Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Review on Multi-Bio-Authentication System and Analysis of Security


Affiliations
1 Department of Computer Science, University of Helsinki, Helsinki, Finland
     

   Subscribe/Renew Journal


Authentication is the emerging process of identifying a user's uniqueness. It is a procedure of merging an incoming request with a set of known authentications. The identifications which are provided to authorize users are stored in a database on a local operating system or the server of authentication. Security system will search all the objects from the facts that it knows and discover the exact one of which the actual user is presently applied. An original user can be related with other conceptual user object in the system, and therefore the permissions and rights to the user is granted and that user identity is the main evidence to the system which is provided by user. The procedure of determining the rights of user offered evidence is referred as authentication and the throughout process of authentication is termed as credentials. To implement the security multi factor authentication system, there are multiple authentication methods available. Now a days an effective authentication system is provided by using the security concept of one time password and biometric system.

Keywords

Bio Security, Secure Authentication, Fingerprint Biometric.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 160

PDF Views: 1




  • A Review on Multi-Bio-Authentication System and Analysis of Security

Abstract Views: 160  |  PDF Views: 1

Authors

Markus Reischl
Department of Computer Science, University of Helsinki, Helsinki, Finland
K. Julisch
Department of Computer Science, University of Helsinki, Helsinki, Finland

Abstract


Authentication is the emerging process of identifying a user's uniqueness. It is a procedure of merging an incoming request with a set of known authentications. The identifications which are provided to authorize users are stored in a database on a local operating system or the server of authentication. Security system will search all the objects from the facts that it knows and discover the exact one of which the actual user is presently applied. An original user can be related with other conceptual user object in the system, and therefore the permissions and rights to the user is granted and that user identity is the main evidence to the system which is provided by user. The procedure of determining the rights of user offered evidence is referred as authentication and the throughout process of authentication is termed as credentials. To implement the security multi factor authentication system, there are multiple authentication methods available. Now a days an effective authentication system is provided by using the security concept of one time password and biometric system.

Keywords


Bio Security, Secure Authentication, Fingerprint Biometric.