I made this widget at MyFlashFetish.com.

Ahad, 3 April 2011

2.5 AUTHENTICATION technologies.

Authentication is a process where user verifies their identity. 
 Authentication deals with the problem of determining whether
 a user should be allowed access to a particular system. Four 
commonly authentication methods:

a. User identification (something you know - have to remember). 
User identification is a unique combination of
character (letter, number or symbol) that identify specific user.
 Examples of user identification are pin number and password.


b. Possessed object (something you have - an object). A possessed
 object is any item that you must carry to gain access to computer 
or computer facility. Examples of possessed objects are ATM card, 
credit card, key,security token and smart card. The card you use in
 an automated teller machine (ATM) is a possessed object that allows 
access to your bank account. 
                              




c. Biometric device (something you are - part of user's body) is a devices
 that translates personal characteristic into digital code that is
 compared with the digital code stored in the database. E.g. of biometric
 devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system. 


hand geometry reader





Tiada ulasan:

Catat Ulasan