Published on

Published in: Business, Technology
  • Be the first to comment


  1. 1. security measure by, Siti Hawa, 4 server
  2. 2. authentication <ul><li>Process where user verify that they are who they say they are. </li></ul><ul><li>The user who attempts to perform function in a system is in fact the user who is authorized to do so. </li></ul>
  3. 3. Method of authentication
  4. 4. BIOMETRIC <ul><li>Device that translate personal characteristic into a digital code stored in the database </li></ul>
  5. 5. The example: <ul><li>FINGERPRINT RECOGNITION </li></ul><ul><li>FACIAL RECOGNITION </li></ul><ul><li>HAND GEOMETRY SCANNING </li></ul><ul><li>IRIS SCANNING </li></ul><ul><li>RETINAL SCANNING </li></ul><ul><li>VOICE RECOGNITION </li></ul><ul><li>SIGNATURE VERIRIFICATION SYSTEM </li></ul>
  6. 6. <ul><li>FINGERPRINT RECOGNITION </li></ul><ul><li>*To prevent fake finger from being used </li></ul><ul><li>*Measure blood flow or check correctly arrayed ridges </li></ul><ul><li>FACIAL RECOGNITION </li></ul><ul><li>*Analyses the characteristic of an individual’s face images </li></ul><ul><li>*Capture through a digital video camera </li></ul><ul><li>*Touted as a fantastic system for recognizing potential threats </li></ul><ul><li>HAND GEOMETRY SCANNING </li></ul><ul><li>*Measure and analysis of the shape of one’s hand </li></ul><ul><li>*Individual features are not descriptive for identification </li></ul><ul><li>*Possible to devise a method by combining various individual features and measurement of finger and hands </li></ul>
  7. 7. <ul><li>IRIS SCANNING </li></ul><ul><li>* Analyses the feature that exist in the coloured tissue surrounding the pupil </li></ul><ul><li>* The scan use a regular video camera and can be done from further away than a retinal scan </li></ul><ul><li>* Will work perfectly and get the accurate measurement that can be use in identification purpose </li></ul><ul><li>* Excellent but expensive </li></ul><ul><li>RETINAL SCANNING </li></ul><ul><li>* Scanning the retina and analysing the layer of blood vessel at the back of the eye </li></ul><ul><li>* using a low-intensity light source and a optical coupler </li></ul><ul><li>* Requires user to remove glasses, place their eye to the device and focus on a certain point </li></ul><ul><li>* the accuracy is very good and the cost is fair </li></ul>
  8. 8. <ul><li>VOICE RECOGNITION </li></ul><ul><li>* Compares a person’s live speech with their stored voice pattern. </li></ul><ul><li>* Requires user to speak into a microphone and the word or anything that he speaks can be his password or an access phrase. </li></ul><ul><li>* Most voice recognition devices require the high and low frequencies of the sound to match, which is difficult for many recording instrument to recreate well. </li></ul><ul><li>* Fair and the cost reasonable. </li></ul><ul><li>SIGNATURE VERIFICATION SYSTEM </li></ul><ul><li>* Recognizes the shape of user handwritten signature as measuring the pressure exerted and the motion use to write the signature. </li></ul><ul><li>* Special pen and tablet are used. </li></ul><ul><li>* The authenticity is determined by, comparing an input signature to a stored reference set (template) consisting of three signature. </li></ul><ul><li>* The similarity between input signature and reference set is computed using string matching and compared to a threshold. </li></ul><ul><li>* Fair and the price is excellent. </li></ul>
  9. 9. Picture 2: Visualization of iris scan and extracted &quot;IrisCode&quot; Picture (C) IriScan, Inc.
  10. 10. Picture 4: Hand with biometric measurements visualized Image (C) Michigan State University Picture 3: Digitized fingerprint image with the minutiae points extracted. Image (C) 1998 Idex AS
  11. 11. <ul><li>From this assignment I can conclude that authentication is one of the security measure. One of the method of authentication is Biometric Devices. The Biometric method is the method that are commonly use. There are seven example of Biometric. From this assignment, I also find out that the Fingerprint Recognition is the best method because the fingerprint is very unique, different person will have the different fingerprint. It also the best method because the accuracy in this method is good and the cost involved is cheaper than the other method. </li></ul>CONCLUSION
  12. 12. <ul><li>BOOK </li></ul><ul><li>COMPUTING ESSENTIAL 2000 - 2001,TIMOTHY J. O’LEARY,LINDA I. O’LEARY,2000 . </li></ul><ul><li>NOTE </li></ul><ul><li>INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY,SMK PEKAN,2006. </li></ul><ul><li>INTERNET </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>network security 1998:biometric identification-Microsoft internet explore </li></ul>
  13. 13. thank you..