Top Banner
Farhanum And Ashmira 4 ICT Puan Marziean Bt Mohd Shapian
11

authentication

Mar 17, 2016

Download

Documents

hanum

nama saya nur farhanum binti abdul aziz bin abdul rahman
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: authentication

Farhanum And Ashmira

4 ICT

Puan Marziean Bt Mohd

Shapian

Page 2: authentication

DEFINATION OF

AUTHENTICATIONS

Page 3: authentication

Identifications present what the user has (e.g. smart card)

Identification present what the user is (e.g. biometric)

Access granted

Access denied

Verificati-on verify

the validity of

the ID

Authentif-ication

authentic-ate who

the user is

Page 4: authentication

BIOMETRIC DEVICES

A device that translates personal characteristics into a digital code that is compared with a digital

code stored in the database

CALLBACK SYSTEM

Refers to the checking system

that authntications the user

Page 5: authentication

FACTORS AND IDENTITY

The ways in which someone may be authenticated fall

into three categories, based on what are known as the factors of authentication:

something the user knows, something the user has, and something the user is. Each authentication factor covers a range of elements used to

authenticate or verify a person's identity prior to

being granted access, approving a transaction

request, signing a document or other work product,

granting authority to others, and establishing a chain of

authority.

The

factors

and some

of

elements

of each

factor

the ownership factors: Something the user has. Eg: wrist band, ID card, security

token, software token, phone or cell phone

the knowledge factors: Something the user knows. Eg : a password, pass phrase, or

personal identification number (PIN), challenge response (the user must

answer a question),

the inherence factors: Something the user is or does. Eg : fingerprint, retinal

pattern, DNA sequence, signature, face, voice, unique bio-electric signals, or

other biometric identifier.

Page 6: authentication

Facial Recognition Facial recognition analyses the

characteristics of an individual’s face images

captured through a digital video camera.

Facial recognition is widely used, touted as a

fantastic system for recognitioin potential

threats.

Fingerprint Recognation In other to prevent fake fingers from being

used, many biometrics fingerprint system also

measured blood flow, or check for correctly

arrayed ridges at the edges of the finger.

Page 7: authentication

Iris Scanning Analyses the feathers that exist in the

coloured tissues surrounding the pupil which

has more than 200 points that can be used for

comparison, includings rings, furrows and

freckels. The accury of this method is

excellent while the cost involved is high.

Hand Geometry Scanning Hand scanning invovles the measurement

and analysis of the shape of one’s hand.

Unlike fingerprints, the human hand isn’t

unique. Individual hand feathers are not

descriptive enough for identification.

Page 8: authentication

Voice Recognition Voice recognition system compares a

person’s live speech with their stored voice

pattern. Voice recognition biometris requires

user to speak into a microphone, what his

speaks can be his password or an access

phrase. The accuracy in voice recognition is

fair and the cost is very easonable,

Retinal Scanning Retinal biometrics invovles the skin of retina

and analysis the layer of blood vessels at the

back of the eye. Retinal scanning involves

using a low-intensity light source and an

opticle coupler and can read the pattern at the

great level of accurancy.

Page 9: authentication

The callback system is commonly used in the bank

operation and business transaction.

For example, when you book for the taxi service, the

operator will ask you to hang up and will call

you back to confirm for the service required.

Page 10: authentication

Important In order to safeguard againts the unauthorised access and use

Page 11: authentication

MY RESOURCES

Module ict http://en.wikipedia.org/wiki/Authentication