Google search

Search IT Security Blog:


Friday, August 28, 2009

Authentication methods

There are several aunthentication method avaliable to use in securing an application

Password

A password is a form of authentication which uses secret data to control access to something.

Seals

A seal is a kind of device, an emblematic design used to identify the adopter.
A seal can be a wax seal bearing an impressed figure, or an embossed figure in paper, with the purpose of authenticating a document, but the term can also mean any device for making such impressions or embossments, essentially being a mould that has the mirror image of the figure in counter-relief, such as mounted on rings known as signet rings. This article is concerned with devices and methods for making such imprints.

If the imprint is made as a relief resulting from the greater pressure on the paper where the high parts of the seal touch, the seal is known as a dry seal; in all other cases a liquid or liquified medium (such as ink or wax) is used, usually in another color than the paper's.

Smart cards

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card with embedded integrated circuits which can process data. This implies that it can receive input which is processed — by way of the ICC applications — and delivered as an output. There are two broad categories of ICCs. Memory cards contain only non-volatile memory storage components, and perhaps some specific security logic. Microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally PVC, but sometimes ABS. The card may embed a hologram to avoid counterfeiting. Using smartcards also is a form of strong security authentication for single sign-on within large companies and organizations.

Biometrics

iometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance.

Biometric characteristics can be divided in two main classes:

Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent.

Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics for this class of biometrics.

Message authentication codes

In cryptography, a message authentication code (often MAC) is a short piece of information used to authenticate a message.

A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC (sometimes known as a tag). The MAC value protects both a message's data integrity as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content, and so should be called Message Authentication and Integrity Code: (MAIC).


Watermarking

A number of authentication systems are known by the general term of "watermarking" methods, since they rely on embedding authentication information into another information bearer, by analogy with the watermarking of paper.

A watermark is a recognizable image or pattern in paper that appears as various shades of lightness/darkness when viewed by transmitted light (or when viewed by reflected light, atop a dark background), caused by thickness variations in the paper. There are two main types of watermark, the Dandy Roll process, and the more complex Cylinder Mould process. A watermark is very useful in the examination of paper because it can be used for dating, identifying sizes, mill trademarks and locations, and the quality of a paper.

Watermarks vary greatly in their visibility; while some are obvious on casual inspection, others require some study to pick out. Various aids have been developed, such as watermark fluid that wets the paper without damaging it. Encoding an identifying code into digitized music, video, picture, or other file is known as a digital watermark.

1 comment:

  1. electronic signature software
    All the authentication methods are useful options but choosing a particular scheme primarily depends of the nature of work and level of security needed. Thanks for explaining all these options.

    ReplyDelete