authentication
DESCRIPTION
nama saya nur farhanum binti abdul aziz bin abdul rahmanTRANSCRIPT
Farhanum And Ashmira
4 ICT
Puan Marziean Bt Mohd
Shapian
DEFINATION OF
AUTHENTICATIONS
Identifications present what the user has (e.g. smart card)
Identification present what the user is (e.g. biometric)
Access granted
Access denied
Verificati-on verify
the validity of
the ID
Authentif-ication
authentic-ate who
the user is
BIOMETRIC DEVICES
A device that translates personal characteristics into a digital code that is compared with a digital
code stored in the database
CALLBACK SYSTEM
Refers to the checking system
that authntications the user
FACTORS AND IDENTITY
The ways in which someone may be authenticated fall
into three categories, based on what are known as the factors of authentication:
something the user knows, something the user has, and something the user is. Each authentication factor covers a range of elements used to
authenticate or verify a person's identity prior to
being granted access, approving a transaction
request, signing a document or other work product,
granting authority to others, and establishing a chain of
authority.
The
factors
and some
of
elements
of each
factor
the ownership factors: Something the user has. Eg: wrist band, ID card, security
token, software token, phone or cell phone
the knowledge factors: Something the user knows. Eg : a password, pass phrase, or
personal identification number (PIN), challenge response (the user must
answer a question),
the inherence factors: Something the user is or does. Eg : fingerprint, retinal
pattern, DNA sequence, signature, face, voice, unique bio-electric signals, or
other biometric identifier.
Facial Recognition Facial recognition analyses the
characteristics of an individual’s face images
captured through a digital video camera.
Facial recognition is widely used, touted as a
fantastic system for recognitioin potential
threats.
Fingerprint Recognation In other to prevent fake fingers from being
used, many biometrics fingerprint system also
measured blood flow, or check for correctly
arrayed ridges at the edges of the finger.
Iris Scanning Analyses the feathers that exist in the
coloured tissues surrounding the pupil which
has more than 200 points that can be used for
comparison, includings rings, furrows and
freckels. The accury of this method is
excellent while the cost involved is high.
Hand Geometry Scanning Hand scanning invovles the measurement
and analysis of the shape of one’s hand.
Unlike fingerprints, the human hand isn’t
unique. Individual hand feathers are not
descriptive enough for identification.
Voice Recognition Voice recognition system compares a
person’s live speech with their stored voice
pattern. Voice recognition biometris requires
user to speak into a microphone, what his
speaks can be his password or an access
phrase. The accuracy in voice recognition is
fair and the cost is very easonable,
Retinal Scanning Retinal biometrics invovles the skin of retina
and analysis the layer of blood vessels at the
back of the eye. Retinal scanning involves
using a low-intensity light source and an
opticle coupler and can read the pattern at the
great level of accurancy.
The callback system is commonly used in the bank
operation and business transaction.
For example, when you book for the taxi service, the
operator will ask you to hang up and will call
you back to confirm for the service required.
Important In order to safeguard againts the unauthorised access and use
MY RESOURCES
Module ict http://en.wikipedia.org/wiki/Authentication