 Set of 4 Digit Passcodes 3
2.3 Digitizing a Fingerprint Impression 3
2.4 Classification of Biometrics 4
2.5 Pick Pocket Scenarios in Public Spots 5
3.1 Featuring a 2D Transaction at POS Terminal 6
3.2 Level 1 Scrutiny of Mail ID 8
3.3 Sign-in options available for the Test Case PC 8
3.4 Prompt to scroll the Finger across the Reader 9
3.5 White LED beside the Fingerprint Reader blinking 9
to show it was Successful
3.6 Screen Depicting Successful Login 10
3.7 Use Case Diagram for Bank Transaction Instance 10
3.8 Inserting a Debit Card 11
3.9 Choosing Fingerprint Mode of Choice 11
3.10 Prompt to verify the UID 11
3.11 Requesting for Fingerprint recognition 11
3.12 Fingerprint Recognition in Progress 12
3.13 Entering the Withdrawal Amount 12
3.14 System Processing the Transaction 13
3.15 Cash is Dispensed by the ATM 13

iv

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy