Authentication

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 1 of 50 - About 500 Essays
  • Improved Essays

    Biometric Authentication

    • 685 Words
    • 3 Pages

    For years, biometric authentication has been seen in movies and television shows as a purely fictional piece of technology. However, in the past two decades, biometric authentication has become so common is it everywhere from phones, to computers, and even national digital based identification systems. There are still concerns about the privacy that this type of identification may lack. There are three major categories of authentication: what you know, what you have, and what you are. (See Figure 1). What you are is the category that biometric authentication falls into because it measures authentication through mainly physiological means; the most common being finger print and iris scans. Biometrics are favored because they are less likely to change; finger prints don’t change over time and neither do irises. For mobile phones, a simple four number password is easy to hack and even guess, creating very little privacy. Even with more complicated passwords, there is still the strong chance personal information, such as credit card…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It has been a long established conceit that two actor authentication is essential for secure remote access scenarios. Anyone who has accessed private networks from the internet is familiar with the concept in one form or another. Whether the additional factors include Smart Badges, Security Tokens, Soft Certificates (encrypted code downloaded to a device to identify it as genuine), or a combination of the above, using two factor authentication has become a familiar and even expected part of our…

    • 836 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    When OpenID was first created and starting to be used by major companies as their go-to single sign-on solution, people were skeptical. Today, it is used just about everywhere and people do not usually think twice before using it to log into their favorite website. We will explore how the improvements OpenID has made over the years have caused it along with OAuth to become some of the most widely used cross-site authentication protocols. In this paper, we will also touch on what flaws still…

    • 1871 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Acar, T., Belenkiy, M., & Küpçü, A. (2013). Single password authentication. Computer Networks, 57(13), 2597-2614. doi:10.1016/j.comnet.2013.05.007 This qualitative analysis illustrates the authors’ proposed protocols for a password authentication system requiring the user to remember only one login and password. Their protocols would allow access to either a cloud server or mobile device to handle all authentication needs. They analyze how the protocols would be resistant to online…

    • 1856 Words
    • 8 Pages
    Improved Essays
  • Great Essays

    Abstract— The focus of this paper is to use Mobile-OTP and QR code in online banking authentication system to provide the best hacker security. Recently, personal information has been leaked through a high degree of methods, such as phishing or pharmacy, to capture user IDs and passwords. This will result in an inappropriate ID / password being propagated between different users; thus a secure user authentication system is essential. In this paper, we use a different technology to provide a…

    • 1446 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Summary Of Authentication

    • 330 Words
    • 2 Pages

    On www.ahima.org I found an article that talks about electronic health record (EHR) and the electronic signatures used in today’s electronic age. Because more and more providers in the health care industry utilize the EHR, it is very important to understand the electronic signature and how it is used. The article explains authentication and the differences between an electronic signature, authorship and attestation. The article also discusses the purposes for an electronic signature and the…

    • 330 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Authentication and Digital signatures INTRODUCTION This paper will focus on Authentication and Digital Signatures, and outline strategies for Implementation, present techniques on how to apply, adapt, and extend Authentication and Digital Signatures in areas such as encryption, and verification. Digital signatures prevent persons from acting as the originator of a specific document, which is comparable to forgery on a printed text. Authentication is the primary and most critical line of defense…

    • 1445 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    The History Of Passwords

    • 1495 Words
    • 6 Pages

    each user to have a lock for their own workspace and a private set of files (Hiscott). From the 1980s to 1990s, passwords evolved to include cryptographic hash, DES-based cryptography, salting, and strength checking. Cryptographer Robert Morris created a one-way encryption method, known as hashing, to convert passwords into numerical values (Hiscott). UNIX-based systems now use salting, a technique that adds characters to a password before converting it via a cryptographic function to increase…

    • 1495 Words
    • 6 Pages
    Superior Essays
  • Decent Essays

    1.02.01 Warning Banner

    • 567 Words
    • 3 Pages

    connections, network devices). Login banners must be approved by the Information Risk Management Organization and the Legal Department and must adhere to all government regulations and UnitedHealth Group directives. Modify Statement Where possible, a login / warning banner must be displayed on information technology systems upon login (e.g., servers, desktops, VPN connections, network devices, application elevations). Login banners must be approved by the Information Risk Management…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Single-Sign-On Case Study

    • 892 Words
    • 4 Pages

    Smart cards rely on two-factor authentication. The smart card can be locked, and only the user who possesses the card and knows the correct personal identification number (PIN) can unlock it. The Kerberos-based SSO on the other hand does not require password from the user. The smart card also has improved performance. Some sophisticated smart cards contain hardware-based encryption chips that can provide better throughput than software-based implementations. A smart card can also store a…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Previous
    Page 1 2 3 4 5 6 7 8 9 50