Page 68 - TechPluse_C7_Flipbook
P. 68

One of the ways to prevent the misuse of data or software is authentication. Authentication is
                  the process of verifying a user’s identity before granting him or her access to a computer system.
                  In private and public computer networks (including the Internet), authentication is commonly
                  done through the use of login passwords. Knowledge of the password is assumed to guarantee
                  that the user is authentic.

                  Some of the authentication procedures are:
                      ✶ Password Protection: Protect your computer using password is an important step to make
                      the data of computer safe from unauthorised use. A password is a word or collection of
                      characters used for user authentication to prove the identity or get approval to gain access
                      to the computer. The password should be kept secret from those computer who are not
                      allowed to access your computer.
                      ✶ Biometric  Authentication: Biometric authentication is  a
                      process  in  which  biological  characteristics  such  as  finger
                      print, face, and retina are used to check the identity of an
                      individual. In this process, a biometric machine is used to
                      capture the biological details of a person and compare these
                      details with the existing details, which are stored in computer.
                      It is an automated method of recognising a person’s identity
                      by using his/her biological characteristics such as:                  Biometric Authentication
                        (i)  Face Recognition:  Face  recognition  is the  process to
                          identify an individual by using his/her facial features. Biometric machine captures the
                          facial image or video of person's face. This image is transformed into a unique faceprint.
                          The image is transformed using a technique called 'elastic graph matching'. Images are
                          sent to a back-end database for comparison and possible match. Algebraic algorithms
                          are used to make a perfect match. Currently, face recognition technique is most widely
                          used in smartphones.
                                                                   Clickipedia
                        (ii)  Iris  and  Retinal Recognition:

                          Biometrics    which    analyse    the         ✶  Biometrics were used during prehistoric times.
                          complex and unique characteristics            ✶  Chinese  used  finger  prints  in  the  14th
                          of the eyes can be divided into two            century for identification.
                          different types:                              ✶  In the 17th century, finger prints was used
                          •  Iris  biometrics:  Iris is the              to seal official documents.

                             coloured  band  of tissue  that
                             surrounds the pupil of the eye. An iris recognition system uses a video camera to
                             capture the sample while the software compares the resulting data against stored
                             templates.
                          •  Retina biometrics: Retina is the layer of blood vessels at the back of the eye. A retinal
                             recognition system shoots an infrared light beam into eye that has been placed closed
                             to the signal receiver.
                             Then, the gentic factors are entracted and analysed by the analyser to grant access.




               66       Premium Edition-VII
   63   64   65   66   67   68   69   70   71   72   73