Authentication is commonly done based on a username and password.
ACCESS
DENIED
IDENTIFICATION present what the user has
ACCESS
GRANTED
AUTHENTICATION Authenticate who the user is.
VERIFICATION Verify the validity of the ID
IDENTIFICATION
VALID
VALID
NOT VALID
NOT VALID
A device which is a part of a Biometric system, that contains the sensor which captures a biometric sample from an individual. Security measure permitting entry into a computer system only by returning a user's log-in call from a specific terminal.
To identify people by scanning their face and matching it against a library of known faces FACIAL RECOGNITION
IRIS SCANNER
To identify a person by scanning the iris or retina of their eyes. FINGERPRINT RECOGNITION
Checking the fingerprint and measures blood flow to avoid a fake finger from being used.
Eliminate problems caused by lost IDs or forgotten passwords by using physiological attributes. Injuries can lead to false biometrics. Safe & user friendly. Highest level of security. Serves as a key that cannot be transferred. Biometric devices are expensive. Biometric devices can be hacked. Fingerprints can be lifted off of biometrics.
The callback system is commonly used in the bank operation and business transaction.
Example: when you book for the taxi service, the operator will ask you to hang up and she will call you back to confirm for the service required.
when you called a McDonald Delivery Services, the operator wil ask you to hang up since he wants to link you with the other worker. Authentication is one of the security measure.
There are two method of authentication,biometric device and callback system.
Authentication is important in order to safeguard against the unauthorised access and use. http://www.webopedia.com/TERM/A/authentic ation.html http://www.questbiometrics.com/advantages- of-biometrics.html http://notanotaict.blogspot.com/ http://hitachi- id.com/concepts/authentication.html http://wordnetweb.princeton.edu/perl/webwn ?s=facial recognition http://tsimpao.blogspot.com/2011/02/biometric- devices-advantages-and.html