AuthenticationSystems Abstract Table of Contents Abstract. 1 1.0 Introduction. 1 2.0 How the systems work. 1 2.1 How password authentication systems work. 1 2.
2 How biometric authentication systems work. 2 1.0 IntroductionToday, the level of 2.0 How the systems workThe purpose of both password and biometric authenticationsystems is the determination of whether someone is in fact who is declared tobe and as a result allow physical or logical access to that person. To achievetheir goal, the systems use different authentication methods. 2.1 How password authentication systems workThe way password authentication systems work is by comparinga given username or ID and a password with the corresponding credentials insidea database that holds all authorized users and their password.
With that authenticationmethod, password authentication systems always have 100% chance of knowing whethersomeone is a legitimate user or not. 2.2 How fingerprint authentication systems workThe very first time a user registers into a server by fingerprintauthentication system, a procedure called enrolment takes place, which translatesilluminated images of the fingerprint into digital code. After the enrolment iscomplete, if the user wants to get logical or physical access to the server, mustscan their fingerprint again, then the verification procedure happens, which usesa capacitive scanner that measures their finger electrically.
When the fingerrests on a surface, the ridges in the fingerprint touch the surface while thehollows between the ridges stand slightly clear of it. A capacitive scannerbuilds up a picture of the fingerprint by measuring these distances and then translatesthat picture into a digital code which is finally compared with the previously storedsample. 3.0 Securitymethods used by the authentication systems for protecting its data 3.1 Security methods used by password authentication systems 3.2 Security methods used by fingerprint authentication system