Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ENCAPSULATED NETWORKING
THE ’SORRY’SURVEY
MINIATURING BIOMETRICS
ADVANTAGES
THE CREAM OF OUR DREAM:
• This presentation deals with the service oriented dream of making technology reach out to society
•This algorithm also governs the full measure of ration rights to the fellow citizens through design of automated system
•Our main purpose through is for the bellow poverty line people to get their full measure of their ration duties
•We thrive to achieve this by means of a high network security concentrated over .here in this system by overcoming massive threats
such as fake thumb impressions, ration theft ,etc.,
• the design of a brand new algorithm that is designed in such a manner that over the vendor is clueless of how the code is accessed
A SORRY SURVEY:
•Survey revealed that out of a total of 182 families that we spoke to,142 families did not receives a single grain of
wheat during
month of June
•Out of a total of 4650 kgs of wheat supposed to have been distributed to the people, only595kgs had actually been
received by people
•Out of total of 1820 kgs of rice supposed to have been distributed as per daily sales registered, only 110 kgs was
received by a people
• the system encompasses authentication without passwords (performing either bar code reading or finger print
reading),a plotting technique
to avoid fake thumb impressions, integrating security proccessing,introduction of verification chamber that analysis
three categories(above
poverty line(APL), bellow poverty line(BPL) and antyodaya)which allows right rendered to a right citizen.
•To distort the influence of reputed corrupters, a brand new algorithm is design in such a manner that even the is clueless
of hoe to code is
accessed.
•JavaScript implementations and hardware checking has been done for the analysis of encryption and decryption
techniques. the system's
the system’s usage is as easy as falling off a log and has to bar for the illiterates.
• the details of the distribution are installed into the main system which is available in all the distribution networks
security by ENCAPTULATED IPSEC TECNOLOGY
• whenever the initial access is made the code corresponding to the user’s finger prints are set as default for the first time and saved
by the system more than one similar fingerprint are denied by the system
•The algorithm has been designed such that the three keys n,d,e &any msg converted into a cipher text can only accessed by n,d&n,e
key
•An outstanding feature of the system is that account manager or the software installer is unknown of the methods used access
another user code
•This has been established separated the code and assign to the value n,c,d, where c represented by cipher code
•The cipher code is converted by real code by using the keys n,d into which the user accounts is made
•Real code account manager cannot access another user accounts "we maintain automation such that machine maintain secrets”
•We find this a suitable methods to get rid of the most respected & reputed corrupted
INTEGRATING SECURITY SYSTEM PROCESSING:
• A high performance network-security processing IC will provided the necessary form factor and cost to be integrated into
enterprises communication equipment and access equipment
•The integration of symmetric data encryption and asymmetric tunnel –negotiation algorithms on a single device provides a
flexible solution.
•New devices with build –in flexible processing, combined with key management software ,will enable thousands of tunnels
to be set up and torn down on the fly
•A new class of network security processor optimized for the needs of the networks provided the mandatory performance and
flexible architecture
•CRASH that is now being design demands a security processing solution that is programmable,scaleable,and high
performance
• however if your at a loss for a random sequence considered a FIBBONACCI sequence ,using DWORD’s like encryption key as “seed”numbers.and possibly a
3rd DWORD as an ‘XOR’mask .
int i1;
dw1={seed#1};
dw2={seed#2};
dwmask= {seed#3};
for(i1=0;i1<256;i1++)
dw3=(dw1+dw2)^dwmask;
aRandom[i1]=dw3;
dw1=dw2;
dw2=dw3;
}
• if you wanted to generated a list of random sequence numbers, let's say between zero’s and the total number of random numbers in the
list/
if (**pp1<**pp2)
return(-1);
else if (**pp1>*pp2)
return(1);
return(0);
}
………
int i1;
int aResult[256];
for(i1=0;i1<256;i1++)
{
spRandom[i1]=aRandom+i1;
//now sort it
Qsort(apRandom,256,sizeof(*apRandom),MySortproc);
for(i1=0;i1<256;i1++)
aResult[i1]=(int)(apRandom[i1]-aRandom);
The result in ‘aResult’ should be a randomly sorted array of integers with values between 0 and
255,inclusive
IMPLEMENTATION OF SECURITY ALGORITHM IN JAVASCRIPT:
import java.math.BigInteger:
import java.security.SecureRandom
Class Rsa
{
private BigInteger n,d,e;
n=p.multiply(q);
e=new BigInteger(“3”);
While(m.god(e).intvalue()>1)e=e.add(new BigInteger(“2”));
d=e.modInverse(m);
}
Public bigInteger decrypt(BigInteger message)
{
return message.modpow(e,n);
}
Public BigInteger decrypt(BigInteger message)
{
Return message.modpow(d,n);
}
MINIATURING BIOMETRICS
• A fingerprint is made up of a pattern of ridges and furrows as well as characteristics that occur at miniature point
•Fingerprint scanning essentially provides an identification of a person based on the acquisition & recognition of those unique &
fingerprint
•
• this system comprise of a sensor for scanning a fingerprint and processor which stores fingerprint database&softwarewhich is
matches to the predefined database.
•Within database a fingerprint usually matches to a reference number & pin number which matches person name & account
•In instances of security matches is generally used to allow or disallow access, but today this can also be used for something as
simple as a time clock or payroll access
ADVANTAGES:
low cost
Easy to transparent