Professional Documents
Culture Documents
1
We can authenticate an identity in three
ways:
▪Something the user knows (such as a password or
personal identification number)
▪Something the user has (a security token or smart card)
▪Something the user is (a physical characteristic, such
as a fingerprint, called a biometric)
2
Biometrics.
3
Biometrics.
▪Signature dynamics - Based on an individual's
signature, but considered unforgeable because what is
recorded isn't the final image but how it is produced.
▪Example: Differences in pressure and writing speed at
various points in the signature
4
Biometrics.
5
Biometrics.
6
Biometrics.
7
Who uses facial recognition?
▪ U.S. government at airports. Facial recognition systems can
monitor people coming and going in airports.
▪ Mobile phone makers in products. Apple first used facial
recognition to unlock its iPhone X, and continues with the
iPhone XS. Face ID authenticates — it makes sure you’re you
when you access your phone. Apple says the chance of a
random face unlocking your phone is about one in 1 million.
8
Who uses facial recognition?
9
Biometrics.
▪ Fingerprint recognition - Everyone knows fingerprints
are unique. They are also readily accessible and require
little physical space either for the reading hardware or
the stored data.
▪ Most fingerprint scanners do not digitise the entire
fingerprint.
10
Biometrics.
11
Biometrics.
12
Biometrics - The Current Leader.
▪Because of its convenience and ease of use, fingerprint
authentication is becoming the biometric technology of
widest choice.
▪A growing number of notebook PCs and computer
peripherals are coming to market with built-in fingerprint
readers.
13
Biometrics - The Current Leader.
14
Biometric authentication.
15
Theft Prevention.
16
Theft Prevention.
17
Theft Prevention.
18
Lesson Summary
▪Biometrics
▪Biometric authentication
▪Theft Prevention
19