BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Thursday, March 4, 2010

1.2.2. State authentication & verification methods/ technologies.

Methods of Authentication

Two commonly used methods are biometric device and callback system.

  • Biometric device is a device that translates personal characteristics into a digital code that is compared with a digital code stored in the database. Biometric devices include Fingerprint Recognition, Facial Recognition, Hand Geogmetry, Iris Scanning, Retinal Scanning, Voice Recognition & Signature Verification.
  • Callback system refers to the checking system that authenticates the user.
Methods of Verification
  • There are two methods used, which are user identification and processed object.

    • User identification refers to the process of validating the user.
    • Processed object refers to something the user has such as identification card, security token and cell phone.

0 comments: