Page 15 - Computer Genius Class 06
P. 15
Some of the authentication procedures as follows:
1. Password Protection: Protecting your computer using password is an important step to
make the data of computer safe from unauthorised use. A password is a word or collection of
characters used or user authentication to pro e the identity or get appro al to gain access to
the computer. The password should be kept secret from those who are not allowed to access
your computer.
2. Biometric Authentication: iometric authentication is a process in hich iological characteristics
such as finger print ace and retina are used to chec the identity o an indi idual. n this process
a biometric machine is used to capture the biological details of a person and compare these
details with the existing details, which are stored in computer. It is an automated method of
recognising a person’s identity by using his/her biological characteristics such as:
Face Recognition: Face recognition is the process o identi ying an indi idual y using his
her acial eatures. iometric machine captures the acial image or ideo o person s ace.
This image is trans ormed into a uni ue aceprint. The image is trans ormed using a techni ue
called elastic graph matching . mages are sent to a ac end data ase or comparison
and possible match. Algebraic algorithms are used to make a perfect match. Currently, face
recognition techni ue is most idely used in smartphones.
Iris and Retinal Recognition: iometrics hich analyse the comple and uni ue characteristics
o the eyes can e di ided into t o different types
Iris biometrics: Iris is the coloured band of tissue that surrounds the pupil of the eye. An iris
recognition system uses a ideo camera to capture the sample hile the so t are compares
the resulting data against stored templates.
Retina biometrics: etina is the layer o lood essels at the ac o the eye. retinal
recognition system shoots an infrared light beam into eye that has been placed close to the
signal recei er.
3. Voice Recognition: The term voice recognition re ers to finding the identity o a person ho is
speaking, rather than what he/she is saying. Recognising the speaker can simplify the task of
translating speech into system that has een trained on a specific person s oice or it can e used
to authenticate or eri y the identity o a spea er as part o a security process.
Safeguarding Your Computer 13

