Vous êtes sur la page 1sur 28

A

Seminar Report
ON

Palm Vein Technology


Submitted in partial fulfillment for the third year of
Electronics & Telecommunication Engineering

Presented by

Siddiqui Naveed Shahbaz (TE ECT)


Sayed Kamran Hussain (TE ECT)

Department of ECT
MGM’s College of Engineering
Near Airport, Nanded - 431602, India
2010-11
CERTIFICATE
This is to certify that the implant training
seminar entitled “PALM VEIN TECHNOLOGY” is
a bonafide record of the seminar done by
Siddiqui Naveed Shahbaz (TE ECT)
Sayed Kamran Hussain (TE ECT)

under my supervision and guidance, in partial


fulfillment of the requirements the final year of
Computer science & Engineering from MGM’s College of
Engineering Nanded for the year 2010-11

Dr. Mrs.G. S. Lathkar, Dr.Mrs.A.M.Rajurkar


Professor & Head
Director, Department of CS and
MGM’s College of Engineering Engineering

Date:
Place:
ACKNOWLEDGEMENT

I take this opportunity to express my gratitude towards Mr.Ateeq Mirza Software


Engineer of OCTAWARE Tech. for his constant support and guidance. He was a constant
source of motivation and inspiration. Without his efforts the training and seminar could not
have taken final phase.

I would like to thank Dr. Mrs. A.M. Rajurkar for her cordial support and all those
respondents who have co-operated and provided valuable information to complete this
seminar and this report.

Lastly I would like to extend my gratitude to all my friends, who have extended the
support and helped me to complete seminar report.

Siddiqui Naveed Shahbaz (TE ECT)


Sayed Kamran Hussain (TE ECT)
ABSTRACT
In the ubiquitous network society, where
individuals can easily access their information anytime and anywhere, people
are also faced with the risk that others can easily access the same information
anytime and anywhere. Because of this risk, personal identification technology,
which can distinguish between registered legitimate users and imposters, is
now generating interest.
Currently, passwords, Personal Identification Numbers (4-digit
PIN numbers) or identification cards are used for personal identification.
However, cards can be stolen, and passwords and numbers can be guessed or
forgotten. To solve these problems, biometric authentication technology, which
identifies people by their unique biological information, is attracting attention.
In biometric authentication, an account holder’s body characteristics or
behaviors (habits) are registered in a database and then compared with others
who may try to access that account to see if the attempt is legitimate.
Fujitsu has researched and developed biometric authentication
technology focusing on four methods: fingerprints, faces, voiceprints, and palm
veins. Among these, because of its high accuracy, contact less palm vein
authentication technology is being incorporated into various financial solution
products for use in public places.
The Palm Secure sensor developed by Fujitsu is a biometric
authentication solution offering optimum levels of security. Palm Secure detects
the structure of the pattern of veins on the palm of the human hand with the
utmost precision.

Siddiqui Naveed Shahbaz (TE ECT)


Sayed Kamran Hussain (TE ECT )
CONTENTS

Chapter No TITLE Page no.

1 Palm vein Technology 1


1.1 Introduction 1
1.2 Biometric Security Technology 1

2 DOT NET 3
1.1 Introduction 3
1.2 Flavours of .NET 3
1.3 Features of .NET 5

3 ASP.NET 8
2.1 Introduction 8
2.2 ASP.NET Form Controls 8

2.3 Validations Controls 9

2.4 Cookies 10

2.5 AJAX (Asynchronous JavaScript & XML)


12

4 SQL SERVER 2008 13


3.1 Introduction 13
3.2 T-SQL 13
3.3 Stored Procedure 15
3.4 Managing database 17

5 CONCLUSION 20
REFERNECES 21
1
CHAPTER 1
Palm vein Technology
1 .1 Introduction
In the ubiquitous network society, where individuals can easily access their
information anytime and anywhere, people are also faced with the risk that others can easily
access the same information anytime and anywhere. Because of this risk, personal
identification technology, which can distinguish between registered legitimate users and
imposters, is now generating interest.

Currently, passwords, Personal Identification Numbers (4-digit PIN numbers) or


identification cards are used for personal identification. However, cards can be stolen, and
passwords and numbers can be guessed or forgotten. To solve these problems, biometric
authentication technology, which identifies people by their unique biological information, is
attracting attention. In biometric authentication, an account holder’s body characteristics or
behaviors (habits) are registered in a database and then compared with others who may try to
access that account to see if the attempt is legitimate.

Fujitsu has researched and developed biometric authentication technology focusing on four
methods: fingerprints, faces, voiceprints, and palm veins. Among these, because of its high
accuracy, contact less palm vein authentication technology is being incorporated into various
financial solution products for use in public places.

The Palm Secure sensor developed by Fujitsu is a biometric authentication solution


offering optimum levels of security. Palm Secure detects the structure of the pattern of veins
on the palm of the human hand with the utmost precision
1.2 Biometric Security Technology
Authentication plays a very critical role in security-related applications like e-commerce.
There are a number of methods and techniques for accomplishing this key process. In this
regard, biometrics is gaining increasing attention these days. Security systems, having
realized the value of biometrics, use biometrics for two basic purposes: to verify or identify
users. There are a number of biometrics and different applications need different biometrics.

1.2.1 What is Biometric

Biometric is the most secure and convenient authentication tool. It can not be
borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure
individual's unique physical or behavioral characteristics to recognize or authenticate their
identity. Common physical biometrics include fingerprints, hand or palm geometry, retina,
iris, and facial characteristics. Behavioral characters characteristics include signature, voice,
keystroke pattern, and gait. Of this class of biometrics, technologies for signature and voice
are the most developed.

1.2.2 Biometric Technologies

Octaware has the finest expertise that takes to 'deliver' according to the
budgets and schedules. The experience and skills combined with good planning and an on-
time delivery will guarantee successful applications for your business. Every customer
regardless of its business size is a large customer for us. We take every customer seriously
and try to make it our 'Showcase' site. We measure the requirements, scope and the
innovation of the client's business. Our solutions are tailored to meet the needs of your
business.

2
1.2.3 ERP (Enterprise Resource Planning)
An Enterprise Resource Planning implementation is the need of today's
technology and business areas. ERP solutions help in automating the business activities and
speed up the transactions across the organizations. Octaware is aware of the need of the hour,
and therefore has arranged services for providing efficient and customized ERP solutions
implementation.

1.2.4 CRM (Customer Relationship Management)


The CRM solutions implemented by Octaware provide organizations
with an effective means to increase customer loyalty and profitability. At Octaware, we assist
organizations, across domains, in implementing, customizing & integrating CRM systems
with your existing processes. Our CRM solutions enable organizations to better understand
and analyze customer needs and behaviours in order to develop and maintain long lasting
relationships with customers. The CRM solutions developed by Octaware are designed to
reduce costs and increase profitability by building customer loyalty. A detailed study and
analysis of clients' requirements and their business processes, by our CRM consultants,
enable us to tailor our solutions in a manner so as to provide them with the best possible
solution.
3
CHAPTER 2
DOT NET

2.1 Introduction
In the July 2000, Microsoft announced a whole new software
development framework for Windows called .NET in the Professional Developer
Conference (PDC).Microsoft also released PDC version of the software for the
developers to test. After initial testing and feedback Beta 1 of .NET was
announced. Beta 1 of the .NET itself got lot of attention from the developer
community. When Microsoft announced Beta 2, it incorporated many changes
suggested by the community and internals into the software. The overall ‘Beta’
phase lasted for more than 1 ½ years. Finally, in March 2002 Microsoft released
final version of the .NET framework. One thing to be noted here is the change in
approach of Microsoft while releasing this new platform. Unlike other software
where generally only a handful people are involved in beta testing, .NET was
thrown open to community for testing in it’s every pre-release version. This is one
of the reasons why it created so many waves of excitement within the community
and industry as well. Microsoft has put in great efforts in this new platform. In
fact Microsoft says that its future depends on success of .NET. The development
of .NET is such an important event that Microsoft considers it equivalent to
transition from DOS to Windows. All the future development – including new and
version upgrades of existing products – will revolve around .NET. So, if you want
to be at the forefront of Microsoft Technologies, you should be knowing .NET!

2.2 Flavours of .NET


2.2.1 Application Development
When you hear the name .NET, it gives a feeling that it is
something to do only with internet or networked applications. Even though it is
true that NET provides solid foundation for developing such applications it is
possible to create many other types of applications. Following list will give you an
idea about various types of application that we can develop on .NET.
4
1. ASP.NET Web applications: These include dynamic and data driven browser
based applications.
2. Windows Form based applications: These refer to traditional rich client
applications.
3. Console applications: These refer to traditional DOS kind of applications like
batch scripts.
4. Component Libraries: This refers to components that typically encapsulate
some business logic.
5. Windows Custom Controls: As with traditional ActiveX controls, you can
develop your own windows controls.
6. Web Custom Controls: The concept of custom controls can be extended to web
applications allowing code reuse and modularization.
7. Web services: They are “web callable” functionality available via industry
standards like HTTP, XML and SOAP.
8. Windows Services: They refer to applications that run as services in the
background. They can be configured to start automatically when the system boots
up.

2.2.2 Software Development Kit (SDK)

You can develop such varied types of applications. That’s fine. But
how? As with most of the programming languages, .NET has a complete Software
Development Kit (SDK) - more commonly referred to as .NET Framework SDK -
that provides classes, interfaces and language compilers necessary to program
for .NET. Additionally it contains excellent documentation and Quick Start
tutorials that help you learn .NET technologies with ease. Good news is that -
.NET Framework SDK is available FREE of cost. You can download it from the
MSDN web site. This means that if you have machine with .NET Framework
installed and a text editor such as Notepad then you can start developing for .NET
right now!

2.2.3 Development Tools


If you are developing applications that require speedy
delivery to your customers and features like integration with some version control
software
5
then simple Notepad may not serve your purpose. In such cases you require some
Integrated Development Environment (IDE) that allows for Rapid Action
Development (RAD). The new Visual Studio.NET is such an IDE. VS.NET is a
powerful and flexible IDE that makes developing .NET applications a breeze.
Some of the features of VS.NET that make you more productive are:
- Drag and Drop design
- IntelliSense features
- Syntax highlighting and auto-syntax checking
- Excellent debugging tools
- Integration with version control software such as Visual Source Safe (VSS)
- Easy project management
Note that when you install Visual Studio.NET, .NET Framework is automatically
installed on the machine.

2.3 Features of .NET


2.3.1 Rich Functionality out of the box
.NET framework provides a rich set of functionality out of
the box. It contains hundreds of classes that provide variety of functionality ready
to use in your applications. This means that as a developer you need not go into
low level details of many operations such as file IO, network communication and
so on.

2.3.2 Easy development of web applications


ASP.NET is a technology available on .NET platform
for developing dynamic and data driven web applications. ASP.NET provides an
event driven programming model (similar to Visual Basic 6 that simplify
development of web pages (now called as web forms) with complex user
interface. ASP.NET server controls provide advanced user interface elements (like
calendar and grids) that save lot of coding from programmer’s side.
6
2.3.2 OOPs Support
The advantages of Object Oriented programming are well known.
.NET provides a fully object oriented environment. The philosophy of .NET is –
“Object is mother of all.” Languages like Visual Basic.NET now support many of
the OO features that were lacking traditionally. Even primitive types like integer
and characters can be treated as objects something not available even in OO
languages like C++.

2.3.3 Multi-Language Support


Generally enterprises have varying skill sets. For example,
a company might have people with skills in Visual Basic, C++, and Java etc. It is
an experience that whenever a new language or environment is invented existing
skills are outdated. This naturally increases cost of training and learning curve.
.NET provides something attractive in this area. It supports multiple languages.
This means that if you have skills in C++, you need not throw them but just mould
them to suit .NET environment. Currently four languages are available right out of
the box namely – Visual Basic.NET, C# (pronounced as C-sharp), Jscript.NET
and Managed C++ (a dialect of Visual C++).

2.3.4 Security
Windows platform was always criticized for poor security
mechanisms. Microsoft has taken great efforts to make .NET platform safe and
secure for enterprise applications. Features such as type safety, code access
security and role based authentication make overall application more robust and
secure.

2.3.5 Strong XML support


Now days it is hard to find a programmer who is unaware
of XML. XML has gained such a strong industry support that almost all the
vendors have released some kind of upgrades or patches to their existing software

7
to make it “XML compatible”. Currently, .NET is the only platform that has built
with XML right into the core framework. .NET tries to harness power of XML in
every possible way. In addition to providing support for manipulating and
transforming XML documents,.NET provides XML web services that are based
on standards like HTTP, XML and SOAP.
8
CHAPTER 3
ASP.NET

3.1 Introduction:
ASP.NET is a platform for developing Web-based applications.
It lets you create sophisticated Web applications that can interact with users. For
example, ASP.NET applications can use data-entry controls (such as text boxes
and buttons) to accept input data from a user; process, retrieve, or update database
data; and send the results of these operations back to the user.

3.2 ASP.NET Form Controls:


Table gives the various asp.net controls that can be used in the web forms to
handle the input of the user.

Control Description Web Form Code Example

Button A button that you can use to <input type=button runat=server>


respond to Click

Reset Button Resets all other HTML form <input type=reset runat=server>
elements

Submit Button Automatically POSTs the <input type=submit runat=server>


form data.

Text Field Gives the user an input area <input type=text runat=server>
on an HTML form

Text Area Used for multi-line input on <input type=textarea


an HTML form runat=server>

Password An input characters typed <input type=password


Field into this field are displayed runat=server>
as asterisks

CheckBox Gives the user a check box <input type=checkbox


that they can select or clear runat=server>
Radio Button Used two or more to a form, <input type=radio runat=server>
and allows the user to
choose one of the controls

Table Allows you to present <table runat=server></table>


information in a tabular
format

Image Displays an image on an <img src="FileName"


HTML form runat=server>

ListBox Displays a list of items to <select size=2 runat=server


the user. ></select>

Dropdown Displays a list of items to <select><option></option></sele


the user, but only one item ct>
at a time will appear.

3.2 ASP.NET Validations Controls:


3.2.1 Required Field Validate:
Allows you to check a control on the form to see if it is
filled in with anything. If it isn't, the Error Message that you set will be displayed
in this control.
Code:
<asp:RequiredFieldValidator id=RequiredFieldValidator1 runat="server"
ErrorMessage="RequiredFieldValidator">
</asp:RequiredFieldValidator>

3.2.2 Compare Validator:


Allows you to check the contents of one control against the
contents of another control on the form to see if they match. If they don't, the
ErrorMessage that you set will be displayed into this control.
Code:
<asp:CompareValidator id=CompareValidator1 runat="server"
ErrorMessage="CompareValidator">
</asp:CompareValidator>

10
3.2.3 Range Validator:
Allows you to check to see whether the value you entered
in a control is within a specified range. If it isn't, the ErrorMessage that you set
will be displayed into this control.
Code:
<asp:RangeValidator id=RangeValidator1 runat="server"
ErrorMessage="RangeValidator">
</asp:RangeValidator>

3.2.4 Regular Expression Validator

Allows you to check to see if a control's contents match the


input mask (regular expression) you defined. If it doesn't, the ErrorMessage that
you set will be displayed into this control.
Code:
<asp:RegularExpressionValidator id=RegularExpressionValidator1 runat="server"
ErrorMessage="RegularExpressionValidator">
</asp:RegularExpressionValidator>

3.2.5 Custom Validator

Allows you to specify either a server-side or client-side


script function to validate the contents of a particular control. You must return a
True or False value from these functions. If a True value is returned, processing
continues; if a False value is returned, the ErrorMessage specified for this control
is displayed.
Code:
<asp:CustomValidator id=CustomValidator1 runat="server"
ErrorMessage="CustomValidator">
</asp:CustomValidator>

3.3 Cookies
A Cookie is a small text file that the browser creates and
stores on the hard drive of your machine. Cookie is just one or more pieces of
information stored as text strings. A Web server sends you a cookie and the
browser stores it. The browser then returns the cookie to the server the next time
the page is referenced. The most common use of a cookie is to store information
11
about the user and preferences the user makes. For example, assume you like
DVD's and register with Ebay to participate in online auctions. You are required
to fill out a form with your name, credit card details and address. Ebay assigns
you an ID, stores your information with that ID in its database on the server, and
sends the ID to your browser as a cookie. Your browser stores the ID on your hard
disk. The next time you go to Ebay, the ID is sent back to the server. The server
looks you up by your ID and customizes the Web page it sends back to you. The
page might say, "Cheap rates on your favorite DVD's".
12

3.3 AJAX (Asynchronous JavaScript & XML)


Instead of the traditional web application model where the
browser itself is responsible for initiating requests to, and processing requests
from, the web server, the Ajax model provides an intermediate layer — what
Garrett calls an Ajax engine — to handle this communication. An Ajax engine is
really just a JavaScript object or function that is called whenever information
needs to be requested from the server. Instead of the traditional model of
providing a link to another resource (such as another web page), each link makes a
call to the Ajax engine, which schedules and executes the request. The request is
done asynchronously, meaning that code execution doesn't wait for a response
before continuing.
The server, which traditionally would serve up HTML,
images, CSS, or JavaScript, is configured to return data that the Ajax engine can
use. This data can be plain text, XML, or any other data format that you may need.
The only requirement is that the Ajax engine can understand and interpret the data
When the Ajax engine receives the server response, it goes
into action, often parsing the data and making several changes to the user interface
based on the information it was provided. Because this process involves
transferring less information than the traditional web application model, user
interface updates are faster, and the user is able to do his or her work more
quickly. Figure 1-1 is an adaptation of the figure in Garrett's article, displaying the
difference between the traditional and Ajax web application models.
13
CHAPTER 4
SQL Server 2008

4.1 Introduction:
Microsoft SQL Server is a Relational Database Management
System (RDBMS) designed to run on platforms ranging from laptops to large
multiprocessor servers. SQL Server is commonly used as the backend system for
websites and corporate CRMs and can support thousands of concurrent users.SQL
Server comes with a number of tools to help you with your database
administration and programming tasks.
SQL Server is much more robust and scalable than a desktop
database management system such as Microsoft Access. Anyone who has ever
tried using Access as a backend to a website will probably be familiar with the
errors that were generated when too many users tried to access the database!
Although SQL Server can also be run as a desktop database system, it is most
commonly used as a server database system.

4.2 T-SQL (Transact SQL):


Transact-SQL is central to using SQL Server. All
applications that communicate with an instance of SQL Server do so by sending
Transact-SQL statements to the server, regardless of the user interface of the
application.

4.2.1 To create a database


1. In a Query Editor window, type but do not execute the following code:
CREATE DATABASE TestData
GO
2. Use the pointer to select the words CREATE DATABASE, and then press F1.
The CREATE DATABASE topic in SQL Server Books Online should open. You

14
can use this technique to find the complete syntax for CREATE DATABASE and
for the other statements that are used in this tutorial.
3. In Query Editor, press F5 to execute the statement and create a database named
TestData.

4.2.2 To create a Table


To create a table, you must provide a name for the table, and
the names and data types of each column in the table. It is also a good practice to
indicate whether null values are allowed in each column.
Most tables have a primary key, made up of one or more columns of the table. A
primary key is always unique. The Database Engine will enforce the restriction
that any primary key value cannot be repeated in the table.
CODE:
CREATE TABLE dbo.Products (ProductID int PRIMARY KEY NOT NULL,
ProductName varchar(25) NOT NULL,
Price money NULL,ProductDescription text NULL)
GO

4.2.3 Adding constraints


Where ensuring data integrity is not the responsibility of the
programs that use your database, but rather the responsibility of the database
itself. If you think about it, this is really cool. Data is inserted, updated, and
deleted from the database by many sources. Even in stand-alone applications
(situations where only one program accesses the database) the same table may be
accessed from many different places in the program. It doesn’t stop there though.
Your database administrator (that might mean you if you’re a dual role kind of
person) may be altering data occasionally to deal with problems that arise. In more
complex scenarios, you can actually run into situations where literally hundreds of
different access paths exist for altering just one piece of data, let alone your entire
database. Moving the responsibility for data integrity into the database itself has
been revolutionary to database management. There are still many different things
that can go wrong when you are attempting to insert data into your database, but
15
your database is now proactive rather than reactive to problems. Many problems
with what programs allow into the database are now caught much earlier in the
development process because, although the client program allowed the data
through, the database knows to reject it. How does it do it? Primarily with
constraints (datatype and triggers
are among the other worker bees of data integrity). Well let’s take a look.
A constraint is a restriction. Placed at either column or table level, a constraint
ensures that your data meets certain data integrity rules.
❑ PRIMARY KEY constraints
❑ FOREIGN KEY constraints
❑ UNIQUE constraints (also known as alternate keys)
❑ CHECK constraints
❑ DEFAULT constraints
❑ Rules
❑ Defaults (similar to, yet different from, DEFAULT constraints)

4.3 Stored Procedures


Stored procedures are an important aspect in all
database programs. VB.NET applications are no exceptions to this rule. Stored
procedures enable users change the business logic without actually tinkering with
the application. SQL Server 2005's (formerly code named Yukon) integration with
the .NET CLR makes it possible for developers to author stored procedures,
triggers, user defined functions, and create other database objects using a managed
language such as VB.NET. This excellent feature provides a number of benefits,
including increased productivity, significant performance gains, and the ability to
leverage the features of .NET Code Access Security to prevent assemblies from
performing certain operations.

4.3.1 Creating a Stored Procedure


Stored procedures for SQL Server 2005 databases can now be written in managed
code. SQL Stored procedures can be created by adding Stored Procedure items to
16
SQL Server projects. Once the stored procedure created in managed code, is
deployed it can be executed like any other stored procedure. Let us understand this
process by working on an example.
1. Create a new Project and
2. Choose Windows application.
3. In the solution explorer right click and add new item.
4. Choose Stored Procedure in the dialog box.
5. Replace the code with the one given below:

The stored procedure has been created. But what does it do? Press F5 to execute
the procedure and look at the output.
4.3.2 Passing Parameters in Stored Procedures
Parameters allow you to create flexible SQL routines that use values provided at
run time. Because the parameters can be changed each time the procedure runs,
users should avoid creating one SQL routine for each value that has to be
matched. For example, in a Microsoft SQL Server database, we can add a
@ProductCategoryID parameter to a stored procedure that searches the
Production.productCategory table for Product category name. We can then run the
stored procedure each time we want to specify a different ProductCategoryID.
When parameters are used in stored procedures or user defined functions it will:

Return a status value to another SQL routine to indicate success or failure and the
reason for the failure.
Pass parameter values to other functions or stored procedures.

4.3.3 The @@IDENTITY Variable


@@IDENTITY is a Global Variable used in SQL Sever. The value of this global
@@Identity variable is set to the value of the identity chosen for the row inserted
after performing an insert into a table with a column that is an identity. In cases
where multiple rows are inserted, the last value will be set.
insert into t (datavalue) values ('hello')
print @@Identity
17

4.4 Managing Databases


It is sometimes required to move the database from one
system to another or we wanted to take the backup of the various data to avoid the
data loss due to the system failures. A SQL server database consist of the various
components such as functions, stored procedures and triggers related to that
database. Also there are several other things related to the database and we cannot
copy them easily. So to have the reliability and consistency in the database we can
take the database backups and restore it on same system or some remote system as
per our requirement.

4.4.1 Making Backups of Database


To take the backup of the database we will require the following steps
1. Right click on the database, select task and then backup from pop up menu

2 .Then following window will appear, select database from the drop down menu
and then specify the path of the database backup file.
18
3. After clicking the OK button the backup will be created as a .bak file into
the hard disk and you can use that to restore the database whenever
required.

4.4.1 Restoring of Database:


To restore the database to its original condition we will require
specifying the .bak file. Following are the steps involved.
1. Right click on the databases and select the Restore Database from popup
2. Specify the .bak file by browsing the disk

19
3. Select the backup to restore

4. Now the database is restored as shown in figure


20

Conclusion

.Net is a great software development tool that can be used to create


several types of applications with ease. It provides the programmer or
software developer many handy tools and easy handling of code. The
basic use of .NET is for the Web based internet or intranet
applications. If anyone wants to be the forefront of the Microsoft then
he must know the .Net platform.
21

REFERNCES

Books
1. ASP.NET 3.0 by Wrox (Page No.322,455)
2. SQL Server 2008 by Wrox (Page No.112-122)
3. OCTAWARE Trainee Guide
Web Urls
4. [http://www.wikipedia.org/sqlserver.html]
5. [http://www.msdn.microsoft.com.html]

Vous aimerez peut-être aussi