際際滷

際際滷Share a Scribd company logo
Authentication
Authentication
Authentication
ACCESS
DENIED
IDENTIFICATION
present what the
user has
ACCESS
GRANTED
AUTHENTICATION
Authenticate who
the
user is.
VERIFICATION
Verify the validity
of the
ID
IDENTIFICATION
VALID
VALID
NOT
VALID
NOT
VALID
Authentication
To identify people by scanning their
face and matching it against a library
of known faces
FACIAL RECOGNITION
IRIS SCANNER
To identify a person by scanning the
iris or retina of their eyes.
FINGERPRINT
RECOGNITION
Checking the fingerprint and
measures blood flow to avoid a fake
finger from being used.
Eliminate problems caused by lost IDs or
forgotten passwords by using physiological
attributes.
Injuries can lead to false biometrics.
Safe & user friendly.
Highest level of security.
Serves as a key that cannot be
transferred.
Biometric devices are expensive.
Biometric devices can be hacked.
Fingerprints can be lifted off of
biometrics.
.
 Authentication is one of the security measure.
 There are two method of authentication,biometric device and callback
system.
 Authentication is important in order to safeguard against the
unauthorised access and use.
http://www.webopedia.com/TERM/A/authenticatio
n.html
http://www.questbiometrics.com/advantages-of-
biometrics.html
http://notanotaict.blogspot.com/
http://hitachi-id.com/concepts/authentication.html
http://wordnetweb.princeton.edu/perl/webwn?s=f
acial recognition
http://tsimpao.blogspot.com/2011/02/biometric-
devices-advantages-and.html

More Related Content

Authentication