9. Unique VIN for each vehicle.
Etched on all important
parts.
VIN etched parts help in
easy identification of stolen
cars.
10. Most common method.
Most visually effective device.
Makes a loud noise and
notifies everyone nearby.
Best used in combination with
a hood lock.
11. Shuts down engine’s electrical
system when activated.
Usually hidden from burglars view.
Sometimes deactivated by a series
of actions rather than a switch.
12. Most expensive and most
effective method.
Activated when a theft is
reported.
Stolen vehicle position tracked
using GPS.
Inbuilt in Audi, GM, Volkswagen
etc.
13. Introduction
Fingerprint which go into deciding your genetic
make-up has a unique design.
A Fingerprint scanner reads the pattern of ridges
and valleys on fingers.
A fingerprint scanner is to discriminate someone in
both crime investigation and security.
14. Optical Scanner
o Optical scanning is way to get a image of
a finger and to determine whether the
pattern of ridges and valleys.
o Optical scanning and capacitance
scanning is a charge coupled device
(CCD) ; it is simply an array of light-
sensitive diodes.
15. Capacitance Scanner
o A simple capacitive sensor is made up of
one or more semiconductor chips
containing an array of tiny cells ; tiny cells
include two conductor plates.
o To scan the finger shorts each amplifier’s
input and output to balance the integrator
circuit.
16. Working
• Conductor plates, insulating layer and
finger surface acts as a capacitor.
• Capacitor in a cell under a ridge has
greater capacitance than under a valley.
• This difference is converted to voltages.
• The scanner processor reads this voltage
to determine whether it’s a ridge or a valley.
• By combining the data from each cell an
overall picture of the fingerprint is obtained.
17. Analysis
o Minutiae - concentrate on points where ridge lines end
or where one ridge splits into two (bifurcations).
o The scanner system software uses highly complex
algorithms to recognize and to measure the relative
positions of minutiae.
18. Advantages
Physical attributes are much harder to fake than identity cards.
You can't guess a fingerprint pattern like you can guess a password.
You can't misplace your fingerprints, like you can misplace an access
card.
Small storage space required for the biometric template, reducing the
size of the database memory required.
19. Disadvantages
Optical scanners can be fooled by pictures.
Capacitive scanner are vulnerable to finger shaped
mold.
Cut off the owner’s finger in a worst-case scenario.
If fingerprint is stolen, it is irreplaceable and cannot be
used again, unlike Passwords.
20. CVKP-BG04
Made by Chinavasion.
A complete system that has
A fingerprint ignition lock,
Dual band GSM (900/1800)
messaging system, and
Standard car alarm system.
Sends a text message alert instantly
in case of forced entry.
21. Text commands can be send to disable
certain functions (like cut-off fuel supply) or
receive status message (in motion or
parked).
Fingerprint scanner can be installed in any
location, even hidden from common view.
Sensitivity can be adjusted in case of bad
weather conditions.
22. Fingerprint authentication in conjunction with other factors
can help in reducing auto theft. Fingerprint authentication
comes under biometrics and is a way fingerprints are
compared and matched. Fingerprint authentication has
many uses as in security purposes.
The process is simple, as in put your finger down. Trusted,
as in had stood the test of time. Fingerprints have been
used for identification for over 100 years. They are the
standard without question. In addition to signatures,
fingerprints are the only other form of identification that
have legal standing in our country.