You are on page 1of 10

SECURITY MEASURES

(BIOMETRIC
,AUTHENTICATION)
Group
: No.8
Groups Members : i ) Eugene Lee Jian Hao
ii) Winson Yew Kai
Sheng
Class
: 4ICT

CONTENT

AUTHENTICATION
METHODS OF AUTHENTICATION
BIOMETRIC DEVICES
CALLBACK SYSTEM
CONCLUSION
REFERENCES

AUTHENTICATION
Authentication is a process
where users verify that they are
who they say they are.
The users who attempts to
perform functions in a system is
in fact the users who is
anthorised to do so.

METHODS OF AUTHENTICATION
Biometric device
Device that translates personal
characteristics into a digital code
that is compared with a digital
code stored in the database.
Callback system
The checking system that
authenticates the user.

BIOMETRIC DEVICES
FINGERPRINT REGORNITION
Besides checking the fingerprint, it also
measures blood flow to avoid a fake finger
from being used.
FACIAL REGORNITION
It analyses the characteristics of an
individuals face images captured through a
digital video camera.
HAND GEOMETRY SCANNING
It involves the measurement and analysis
of the shape of a persons hand.

. IRIS SCANNING
It analyses the features that exist in
the coloured tissues surrounding the
pupil which has more than 200 points
that can be used for comparison,
including rings, furrows and freckles.
The scans use a regular video
camera and work perfectly fine
through glasses and has the ability to
create an accurate enough
measurement.

RETINAL SCANNING
It involves the scanning of retina and
analysing the layer of blood vessels at
the back of the eye.
VOICE REGORNITION
It compares a persons live speech with
the stored voice pattern in the database.
SIGNATURED VERIFICATION SYSTEM
The authenticaticity of a writer is
determined by comparing an input
signature to a stored reference set
(template) consisting of three signatures.

CALLBACK SYSTEM
The callback system is commonly
used in the bank operation and
business transaction.
For example, when you called a
McDonald Delivery Services,the
operator will ask you to hang up
since he wants to link you with the
other worker.

CONCLUSION
Authentication is important in
order to safeguard against the
unauthorised access and use.

REFERENCES
http://slideshare.net/ict-security-me
asures-81805
http://en.wikipedia.org/wiki/Security

You might also like