Downloads: 5 | Views: 263 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Information Technology | India | Volume 10 Issue 5, May 2021 | Popularity: 4.8 / 10
Android Notes using Finger Print Authentication
Vaibhav Garg, Siddharth Yadav, Rishabh Kamal
Abstract: Android devices apps are secured using various mechanisms like pattern, pin, and password. Finger print Authentication technology accepted by various android apps manufactures for better security and with change in technology. Android Fingerprint APIs are bringing user authentication to a whole new level, making it fast and secure. Unlocking an app with a single touch is one of the favourite features in android devices. This application uses the fingerprint technology for authentication in which capacitive fingerprint scanners generate an image of the ridges and valleys that make up a fingerprint. But instead of sensing the print using light, the capacitors use electrical current. The sensor is made up of one or more semiconductor chips containing an array of tiny cells and that helps in the security of the data stored in these apps.
Keywords: Android, Biometrics, Authentication, Security, Privacy, digital fingerprint processing, mobile integration, fingerprint recognition on Android platform
Edition: Volume 10 Issue 5, May 2021
Pages: 174 - 178
DOI: https://www.doi.org/10.21275/SR21405101230
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Information Technology, India, Volume 12 Issue 1, January 2023
Pages: 645 - 650Music Therapy Using EEG Brain Wave Signals
Aditya Narayanan B, Vishnu A, Yukan A S, M.R. Sumalatha, Nandakumar C
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 8 Issue 7, July 2019
Pages: 1902 - 1905Android - Based Disaster Recovery System: Leveraging Hardware Controls for Emergency Data Recovery and Communication
Diwakar Reddy Peddinti
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 1850 - 1857Securing Remote Work Environments in Telecom: Implementing Robust Cybersecurity Strategies to Secure Remote Workforce Environments in Telecom, Focusing on Data Protection and Secure Access Mechanisms
Jeevan Manda
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Information Technology, India, Volume 12 Issue 12, December 2023
Pages: 2114 - 2119Zero Knowledge Proof Techniques in PAM Authentication
Sri Kanth Mandru
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Information Technology, United States of America, Volume 11 Issue 8, August 2022
Pages: 1549 - 1559Cybersecurity in Microservices Architectures: Protecting Distributed Retail Applications in Cloud Environments
Yash Jani, Arth Jani, Dhaval Gogri