Authentication

Sort By:
Decent Essays
Good Essays
Better Essays
Amazing Essays
Best Essays
    Page 1 of 49 - About 481 Essays
  • Good Essays

    Biometric Authentication

    • 685 Words
    • 3 Pages

    For years, biometric authentication has been seen in movies and television shows as a purely fictional piece of technology. However, in the past two decades, biometric authentication has become so common is it everywhere from phones, to computers, and even national digital based identification systems. There are still concerns about the privacy that this type of identification may lack. There are three major categories of authentication: what you know, what you have, and what you are. (See Figure 1). What you are is the category that biometric authentication falls into because it measures authentication through mainly physiological means; the most common being finger print and iris scans. Biometrics are favored because they are less likely to change; finger prints don’t change over time and neither do irises. For mobile phones, a simple four number password is easy to hack and even guess, creating very little privacy. Even with more complicated passwords, there is still the strong chance personal information, such as credit card…

    • 685 Words
    • 3 Pages
    Good Essays
  • Amazing Essays

    When OpenID was first created and starting to be used by major companies as their go-to single sign-on solution, people were skeptical. Today, it is used just about everywhere and people do not usually think twice before using it to log into their favorite website. We will explore how the improvements OpenID has made over the years have caused it along with OAuth to become some of the most widely used cross-site authentication protocols. In this paper, we will also touch on what flaws still…

    • 1871 Words
    • 8 Pages
    Amazing Essays
  • Good Essays

    Acar, T., Belenkiy, M., & Küpçü, A. (2013). Single password authentication. Computer Networks, 57(13), 2597-2614. doi:10.1016/j.comnet.2013.05.007 This qualitative analysis illustrates the authors’ proposed protocols for a password authentication system requiring the user to remember only one login and password. Their protocols would allow access to either a cloud server or mobile device to handle all authentication needs. They analyze how the protocols would be resistant to online…

    • 1856 Words
    • 8 Pages
    Good Essays
  • Amazing Essays

    Abstract— The focus of this paper is to use Mobile-OTP and QR code in online banking authentication system to provide the best hacker security. Recently, personal information has been leaked through a high degree of methods, such as phishing or pharmacy, to capture user IDs and passwords. This will result in an inappropriate ID / password being propagated between different users; thus a secure user authentication system is essential. In this paper, we use a different technology to provide a…

    • 1446 Words
    • 6 Pages
    Amazing Essays
  • Good Essays

    Summary Of Authentication

    • 330 Words
    • 2 Pages

    On www.ahima.org I found an article that talks about electronic health record (EHR) and the electronic signatures used in today’s electronic age. Because more and more providers in the health care industry utilize the EHR, it is very important to understand the electronic signature and how it is used. The article explains authentication and the differences between an electronic signature, authorship and attestation. The article also discusses the purposes for an electronic signature and the…

    • 330 Words
    • 2 Pages
    Good Essays
  • Better Essays

    The History Of Passwords

    • 1495 Words
    • 6 Pages

    each user to have a lock for their own workspace and a private set of files (Hiscott). From the 1980s to 1990s, passwords evolved to include cryptographic hash, DES-based cryptography, salting, and strength checking. Cryptographer Robert Morris created a one-way encryption method, known as hashing, to convert passwords into numerical values (Hiscott). UNIX-based systems now use salting, a technique that adds characters to a password before converting it via a cryptographic function to increase…

    • 1495 Words
    • 6 Pages
    Better Essays
  • Amazing Essays

    Authentication and Digital signatures INTRODUCTION This paper will focus on Authentication and Digital Signatures, and outline strategies for Implementation, present techniques on how to apply, adapt, and extend Authentication and Digital Signatures in areas such as encryption, and verification. Digital signatures prevent persons from acting as the originator of a specific document, which is comparable to forgery on a printed text. Authentication is the primary and most critical line of defense…

    • 1445 Words
    • 6 Pages
    Amazing Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Good Essays

    Single-Sign-On Case Study

    • 892 Words
    • 4 Pages

    Smart cards rely on two-factor authentication. The smart card can be locked, and only the user who possesses the card and knows the correct personal identification number (PIN) can unlock it. The Kerberos-based SSO on the other hand does not require password from the user. The smart card also has improved performance. Some sophisticated smart cards contain hardware-based encryption chips that can provide better throughput than software-based implementations. A smart card can also store a…

    • 892 Words
    • 4 Pages
    Good Essays
  • Good Essays

    What form of authentication best meets the Person or Entity Authentication standard for different healthcare applications? The personal or entity authentication requires that all people who are using the system are identified and authenticated (Security Standards: Technical Safeguards). The basic authentication requires that the individuals who want to access the system are well identified. The identity authentication is put in place so as to ensure that the individuals who want to access the…

    • 1158 Words
    • 5 Pages
    Good Essays
  • Previous
    Page 1 2 3 4 5 6 7 8 9 49