One of the most recent popular and effective authentication methods is biometric identifiers which make use of our unique physical characteristics, and it is an example of authentication based on what you are. Common example includes:
• Fingerprints
• Voice patterns
• Retina scan
• Hand geometry
• Face
• Iris scan
The most common biometrics used is the fingerprints. A fingerprint is made of a series of ridges and furrows on the surface of the finger. Fingerprint matching can be divided into two categories: minutiae-based and correlation based. Minutiae-based techniques locate the minutiae point and convert them into a unique series of numbers, and store the information as a template. However, using minutiae based technique may have some difficulties as it is not easy to extract the minutiae point accurately when the fingerprint is of low quality. Correlation-based technique uses one precise location on the finger print to create a template.
Although biometric uses our unique characteristics and is very difficult to duplicate but is possible. Intruders can simply lifting a fingerprint from a glass to copy the fingerprint. Biometric is more recommended to use along with a password- what you know + what you are.
Biometric device is expensive to implement but once it has implemented it can overcome the problem of users forgetting their log in password and reduce the numbers of calls to the help desk about forgetting password and reset password.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment