This document discusses different biometric authentication methods including facial recognition, iris scanning, and fingerprint recognition. It notes that biometric authentication can eliminate problems of lost or forgotten credentials but that injuries or hacking could lead to false biometrics. The document also lists some advantages and disadvantages of using biometric devices for authentication.
1 of 10
Downloaded 16 times
More Related Content
Authentication
4. ACCESS
DENIED
IDENTIFICATION
present what the
user has
ACCESS
GRANTED
AUTHENTICATION
Authenticate who
the
user is.
VERIFICATION
Verify the validity
of the
ID
IDENTIFICATION
VALID
VALID
NOT
VALID
NOT
VALID
6. To identify people by scanning their
face and matching it against a library
of known faces
FACIAL RECOGNITION
IRIS SCANNER
To identify a person by scanning the
iris or retina of their eyes.
FINGERPRINT
RECOGNITION
Checking the fingerprint and
measures blood flow to avoid a fake
finger from being used.
7. Eliminate problems caused by lost IDs or
forgotten passwords by using physiological
attributes.
Injuries can lead to false biometrics.
Safe & user friendly.
Highest level of security.
Serves as a key that cannot be
transferred.
Biometric devices are expensive.
Biometric devices can be hacked.
Fingerprints can be lifted off of
biometrics.
9. Authentication is one of the security measure.
There are two method of authentication,biometric device and callback
system.
Authentication is important in order to safeguard against the
unauthorised access and use.