How does it called when we:
- enter a website with login and password;
- unlock our smartphone;
- use a digital signature on the egov.kz website?
Methods of identification
10.6.2.3 describe user data protection measures: passwords, accounts, authentication, biometric authentication
Identification
Identification describes a method of ensuring that a subject is the entity it claims to be
Methods of identification
Biometrics
Passwords
Cognitive Passwords
One-Time or Dynamic Passwords
Cryptographic Keys
Smart Cards
Digital sign
Biometrics
Verifies an individuals identity by analyzing a unique personal attribute or behavior
It is the most effective and accurate method for verifying identification.
It is the most expensive authentication mechanism
Types of Biometric Systems
Finger Print- are based on the ridge endings, bifurcation exhibited by the friction edges and some minutiae of the finger
Retina Scan- is based on the blood vessel pattern of the retina on the backside of the eyeball.
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.