Sie sind auf Seite 1von 10

The goal of computer authentication is to identify the user and to verify that he has access to a computer system.

Computer authentication methods have been widespread since the personal computer was developed in the 1970s. Many authentication methods model physical methods that have been in use for centuries, such as identity cards, visual authentication and passwords. Breaches in computer authentication methods or in physical access controls comprise some of the most devastating attacks against information technology systems. Authentications also equaled in two ways which is.

Biometrics are authentication tools to verify a user's identity using some physical aspect. Fingerprint scanners, facial recognition, voice print recognition, retinal and iris scans are all widespread forms of biometric authentication. Biometric authentication is used by the U.S. military during enlistment to verify the identity of new recruits and to check their fingerprints against a database of criminals. Users can occasionally bypass or spoof biometric authentication by exploiting a weakness in the underlying technologies, for example, using a picture of the victim to bypass facial recognition.

IRIS SCANNING
* IRIS SCANNING ANALYSES THE FEATURES THAT EXIST IN THE COLOURED TISSUES SURROUNDING WHICH HAS MORE THAN 200 POINTS THAT CAN BE USED FOR COMPARISON AND THE OTHERS .

HAND GEOMETRY SCANNING


* HAND SCANNING INVOLVES THE MEASUREMENT AND ANALYSES OF THE SHAPE OF ONES HAND .

FACIAL RECOGNITION
* FACIAL RECOGNITION ANALYSES THE CHARACTERISTIC OF AN INDIVIDUALS FACE IMAGES CAPTURED THROUGH A DIGITAL VIDEO CAMERA.

FINGERPRINT RECOGNITION
* IN ORDER TO CHECK FOR CORRCTLY ARRAYED RIDGES AT THE EDGES OF THE FINGERS .

RETINAL SCANNING
* INVOLVES THE SCANNING OF THE RETINA AND ANALYSING THE LAYER OF BLOOD VESSELS AT THE BACK OF THE EYE

VOICE RECOGNITION
* COMPARES A PERSONS LIVE SPEECH WITH THEIR STORED VOICE PATTERN, IT ALSO REQUIRES USER TO SPEAK BY USING A MICROPHONE IT CAN BE THE PASSWORD OTHER ELSE .

SIGNATURE VERIFICATION SYSTEM


* USES A SPECIAL PEN AND TABLET. AFTER PROCESSING THE SIGNATURE, SEVERAL FEATURES ARE EXTRACTED.

http://searchsecurity.techtarget.com/tip/Biomet ric-authentication-know-how-Devices-systemsand-implementationdevice http://www.ehowmlHow to Configure Windows Authentication http://ww.com/how_5138562_configure-windowshttp:// www.ehow.com/list_6704281_computerauthentication.htw.ehow.com/list_6703474-authenticat authentication-methods-biometric-devices-todayscomputer-technology-for-students-realitysearch.html#ixzz2PeUT5Cm4


MODUL QA -SMK PEKAN -2010 -PN SITI HALIMAH MAHMOOD ALI INFORMATION AND COMMUNICATION TECHNOLOGY (ICT)

NAME:THARSINI DEVI IC/NO:970815-06-5102 INDEX NO:

Das könnte Ihnen auch gefallen