Ravi Ranjan Kumar
Interested In A Challenging Technical Track Career In Java Development Environment.
-
-
Bangalore, Karnataka, India - Core Java, J2EE Developer, MySql
Ravi Bangalore से बाहर है और CS-Computer Science, BE BTech-Bachelor of Engineering or Technology वर्ष 2012-2016 से RNSIT-RNS Institute of Technology, Visvesvaraya Technological University का अध्ययन किया है।
Ravi Ranjan Kumar Core Java, J2EE Developer, MySql और अन्य प्रतिभाओं में प्रतिभाशाली है
Celstream technologies pvt ltd
पूरा समय
जुलाई-2016 तक वर्तमान
(8 वर्षों 8 महीने)
जिम्मेदारियों
» 1 परियोजना
Student at RNSIT-RNS Institute of Technology
मार्च-2016 to जून-2016
Session management in distributed Internet services is traditionally based on username and password, explicit logouts and
mechanisms of user session expiration using classic timeouts. Emerging biometric solutions allow substituting username and
password with biometric data during session establishment, but in such an approach still a single verification is deemed sufficient, and
the identity of a user is considered immutable during the entire session. Additionally, the length of the session timeout may impact on
the usability of the service and consequent client satisfaction. This paper explores promising alternatives offered by applying biometrics
in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. The
protocol determines adaptive timeouts based on the quality, frequency and type of biometric data transparently acquired from the user.
mechanisms of user session expiration using classic timeouts. Emerging biometric solutions allow substituting username and
password with biometric data during session establishment, but in such an approach still a single verification is deemed sufficient, and
the identity of a user is considered immutable during the entire session. Additionally, the length of the session timeout may impact on
the usability of the service and consequent client satisfaction. This paper explores promising alternatives offered by applying biometrics
in the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. The
protocol determines adaptive timeouts based on the quality, frequency and type of biometric data transparently acquired from the user.
RNS Institute of TechnologyVisvesvaraya Technological University
2012-2016
| स्कोर 70%