In the emerging economy there is a new infrastructure, based on the internet, that is causing us to scrutinies most of our assumptions about the business. As a skin of networks - growing in ubiquity, robustness, bandwidth, and function - covers the skin of the planet, new models of how wealth is created are emerging.

Showing posts with label authentication. Show all posts
Showing posts with label authentication. Show all posts

Friday, September 26, 2014

Finger vein readers

Vein readers identify the complex vein pattern below the skin, specific to individuals and unchanging throughout the lifetime.

Finger vein reader is a biometric device that comprises at least one optical imaging unit designed to capture finger vein patterns of an individual and a digital signal processer that digitizes the captures finger vein patterns to be utilized as biometric features.

Finger vein authentication, introduced by widely Japanese banks is claimed to be the fastest and most secured biometric method.

The finger vein reader is as small as most fingerprint scanners (39 x 34 x 15 mm) and the raw data are processed to yield a small template. Because the device is measuring the light absorption of hemoglobin, it will only work with a live finger or hand.

Finger vein advocates counter that the transillumination of the fingers redness its vein pattern features to be highly distinct band enables greater accuracy.

Nevertheless finger vein systems do have at least some specific, incontestable advantage over hand vein systems –numerical superiority. Fingers have a 5:1 numerical advantage and 10- fingers offer a variety of application options.

In terms of research, it is easier to build a bigger pattern database. This is a big advantage because the number of people using such system increases, so the testing database of samples must be much larger than in the past.
Finger vein readers

Wednesday, June 4, 2014

Authentication system

There are three main security processes working together to provide access to assess in a controlled manner:
*Authentication
*Authorization
*Accounting

The first line of defense of a computer system has against intruders is the user authentication system. Much like with a normal door lock, authorized users are given a key to the system thus keeping unauthorized users out.

The user authentication system attempts to prevent unauthorized users from gaining access by requiring users to validate their authorization to use the system.

Authentication is the process of validating user identity. The fact that the user claims to be represented by a specific abstract object (identified by its user ID) does not necessarily mean that this is true.

This validation is often accomplished with use of a password that must be presented to the system.

The system grants access to a user only when the password for the specified username matches the password on record.

Other authentication schemes require the user to present a physical key or take advantage of the uniqueness of as user’s physical characteristics such as fingerprints.

Questionnaire authentication attempts to validate a user with questions that an intruder is unlikely to know.

The system asks questions such as the name of the user’s first pet, the color of the user’s parent’s home or the name of the user’s favorite teacher.

Once the individual has been authenticated, the system will associate an initial process to the user and the user will be able to launch other processes.
Authentication system

Tuesday, January 15, 2013

Identification and Authentication of the Parties


Identification and Authentication of the Parties
One of the major problems that contracting on the Net faces is the difficulty of establishing the identity of the party who is on the other side of the transaction.

The exchange of valuables which is at the heart of contract law losses meaning if the parties exchanging them do not exactly know that there is somebody at the other side who is what she claims to be.

This is not necessarily because of any need to know the other person’s particulars or in view of future business prospects, but to be sure that if anything goes wrong the party claiming redress knows how to get to or communicate with that other party.

In contract law terms, the innocent party should have sufficient information about the party in default or alleged breach of the contract so as to pursue her claims against that party successfully.

The problem of not being able to establish the identity of a person transacting on the Net readily is made worse by the use of ‘remailers’ nor ‘anonymizers.’

These are software programs which can cloak the identity of a contracting party by either removing or replacing the actual address from which a party is sending messages so that it becomes impossible to trace that party.

From a practical angle, where such software is used the party that pays for goods in the Net but does not received the goods will not be able to establish of the seller is real or a phantom or whether she is residing at the specified origin of the electronic communication of acceptance or notice of delivery.

Another way on which a party may be prevented from establishing the identity of the other side is “spoofing,” that is use by the latter party of identity or account of another person to masquerade as that other person.

This is done not only by faking the identity of another party, but also by altering or falsifying e-mails so that the identity of a non-transacting party is assumed.

There are several spy programs that monitor the keystrokes of people to imitate their identity and misrepresent them.

It is therefore vital for contracting parties to know, and have confidence that the other parity is genuine and fits the description that she has supplied about herself during the transaction.

The common use of passwords as a means of identity authentication has been found to be deficient, open as it is to deliberate or inadvertent disclosure, backing or some other means of intervention or eavesdropping.

Among the more reliable emerging forms of authentication of parties employing electronics means of transactions is the use of digital signature technology.

Biometric techniques (such as fingerprinting, handwriting or voice recognition, retinal, or hand geometry scanning) are still in a process of development or immensely expensive to adopt at the moment.
Identification and Authentication of the Parties

The most popular articles

My Blog List