0% found this document useful (0 votes)
29 views9 pages

Se 2 Case Study

The document outlines a case study for designing biometric authentication software, focusing on secure authentication methods such as fingerprint and facial recognition. It details the design process, quality attributes, architectural design, and component-level design, supported by various diagrams including context, use case, and data flow diagrams. The evaluation of the design ensures it meets security, usability, and fault tolerance requirements.

Uploaded by

mhatremanthan21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views9 pages

Se 2 Case Study

The document outlines a case study for designing biometric authentication software, focusing on secure authentication methods such as fingerprint and facial recognition. It details the design process, quality attributes, architectural design, and component-level design, supported by various diagrams including context, use case, and data flow diagrams. The evaluation of the design ensures it meets security, usability, and fault tolerance requirements.

Uploaded by

mhatremanthan21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Name-Manthan Mhatre

TE-IT
Roll No- 33

Case Study: Design of Biometric Authentication Software


1. Introduction
• Purpose: Secure authentication using biometrics (fingerprint, iris, face
recognition, etc.)
• Scope: Enrollment, storage, verification, and authentication process.

2. Design Process & Quality


 Discuss quality attributes: security, accuracy, reliability, performance, scalability. 
Diagram:
o Context Diagram → System interaction with User, Scanner Device,
Authentication Server, Database.
3. Design Concepts
 Abstraction, modularity, patterns, and information hiding. 
Diagram:
o Use Case Diagram-
4. The Design Model / Pattern-based Software Design
 MVC (Model-View-Controller) or layered design for system. 
Diagrams:
o Class Diagram → Classes like User, BiometricScanner,
FeatureExtractor, Matcher, Database.
o Sequence Diagram → Flow of user authentication (User →

Capture → Processing → Match → Result).

5. Architectural Design
 Define system layers: Presentation, Application, Biometric Engine, Database. 
Diagrams:
o Architecture Diagram → High-level modules and their connections.
o Component Diagram → Components like Capture Module, Feature Extraction
Module, Matching Engine, Database.

o
Deployment Diagram → Shows devices: Scanner, Local PC, Cloud Authentication Server,
Database Server.
6. Views, Patterns & Application Architecture
 Different viewpoints:
o Logical View: Class structure o Process View: Sequence/Activity flows o
Deployment View: Physical system deployment  Diagrams:
o Activity Diagram → Enrollment process vs Authentication process.
o State Diagram → Authentication states (Idle → Capture → Processing →
Match/Fail).

7. Component-Level Design
 Internal details of modules. 
Diagrams:
o Detailed Component Diagram → Show subcomponents of Feature
Extraction and Matching.

o CRC Cards (optional textual representation).

8. Steps & Analysis


 Data flow, data storage, and process analysis. 
Diagrams:
o Data Flow Diagram (DFD) → From user biometric input to authentication output.
o ER Diagram → Tables for User, BiometricTemplate, AuthenticationLog.
9. Design Evaluation
• Check against requirements: Security, fault tolerance, usability.
• Ensure diagrams and models align with non-functional requirements.

You might also like