preview

Key Role For The User Authentication

Good Essays

Section 1

Introduction:
User Authentication plays the key role for the users to make use of the resources available in any given Environment. With the advancements in technology, it has become quite easy for a person to find out ways to access the data of the other person. It is very important to verify the true identity of the person trying to access his/her data. The concerned organization or the business group has to make sure that the person trying to access is the right user of the data and care must be taken in such a way that the resources are not used for the wrong purposes. Making use of the correct resources by the right person in a right way is the purpose behind the authentication. A customer is mainly concerned …show more content…

Whereas CBAT, a hardware based solution is the technology which is implemented in the user’s system, and it tries to evaluate the user by executing the logic implemented. The purpose of this survey is to highlight the various authentication methods with their advantages and disadvantages and to provide awareness to the individuals, so that suitable authentication method can be used in the correct scenario.

Section 2

The Biometric Feature authentication is the simplest method that analyzes the way the user types at the terminal by monitoring the keyboard inputs and identifies the users based on the habitual typing rhythm patterns. The core idea behind this approach is that the biometric features are unique to an individual and they cannot be imitated by any other person and they are unchangeable. The feature used is Typing Biometrics. After the user types the target string password, Four features (key code, two keystroke latencies, and key duration) were analyzed, combined and compared against the default samples which are already present in the adaptive mechanism template of the system, thereby authenticating the correct user. The advantage of this approach is its low cost, but it is limited to very few numbers of users and the main disadvantage is that this method is not effective if the length of the password is less than ten.

Gesture based and Lip feature based Representation approaches does

Get Access