Password How the systems work The purpose

Passwordand Fingerprint Recognition Authentication Systems AbstractThis report investigates password and fingerprintauthentication systems,    Table of Contents Abstract. 1 1.

0 Introduction. 1 2.0 How the systems work. 1 2.1 How password authentication systems work. 2 2.

Sometimes it is hard to do all the work on your own
Let us help you get a good grade on your paper. Get expert help in mere 10 minutes with:
  • Thesis Statement
  • Structure and Outline
  • Voice and Grammar
  • Conclusion
Get essay help
No paying upfront

2 How fingerprint recognition authentication systems work. 2 3.0 Security methods used by the authentication systems for protecting its data. 2 3.

1 Security methods used by password authentication systems. 2 3.2 Security methods used by fingerprint authentication systems. 2  1.0 IntroductionThe majority of the companies have physicalassets like expensive hardware and servers that contain confidential data oftheir customers or employees, which are extremely valuable, not only for moneybut also for legal issues. These assets should be available for access andmodification only from authorized persons like the system administrator, butunfortunately that’s not always the case.

To protect their assets and decrease the riskof human disaster threat, most companies use the two most commonly usedauthentication systems, password and biometric. This report is focused on thephysical access control this authentication systems offer.2.0 How the systems workThe purpose of both password and fingerprint recognition authenticationsystems is to determinate whether someone is in fact who is declared to be andas a result allow physical access to that person. To achieve their goal, thesystems use different authentication methods. 2.

1 How password authentication systems workThe way password authentication systems work is by comparinga given username or ID and a password with the corresponding credentials insidea database that holds all authorized users and their password. With thatauthentication method, password authentication systems have 100% chance of knowingwhether someone is a legitimate user or not. 2.2 How fingerprint recognition authentication systemsworkThe very first time a user registers into a server byfingerprint recognition authentication system, a procedure called enrolmenttakes place, which translates illuminated images of the fingerprint intodigital code. After the enrolment iscomplete, if the user wants to get physical access to the server, must scan theirfingerprint again, then the verification procedure happens, which uses acapacitive scanner that measures their finger electrically. When a finger ispushed on a surface, the ridges in the fingerprint touch the surface while thehollows between the ridges stand slightly clear of it. A capacitive scanner builds up a picture of the fingerprintby measuring these distances and then translates that picture into a digitalcode which is finally compared with the previously stored sample. Even if thiscomparison is happening in less than a second, there is no clear answer whethera fingerprint scanned is the same as the one saved inside the database, butonly a percentage of similarity called authentication threshold of the twosamples in term of distance pattern, which is set by the system administrator.

    3.0 Securitymethods used by the authentication systems for protecting its dataDa  3.1Security methods used by password authentication systemsPassword authentication systems are not saving passwords as cleartext but as an irreversible coded form which is generated using hash algorithmslike MD5, SHA-1, etc. Just using hash algorithms is not enough for a password tobe protected, because if two users have the same password then the hash counterpartswould be the same, and as a result leaving the system more vulnerable to potentialattacks.To fix this issue a computer random generated component calledsalt is added to the password before is inputted into the hash algorithm, by doingthat, every password in the database is unique even if is identical to another   3.2Security methods used by fingerprint authentication systems


I'm Gerard!

Would you like to get a custom essay? How about receiving a customized one?

Check it out