Page 15 - CG_v2.1_flipBooks_class_6
P. 15

Some of the authentication procedures as follows:
                 1.  Password  Protection:  Protecting  your  computer  using  password  is  an  important  step  to
                    make the data of computer safe from unauthorised use. A password is a word or collection of
                    characters used for user authentication to prove the identity or get approval to gain access to
                    the computer. The password should be kept secret from those who are not allowed to access
                    your computer.

                 2.  Biometric Authentication: Biometric authentication is a process in which biological characteristics
                    such as finger print, face and retina are used to check the identity of an individual. In this process,
                    a biometric machine is used to capture the biological details of a person and compare these
                    details with the existing details, which are stored in computer. It is an automated method of
                    recognising a person’s identity by using his/her biological characteristics such as:
                        Face Recognition: Face recognition is the process of identifying an individual by using his/
                      her facial features. Biometric machine captures the facial image or video of person's face.
                      This image is transformed into a unique faceprint. The image is transformed using a technique
                      called  'elastic  graph  matching'.  Images  are  sent  to  a  back-end  database  for  comparison
                      and possible match. Algebraic algorithms are used to make a perfect match. Currently, face
                      recognition technique is most widely used in smartphones.
                        Iris and Retinal Recognition: Biometrics which analyse the complex and unique characteristics
                      of the eyes can be divided into two different types:

                        Iris biometrics: Iris is the coloured band of tissue that surrounds the pupil of the eye. An iris
                        recognition system uses a video camera to capture the sample while the software compares
                        the resulting data against stored templates.
                         Retina biometrics: Retina is the layer of blood vessels at the back of the eye. A retinal
                        recognition system shoots an infrared light beam into eye that has been placed close to the
                        signal receiver.

























                 3.   Voice Recognition: The term voice recognition refers to finding the identity of a person who is
                    speaking, rather than what he/she is saying. Recognising the speaker can simplify the task of
                    translating speech into system that has been trained on a specific person’s voice or it can be used
                    to authenticate or verify the identity of a speaker as part of a security process.


                                                                                Safeguarding Your Computer     13
   10   11   12   13   14   15   16   17   18   19   20