29-10-2009, 02:18 PM
System Analysis
Problem Definition Identity verification is arguably the most important and certainly the most fundamental of IT security requirements: nearly all other functions in this field (such as access control, data confidentiality, digital signatures etc.) rely for their successful operation on some part of the system being able to confirm a person's identity. Unfortunately, in practice, proof of identity is consistently the weakest page link in the security chain: the vast majority of Systems today still rely on passwords or PINs - in spite of their well-known shortcomings. The primary reason for this continued reliance on passwords has been an absence of practical alternatives. 1.2 Purpose of the System The main purpose of the system is to perform the crucial task of user authentication with consistent high- level of security, usability and reliability for all users. The user does not have to remember long sequence of strings or characters or number to login. The system employs (photographs of) faces as its "alphabet" and requires only familiarization and recognition on the part of the user. Secondly the systems provide efficient training for a new user .The system also assigns new set of pass faces to a new user
[attachment=237]