This paper is published in Volume-5, Issue-2, 2019
Area
Computer Engineering
Author
Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh
Org/Univ
AISSMS Polytechnic, Pune, Maharashtra, India
Keywords
Algorithms, Security, Authentication, Ridges, Valleys, Authorization, Database
Citations
IEEE
Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh. Use of housing society, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh (2019). Use of housing society. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh. "Use of housing society." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh. Use of housing society, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh (2019). Use of housing society. International Journal of Advance Research, Ideas and Innovations in Technology, 5(2) www.IJARIIT.com.
MLA
Sanket Vikas Sagare, Zishan Usman Baig, Niranjan Bapuso kadam, Faique Shaikh. "Use of housing society." International Journal of Advance Research, Ideas and Innovations in Technology 5.2 (2019). www.IJARIIT.com.
Abstract
Over the last few years, we have observed a focus on engineering science has been established whose products are likely to create a large market in the near future. It has been known ''Housing Society". First, a user must be registered in the system so that his password can be identified. This impression is securely stored in a central database or a smart card given to the user. The impression is fetched when an individual needs to be verified. Depending on the information, a software system can operate either in a verification (authentication) or a recognition mode.