Beruflich Dokumente
Kultur Dokumente
Computer authentication methods have been widespread since the personal computer was developed in the 1970s. Many authentication methods model physical methods that have been in use for centuries, such as identity cards, visual authentication and passwords. Breaches in computer authentication methods or in physical access controls comprise some of the most devastating attacks against information technology systems. Authentications also equaled in two ways which is.
Biometrics are authentication tools to verify a user's identity using some physical aspect. Fingerprint scanners, facial recognition, voice print recognition, retinal and iris scans are all widespread forms of biometric authentication. Biometric authentication is used by the U.S. military during enlistment to verify the identity of new recruits and to check their fingerprints against a database of criminals. Users can occasionally bypass or spoof biometric authentication by exploiting a weakness in the underlying technologies, for example, using a picture of the victim to bypass facial recognition.
IRIS SCANNING
* IRIS SCANNING ANALYSES THE FEATURES THAT EXIST IN THE COLOURED TISSUES SURROUNDING WHICH HAS MORE THAN 200 POINTS THAT CAN BE USED FOR COMPARISON AND THE OTHERS .
FACIAL RECOGNITION
* FACIAL RECOGNITION ANALYSES THE CHARACTERISTIC OF AN INDIVIDUALS FACE IMAGES CAPTURED THROUGH A DIGITAL VIDEO CAMERA.
FINGERPRINT RECOGNITION
* IN ORDER TO CHECK FOR CORRCTLY ARRAYED RIDGES AT THE EDGES OF THE FINGERS .
RETINAL SCANNING
* INVOLVES THE SCANNING OF THE RETINA AND ANALYSING THE LAYER OF BLOOD VESSELS AT THE BACK OF THE EYE
VOICE RECOGNITION
* COMPARES A PERSONS LIVE SPEECH WITH THEIR STORED VOICE PATTERN, IT ALSO REQUIRES USER TO SPEAK BY USING A MICROPHONE IT CAN BE THE PASSWORD OTHER ELSE .