Please enable JavaScript.
Coggle requires JavaScript to display documents.
WHAT IS THE IMPORTANT - Coggle Diagram
WHAT IS THE IMPORTANT
BIOMETRIC TECHNIQUES
2 TYPES
- fingerprints, the hand's shape, the finger, vein pattern, the eye (iris and retina), and the face's shape.
- voice recognition, gestures, handwriting, signature
- DNA, blood, skin, saliva, or urine
ADVANTAGES
hard to fake or steal, unlike passwords
-
generally, the same over the course of a user's life
-
-
WHAT IS BIOMETRIC
-
The technology is mainly used for identification and access control or for identifying individuals who are under surveillance. The basic premise of biometric authentication is that every person can be accurately identified by intrinsic physical or behavioral traits
DISADVANTAGES
-
If the system fails to capture all of the biometric data, it can lead to failure in identifying a user
-
-
If a user gets injured, then a biometric authentication system may not work
HOW DOES IT WORKS?
Authentication by biometric verification is becoming increasingly common in corporate and public security systems, consumer electronics and point-of-sale applications.
biometric verification has been convenience, as there are no passwords to remember or security tokens to carry. Some biometric methods, such as measuring a person's gait, can operate with no direct contact with the person being authenticated.
-
DIGITAL SIGNATURE
A digital signature is a mathematical technique for verifying the authenticity and integrity of a message, software, or digital document. It's the digital equivalent of a handwritten signature or a stamped seal, but it's far more secure. A digital signature is designed to prevent tampering and impersonation in digital communications.
-
-
How does it work?
Digital signatures work through public key cryptography's two mutually authenticating cryptographic keys. The individual who creates the digital signature uses a private key to encrypt signature-related data, while the only way to decrypt that data is with the signer's public key.
If the recipient can't open the document with the signer's public key, that's a sign there's a problem with the document or the signature. This is how digital signatures are authenticated.