Authentication compared with the previously stored sample.

AuthenticationSystems Abstract  Table of Contents Abstract. 1 1.0 Introduction. 1 2.0 How the systems work. 1 2.1 How password authentication systems work. 1 2.

2 How biometric authentication systems work. 2  1.0 IntroductionToday, the level of  2.0 How the systems workThe purpose of both password and biometric authenticationsystems is the determination of whether someone is in fact who is declared tobe and as a result allow physical or logical access to that person. To achievetheir goal, the systems use different authentication methods. 2.1 How password authentication systems workThe way password authentication systems work is by comparinga given username or ID and a password with the corresponding credentials insidea database that holds all authorized users and their password.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

With that authenticationmethod, password authentication systems always have 100% chance of knowing whethersomeone is a legitimate user or not.  2.2 How fingerprint authentication systems workThe very first time a user registers into a server by fingerprintauthentication system, a procedure called enrolment takes place, which translatesilluminated images of the fingerprint into digital code. After the enrolment iscomplete, if the user wants to get logical or physical access to the server, mustscan their fingerprint again, then the verification procedure happens, which usesa capacitive scanner that measures their finger electrically.

When the fingerrests on a surface, the ridges in the fingerprint touch the surface while thehollows between the ridges stand slightly clear of it. A capacitive scannerbuilds up a picture of the fingerprint by measuring these distances and then translatesthat picture into a digital code which is finally compared with the previously storedsample.    3.0 Securitymethods used by the authentication systems for protecting its data 3.1 Security methods used by password authentication systems   3.2 Security methods used by fingerprint authentication system                                    

x

Hi!
I'm Simon!

Would you like to get a custom essay? How about receiving a customized one?

Check it out