Would you like to react to this message? Create an account in a few clicks or log in to continue.


ICT FORUM
 
HomeHome  PortalPortal  Latest imagesLatest images  SearchSearch  RegisterRegister  Log inLog in  

 

 Method of authentication

Go down 
4 posters
AuthorMessage
amanda

amanda


Posts : 10
Join date : 21/02/2012

Method of authentication  Empty
PostSubject: Method of authentication    Method of authentication  Icon_minitimeSun May 13, 2012 7:05 am

Like a Star @ heaven Retinal scanning Very Happy

Like a Star @ heaven Voice recognition Very Happy

Like a Star @ heaven Signature verification system Very Happy

Very Happy Very Happy Very Happy Very Happy Very Happy Very Happy Very Happy Very Happy Very Happy
Back to top Go down
fredo

fredo


Posts : 5
Join date : 21/02/2012

Method of authentication  Empty
PostSubject: definition(retinal scanning)   Method of authentication  Icon_minitimeWed May 16, 2012 7:41 am

retinal scanning

-involves the scanning of retina and analysing the layer of blood vessels at the back of the eye
Embarassed Embarassed Embarassed Embarassed Shocked Shocked Shocked bounce bounce bounce cat cat cat cat pig pig pig pig pig pig pig pig pig santa santa santa santa santa santa
Back to top Go down
dero

dero


Posts : 5
Join date : 21/02/2012
Age : 27

Method of authentication  Empty
PostSubject: definition(voice recognition)   Method of authentication  Icon_minitimeWed May 16, 2012 7:45 am

voice recognition

-requires user to speak into a microphone.
-most voice recognition devices require the high and low frequencies of the sound to match.
affraid affraid affraid Suspect Suspect Suspect Suspect afro afro afro afro Basketball Basketball Basketball Basketball What a Face What a Face What a Face What a Face
Back to top Go down
lorina

lorina


Posts : 5
Join date : 21/02/2012

Method of authentication  Empty
PostSubject: definition(signature verification system)   Method of authentication  Icon_minitimeWed May 16, 2012 7:48 am

signature verification system

-the authenticity of a writer is determined by comparing an input signature
Rolling Eyes Rolling Eyes Rolling Eyes Rolling Eyes geek geek geek geek scratch scratch scratch scratch drunken drunken drunken drunken monkey monkey monkey monkey silent silent silent silent
Back to top Go down
lorina

lorina


Posts : 5
Join date : 21/02/2012

Method of authentication  Empty
PostSubject: method of authentication(biometric devices)   Method of authentication  Icon_minitimeWed May 16, 2012 7:52 am

biometric devices

flower fingerprint recognition

flower facial recognition

flower hand geometry scanning

flower iris scanning

Back to top Go down
dero

dero


Posts : 5
Join date : 21/02/2012
Age : 27

Method of authentication  Empty
PostSubject: definition(fingerprint recognition)   Method of authentication  Icon_minitimeWed May 16, 2012 7:56 am

fingerprint recognition

-measure blood flow, or check for correctly arrayed ridges of the edges of the fingers.
bom bom bom bom Mad Mad Mad Mad Idea Idea Idea Idea Twisted Evil Twisted Evil Twisted Evil Twisted Evil afro afro afro afro
Back to top Go down
dero

dero


Posts : 5
Join date : 21/02/2012
Age : 27

Method of authentication  Empty
PostSubject: definition(facial recognition)   Method of authentication  Icon_minitimeWed May 16, 2012 7:58 am

facial recognition

-analyses the characteristics of an individual's face images captured through a digital video
Back to top Go down
fredo

fredo


Posts : 5
Join date : 21/02/2012

Method of authentication  Empty
PostSubject: definition(hand geometry scanning)   Method of authentication  Icon_minitimeWed May 16, 2012 8:00 am

hand geometry scanning

-involves the measurement and analysis of the shape of one's shape
afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro
Back to top Go down
lorina

lorina


Posts : 5
Join date : 21/02/2012

Method of authentication  Empty
PostSubject: iris scannning   Method of authentication  Icon_minitimeWed May 16, 2012 12:38 pm

clown Analyses the features that exists in the coloured tissues surrounding the pupil which has more than 200 points which can be used as comparison, including rings, furrows and freckles.


No No No No No No No No No No No No No No No No No No No
Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed Embarassed
Back to top Go down
fredo

fredo


Posts : 5
Join date : 21/02/2012

Method of authentication  Empty
PostSubject: CALLBACK SYSTEM   Method of authentication  Icon_minitimeWed May 16, 2012 12:47 pm

Callback System


Surprised The Callback System is commonly used in the bank operation and business transaction .

pale pale pale pale pale pale pale pale pale pale pale pale pale pale pale
afro afro afro afro afro afro afro afro afro afro afro afro afro afro afro

lol! affraid
Back to top Go down
Sponsored content





Method of authentication  Empty
PostSubject: Re: Method of authentication    Method of authentication  Icon_minitime

Back to top Go down
 
Method of authentication
Back to top 
Page 1 of 1
 Similar topics
-
» What is Authentication?
» Method Of Verification
» Why is authentication important?
» method of controlling access to the internet.

Permissions in this forum:You cannot reply to topics in this forum
 :: LA1: ICT & SOCIETY :: Authentication & Verification-
Jump to: