Sunday, March 20, 2011

2.5 AUTHENTICATION TECHNOLOGIES..

Authentication is a process where user verifies their identity.Authentication deals with the problem of determining whether a user should be allowed access to a particular system. Four commonly authentication methods:

a. User identification (something you know - have to remember). User identification is a unique combination of 
character (letter, number or symbol) that identify specific user. Examples of user identification are pin number and password.




b. Possessed object (something you have - an object). A possessed object is any item that you must carry to gain access to computer or computer facility. Examples of possessed objects are ATM card, credit card, key,security token and smart card. The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account. 

                              




c. Biometric device (something you are - part of user's body) is a devices that translates personal characteristic into digital code that is compared with the digital code stored in the database. E.g. of biometric devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system. 



hand geometry reader










d. Callback system is a checking system that authenticates the user. The callback system is commonly used in the bank operation andbusiness transaction. For example, when you called a McDonald Delivery Services, the operator will ask you to hang up since he wants to link you with the other worker.

0 comments:

Post a Comment

 
Free Website templatesfreethemes4all.comFree Blog TemplatesLast NewsFree CMS TemplatesFree CSS TemplatesFree Soccer VideosFree Wordpress ThemesFree Web Templates