Page 68 - TechPluse_C7_Flipbook
P. 68
One of the ways to prevent the misuse of data or software is authentication. Authentication is
the process of verifying a user’s identity before granting him or her access to a computer system.
In private and public computer networks (including the Internet), authentication is commonly
done through the use of login passwords. Knowledge of the password is assumed to guarantee
that the user is authentic.
Some of the authentication procedures are:
✶ Password Protection: Protect your computer using password is an important step to make
the data of computer safe from unauthorised use. A password is a word or collection of
characters used for user authentication to prove the identity or get approval to gain access
to the computer. The password should be kept secret from those computer who are not
allowed to access your computer.
✶ Biometric Authentication: Biometric authentication is a
process in which biological characteristics such as finger
print, face, and retina are used to check the identity of an
individual. In this process, a biometric machine is used to
capture the biological details of a person and compare these
details with the existing details, which are stored in computer.
It is an automated method of recognising a person’s identity
by using his/her biological characteristics such as: Biometric Authentication
(i) Face Recognition: Face recognition is the process to
identify an individual by using his/her facial features. Biometric machine captures the
facial image or video of person's face. This image is transformed into a unique faceprint.
The image is transformed using a technique called 'elastic graph matching'. Images are
sent to a back-end database for comparison and possible match. Algebraic algorithms
are used to make a perfect match. Currently, face recognition technique is most widely
used in smartphones.
Clickipedia
(ii) Iris and Retinal Recognition:
Biometrics which analyse the ✶ Biometrics were used during prehistoric times.
complex and unique characteristics ✶ Chinese used finger prints in the 14th
of the eyes can be divided into two century for identification.
different types: ✶ In the 17th century, finger prints was used
• Iris biometrics: Iris is the to seal official documents.
coloured band of tissue that
surrounds the pupil of the eye. An iris recognition system uses a video camera to
capture the sample while the software compares the resulting data against stored
templates.
• Retina biometrics: Retina is the layer of blood vessels at the back of the eye. A retinal
recognition system shoots an infrared light beam into eye that has been placed closed
to the signal receiver.
Then, the gentic factors are entracted and analysed by the analyser to grant access.
66 Premium Edition-VII

