PRATYUG-"The Total Security System"
نویسندگان
چکیده
" The innocent are always the first to suffer ". This is an often used proverb. In our quest to make them strong we have devised a total hack proof system for the communication process. In our mission the hackers are not the hunters but the prey. So we introduce a new security system called the bio scanning and sensing security system. Centralized computers are employed as the database storage systems in the network security process. The systems input signals are sent by the biometric sensors that are being programmed for sensing the retina and fingerprints of the human body .The process is carried out in three phases of authentication and identification.1)PFP SENSING 2)FAREN-EYE TESTING and 3)KEY-SPEED TECHNIQUE. The encryption and decryption process of the message or the information uses the sequential authentication-identification methods of the above phases, the bio-signal inputs acts as a shield cover for the message and can be accessed only if the input signals matches with those in the database with respect to the public key given i.e. the logical AND output is 1 and it is transmitted to the service requester.. The user's systems are always online with the centralized database system server for transmitting and receiving the input and outputs which is nothing but accepting or denying the access of the private sector of a person's information. Thus we reveal a new leak proof network security system which proves to be a real un-hackable network security. Thus it provides a permanent protection from the hacking community.
منابع مشابه
A New Framework for Reactive Power Market Considering Power System Security
This paper presents a new framework for the day-ahead reactive power market based on the uniform auction price. Voltage stability and security have been considered in the proposed framework. Total Payment Function (TPF) is suggested as the objective function of the Optimal Power Flow (OPF) used to clear the reactive power market. Overload, voltage drop and voltage stability margin (VSM) are inc...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملStatic Security Constrained Generation Scheduling Using Sensitivity Characteristics of Neural Network
This paper proposes a novel approach for generation scheduling using sensitivitycharacteristic of a Security Analyzer Neural Network (SANN) for improving static securityof power system. In this paper, the potential overloading at the post contingency steadystateassociated with each line outage is proposed as a security index which is used forevaluation and enhancement of system static security....
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کامل