Selasa, 15 Mac 2011

2.5 AUTHENTICATION technologies.

Authentication is a process where user verifies their identity. Authentication deals with the problem of determining whether a user should be allowed access to a particular system. Four commonly authentication methods:

a. User identification (something you know - have to remember). User identification is a unique combination of
character (letter, number or symbol) that identify specific user. Examples of user identification are pin number and password.


b. Possessed object (something you have - an object). A possessed object is any item that you must carry to gain access to computer or computer facility. Examples of possessed objects are ATM card, credit card, key,security token and smart card. The card you use in an automated teller machine (ATM) is a possessed object that allows access to your bank account. 
                              




c. Biometric device (something you are - part of user's body) is a devices that translates personal characteristic into digital code that is compared with the digital code stored in the database. E.g. of biometric devices are fingerprint reader, hand geometry reader, iris scanner, signature verification system. 


hand geometry reader








d. Callback system is a checking system that authenticates the user. The callback system is commonly used in the bank operation and business transaction. For example, when you called a McDonald Delivery Services, the operator will ask you to hang up since he wants to link you with the other worker.

Tiada ulasan:

Catat Ulasan