Identification methods

  • pptx
  • 01.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала Identification methods.pptx

Identification methods

Aim: 10.6.2.3 to explain the use of user data security measures: passwords, accounts, authentication, biometric authentication

Q/a

What is information?
What is a password?
What are the problems of modern information security?

The most acute problem of modern society is the problem of information security, ranging from the individual to the state.

Protection of information in computers
be sure to be considered as a set of measures, including organizational, technical, legal, program, operational, insurance, and even moral and ethical measures.
Is it not paradoxical that the theft of things from an apartment is considered as a crime, and the theft of information from a computer is often an indicator of high intellectual capabilities?

And neither any password, as, indeed, any other security system, will help if every user of the system is not personally interested in observing the security mode, does not understand why the security mode is needed, and what this user will personally lose if his password is opened or any other password in his organization. After all, the door lock can be opened once in the morning and left open for the whole day - what kind of security is it then?

What is a password?

The military say:
"A password is a secret word that allows you to determine who is yours and who is not."
From the point of view of computer security, this definition can be slightly added and extended:
"password is a secret set of different characters, allowing you to define
     legitimate user and his rights to work in the computer system. "

The password can be used for various purposes:
- definitions of "one's own - someone else's"? - confirmation of the identity of the owner of a key element (for example, a credit or magnetic card);? - rights to work in the system and access to information;? - obtaining special rights to perform particularly important operations;? - key to the system encryption or electronic signature, etc.

The general idea is this: the best password is a random and meaningless character set. The general idea is this: the best password is a random and meaningless character set.

Passwords on the computer

Information on creating and changing password-protected accounts, as well as access to them and information on how to set password protection when the computer starts, is located in the help files of the operating system or on its manufacturer's website. For example, in Microsoft Windows XP, information about managing passwords, changing them, etc. can be found in the online help system.

Keep your password in a safe place. Be careful if you write down the password on paper or any other medium. Do not leave a password entry wherever you leave the information it protects.

Change passwords regularly. This can be misleading. The stronger the password, the longer you can use it. A password of 8 or less characters can be used within a week, while a combination of 14 or more characters can serve several years if it is compiled according to all the rules given above.

Biometric Security Systems

Biometric identification is a method of identifying an individual according to individual specific biometric characteristics (identifiers) inherent in a specific person.

The abundance of biometric methods is amazing. The main methods using statistical biometric characteristics of a person are identification by papillary pattern on fingers, iris, face geometry, retina of the human eye, hand vein pattern. There are also a number of methods that use the dynamic characteristics of a person: identification by voice, dynamics of handwritten handwriting, heart rate, gait.

Fingerprints

Dactyloscopy (fingerprint recognition) is the most developed to date biometric method of personal identification. The catalyst for the development of the method was its wide use in forensic science of the twentieth century.

Each person has a unique papillary fingerprint pattern, thanks to which identification is possible. Typically, algorithms use characteristic points on fingerprints: the end of the pattern line, the branching line, single points. Additionally, information on the morphological structure of the fingerprint is used: the relative position of the closed lines of the papillary pattern, the arched and spiral lines. The features of the papillary pattern are converted into a unique code that preserves the information content of the fingerprint image. And it is the “fingerprint codes” that are stored in the database used for searching and comparing. The time for transferring the image of a fingerprint to a code and its identification usually do not exceed 1s, depending on the size of the base. The time spent on offering a hand is not counted.

Iris

The iris of the eye is a unique characteristic of a person. The drawing of the iris is formed in the eighth month of intrauterine development, finally stabilizes at the age of about two years and practically does not change during life, except as a result of severe injuries or abrupt pathologies. The method is one of the most accurate among biometric technologies.

The system of identification of the person by the iris is logically divided into two parts: the device for capturing an image, its primary processing and transferring it to the calculator; a computer that compares the image with the images in the database, sending a command to allow the actuator.

Face geometry

There are many methods of recognition on the geometry of the face. All of them are based on the fact that the facial features and the shape of the skull of each person are individual. This area of biometrics seems attractive to many, because we get to know each other first and foremost by the face. This area is divided into two areas: 2D-recognition and 3D-recognition. Each of them has advantages and disadvantages, but much also depends on the scope and requirements for a particular algorithm. ? 2D-face recognition?

2D facial recognition is one of the most statistically ineffective biometrics methods. It appeared a long time ago and was used mainly in forensic science, which contributed to its development. Subsequently, computer interpretations of the method appeared, as a result of which it became more reliable, but, of course, it was inferior and more and more inferior to other biometric methods of personal identification every year. Currently, due to poor statistics, it is used mainly in multimodal or, as it is also called, cross-biometrics.

Venous hand drawing

This is a new technology in the field of biometrics. An infrared camera takes pictures of the outside or inside of the arm. The pattern of veins is formed due to the fact that the hemoglobin of the blood absorbs infrared radiation. As a result, the degree of reflection is reduced and the veins are visible on the camera as black lines. A special program based on the data obtained creates a digital convolution. No human contact with the scanning device is required.
The technology is comparable in reliability with iris recognition, but it has a number of drawbacks indicated below.

Retina

Until recently, it was believed that the most reliable method of biometric identification and authentication of a person is a method based on retinal scanning. It contains the best features of identification by the iris and veins of the hand. The scanner reads the capillary pattern on the surface of the retina. The retina has a fixed structure, unchanged in time, except as a result of eye disease, for example, cataracts.

Unfortunately, a number of difficulties arise when using this method of biometrics. The scanner here is a very complex optical system, and a person must not move for a considerable time while the system is pointing, which causes discomfort.

Voice Identification

Uses unique acoustic features of speech. They reflect the human anatomy: the size and shape of the larynx and mouth, as well as the acquired properties of voice volume, speed and manner of conversation. Voice identification is that a person is asked to answer two or three questions, the answers to which are easy to remember. For example: surname, name, patronymic; Date of Birth. Some modern systems create a voice model and can match it with any phrase uttered by a person.

Identification by signature and other behavioral biometric technologies are based on the measurement of human behavioral characteristics. This is the speed of writing, pressing and tilting letters, the movement of the pen at the time of signing or writing the text. When identifying by the way of working with the keyboard, such indicators as the dynamics of pressing the keys, the rhythm, the user's manner of pressing the keys are removed. Unfortunately, despite the wide areas of possible application, these methods have not yet become widespread enough.

Advantages and disadvantages of the method

Advantages

Disadvantages

View video

Modern methods of contactless identification

Reflection

What was hard?
What questions remain?
Are all parts lightweight?
Was there something you already knew?

homework

To study other objects of human identification

Materials used

http://
http://passwords.lance.com.ua/article_protect_data_ru.htmwww.zahist.narod.ru/illusion.htm
http://www.zk-software.ru/
http://www.polyset.ru/article/st327.php
http://secandsafe.ru/stati/kompleksnye_sistemy_bezopasnosti/biometricheskie_sistemy_identifikacii
http://smartcom.od.ua/safety-systems/biometric-system-identification
http://habrahabr.ru/blogs/infosecurity/126144/

Посмотрите также