473,396 Members | 1,972 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,396 software developers and data experts.

IBM USB Fingerprint reader to secure database access

1
I bought an IBM USB Fingerprint reader. I want to use it to authenticate a user for database access. When some one tries to access a database, his ID should be provided and then his fingerprint should be matched with an already stored fingerprint. I do not know how to configure the device. Searching the internet did not give me any useful resut. Anyone out there please help. I am doing the programming in php to access a database through the web.
thanks
Jun 8 '07 #1
4 4492
pbmods
5,821 Expert 4TB
Changed thread title to better describe the problem.
Jun 8 '07 #2
Hello everybody, i want to do the same as mlmn, i also have some ideas just need extra information, thanks in advance.
Mar 8 '09 #3
AmberJain
884 Expert 512MB
Hello,
@mlmn
I don't know the answer to your question. Also, I'm not a biometrics expert. But I am presently reading a book Security and Usability which has got some excellant stuff about biometrics. iirc then it has following text somewhere which is worth noting:

"Biometrics provides a false sense of security"

Don't use fingerprints to authenticate access to some resource, as fingers can be cut and some malicious user can then access your database (Here's a example).

AmbrNewlearner
Mar 8 '09 #4
JosAH
11,448 Expert 8TB
@ambrnewlearner
Really good fingerprint readers can also detect a heartbeat pulse; dead fingers don't show a pulse. Of course you can attach hoses and pumps that pump red coloured lemonade throught the veins of that dead finger but I think all that equipment warns security on the spot ;-)

kind regards,

Jos

ps. at least one of those Schlumberger devices apply that technology; I happen to know that.
Mar 9 '09 #5

Sign in to post your reply or Sign up for a free account.

Similar topics

2
by: lewixlabs | last post by:
Hello, I have to develop an application which use Microsoft Fingerprint Reader. This device can be handled like a scanner? So can i use a class inside Platform SDK or API? There are resources?...
23
by: Roel Melchers | last post by:
My ACCESS-database contains all members of my association. When the members attend to a meeting I want to record their presence. When they enter they identify themselves by putting their finger...
1
by: Roel Melchers | last post by:
How to connect my new bought fingerprint reader to my database. My fingerprint reader came with a SDK (Software Development Kit). With that SDK, it said, it is very easy to connect the reader to...
3
by: Javier Camacho | last post by:
Hi , We want to deploy a Microsoft Fingerprint solution in order to authenticate our ASP.NET applications. I want to know if exists a SDK to Microsoft FingerPrint Reader or if We have to use the...
1
by: James_patageul | last post by:
Hello people, I'm currently dev. a application under VB.NET and i would like to use the microsoft Fingerprint Reader for the login of this app. so i whant stock the information (from the reader)...
8
by: Jon Vaughan | last post by:
Has anyone had any exposure to a fingerprint SDK ? If so what did you use and how and how did you find it ? Thanks
6
by: Martin Adhie | last post by:
Hi Guys, I start to learn C++, because I got win API which interating with Fingerprint reader from Authentec, it comes with SDK and program samples. I just want to create application where by...
0
by: durumdara | last post by:
Hi! I have an application (Python + wx) somewhere. The users use they fingerprint to log. But we have a problem that in this time the fingerprint logon is do REAL windows logon, so every user...
0
by: kingowusuadomako | last post by:
I have gotten the Griaule fingerprint java sdk to work with digitalPersona fingerprint device. my problem is locating the database where the fingerprint images are stored.i want to access the...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.