Professional Documents
Culture Documents
1. Abstract
2. Introduction
4. Methods of verification
a. Psychological verification
i. Finger Print.
v. DNA Analysis.
b. Behavioral verification
i. Typing.
ii. Signature.
iii. Voice.
5. Identification.
6. Verification.
7. Advantages
8. Limitations
9. Conclusion.
10. References
Abstract: something, which is related to
The present century has been one of many measurement. In network environment
scientific discoveries and technological security is a crucial factor. Provide
advancements. With the advent of security to pages in the network is to
technology came the issue of security. As difficulty. Password is not a good
computing systems became more measurement for security. Good security
complicated, there was an increasing need mechanism is necessary on the Internet.
for security. Security in different levels applies to
This paper deals with the concept of various documents. Security is depends
Biometrics which gives security to the how security assign to documents.
pages in the internet. There are two Security depends on following categories.
security methodologies which are 1. Confidential
discussed in the paper viz., Token-based 2. Secret
security and Secret based security. This 3. Non-secret
identifies the psychological and behavioral 4. Public
characteristics of the user. Web-Based Confidential pages over the
Enterprise Management (WBEM) supports network provide full security. No way to
a limited form of security for the tamper data in the page by third party. In
Microsoft® Windows® 98. There are this case biometrics are more useful and
many security mechanisms which are no way to disturb the page contents. First
followed in protecting the password our of all store all data about biometrics in
paper discuss some of those techniques. database after that tally with this data. If
There are several types of verification tally satisfies with backend then provide
methods. They are psychological access to the user. Collecting information
verification, behavioral verification etc. in is too difficult and store in database also
turn the above methods have sub methods need more space.
which are discussed along with their There are two security methodologies in
advantages and disadvantages. Biometrics, they are
1. Token-based security:
It relies on the users special item
Introduction:
-token like card-id.
Biometrics is an advanced
2. Secret based security:
technology for superb security and
It relies on an individual secret id
authentication .The very term "biometric”
number like password.
it represent that "bio" means related to the
Neither of the two can accurately
biological study and "metric " means
determine whether the password that
posses a token nor knows some secret Microsoft® Windows NT®.
information of the individual it represents.
In WBEM, all security accounts
Tokens can be stolen and information can
are referred to as subjects. There are two
be guessed or fraudulently obtained.
types of subjects: user and group. Users
Biometric is a technology where
are represented by instances of the
the password for entry is you, which
NTLMUser system class, which describes
identifies your psychological and
individual users. Groups are represented
behavioral characteristics.
by instances of the NTLMGroup system
Security and Authentication:
class, which describes multiple users. Both
Web-Based Enterprise the NTLMUser and NTLMGroup classes
Management (WBEM) supports a limited derive indirectly from the subject system
form of security for the Microsoft® class, an abstract class that is not intended
Windows® 98 platform that involves to be used for instantiation. More directly,
validating a user's logon for the local NTLMUser derives from the generic User
machine and for remote access. A class and NTLMGroup derives from the
validated user is granted access to the generic Group class.
entire Common Information Model (CIM)
Permissions:
schema. WBEM does not secure system
resources, such as individual classes, Microsoft SQL Server uses
secure operating system and does not specifies which users are authorized to use
provide a convenient way to manage the objects. They are granted and revoked by
Advantage:
4. Retinal scans:
Accuracy is better than
It involves imaging of the blood
fingerprint.
vessels in the retina of the eye when
Cheap and easy to deploy.
infrared light of a certain frequency and
Disadvantage:
wavelength is incident upon it.this energy
Complex in usage.
is absorbed by the blood vessels is
Implementation is
different in different individuals.
expensive.
The retinal iris patterns are unique
Any damages to hand effect
to individuals than any biometric yet
more.
devised.
3. Face measurement:
The retina is an internal part of the
Measuring this is as simple as
eye located at the back of the eye and is
taking a picture and analyzing the image
get of thin nerve which senses the light
from a security video capture. This
coming through a camera, pupil, and eye
technique enables the computer to use
lenses.
your face as your password and matching
The pattern of blood vessels which
these to an existing database.
makeup retina are unique to each
Advantage:
individual i.e., <1.2 inch.
Most continents at public
Advantage:
places.
Accurate with no false
Less expensive.
match in 2 million people.
Disadvantage:
It s sophisticated process.
Inaccurate is affected by
Disadvantages:
changes in lighting, age, and
Expensive, difficult to
movement, glass.
deploy and use.
Face creams also effect the
Focus of light effect
measurements.
measurements.
will notice that your typing has a certain
pattern. Some letters follow others in
quick succession, while others take longer.
Software called Bio password is
available for less than $100.It integrates
with Windows 2000.Windows NT.Login
to provide this authentication without the
5. DNA Analysis: need for any additional software. This
References:
http://Biometrics.com
http://whitepapers.com
http://www.milesresearch.com
http://microsoft/biometrics.com
IT Magazines