Page 15 - Computer Genius Class 06
P. 15

Some of the authentication procedures as follows:
                 1.  Password  Protection:  Protecting  your  computer  using  password  is  an  important  step  to
                    make the data of computer safe from unauthorised use. A password is a word or collection of
                    characters used  or user authentication to pro e the identity or get appro al to gain access to
                    the computer. The password should be kept secret from those who are not allowed to access
                    your computer.

                 2.  Biometric Authentication:  iometric authentication is a process in  hich  iological characteristics
                    such as finger print   ace and retina are used to chec  the identity o  an indi idual.  n this process
                    a biometric machine is used to capture the biological details of a person and compare these
                    details with the existing details, which are stored in computer. It is an automated method of
                    recognising a person’s identity by using his/her biological characteristics such as:
                        Face Recognition: Face recognition is the process o  identi ying an indi idual  y using his
                      her  acial  eatures.  iometric machine captures the  acial image or  ideo o  person s  ace.
                      This image is trans ormed into a uni ue  aceprint. The image is trans ormed using a techni ue
                      called   elastic graph matching .   mages  are  sent  to  a   ac  end  data ase   or  comparison
                      and possible match. Algebraic algorithms are used to make a perfect match. Currently, face
                      recognition techni ue is most  idely used in smartphones.
                        Iris and Retinal Recognition:  iometrics  hich analyse the comple  and uni ue characteristics
                      o  the eyes can  e di ided into t o different types

                        Iris biometrics: Iris is the coloured band of tissue that surrounds the pupil of the eye. An iris
                        recognition system uses a  ideo camera to capture the sample  hile the so t are compares
                        the resulting data against stored templates.
                        Retina biometrics:  etina is the layer o   lood  essels at the  ac  o  the eye.   retinal
                        recognition system shoots an infrared light beam into eye that has been placed close to the
                        signal recei er.

























                 3.  Voice Recognition: The term voice recognition re ers to finding the identity o  a person  ho is
                    speaking, rather than what he/she is saying. Recognising the speaker can simplify the task of
                    translating speech into system that has  een trained on a specific person s  oice or it can  e used
                    to authenticate or  eri y the identity o  a spea er as part o  a security process.


                                                                                Safeguarding Your Computer     13
   10   11   12   13   14   15   16   17   18   19   20