ComputersInformation Technology

Authentication is the verification of identity on the Internet

We all easily know each other in everyday life. Friends are recognized in person, and unfamiliar - on the passport or another document, where there is a photo that confirms the identity. But how to identify a person who is behind a computer on the other side of the Web? This task is much more complicated, and here we use a specific method - authentication. This is a way to verify identity on the Internet.

To authenticate users, they usually use a certain software module that is located directly on the computer to which the person wants to get remote or direct access. Conditionally, the work of such a module is divided into two stages:

- preliminary. Here, a "reference sample" is formed. For example, a password can be requested. Also, the verification code can be assigned by the system;

- the final stage. This is the authentication pass. Here, the requested identification information is compared with the reference. Based on the results of such verification, the user is considered to be recognized or unidentified.

Authentication is a procedure that is carried out using information from three main types:

- the user demonstrates to the computer something unique that he knows in advance. The most common type is password authentication. This is a simple, but not the most reliable way;

- the user has an item with unique characteristics or content. As such an object can act as a SIM card, a card with a magnetic strip, USB token, electronic tablet iButton. Each such item contains information that determines its uniqueness. The simplest case is that the user's ID and password are read from the media and fed to the authentication module. In a complex case, there is a cryptographic key on the medium;

- in another case, information for verification of the user is an integral part of it. By this principle, biometric authentication is built. Here, for example, a fingerprint can be used as information.

The last - biometric - authentication should be discussed separately. Once encountered only in fantastic works, these technologies are in our time at the stage of rapid development. Here, as authenticators, the original characteristics of a person are used, which are inherent only to him. Especially often, fingerprints, an iris card, facial features are used.

As unique attributes, the characteristics of a person's voice, handwritten signature samples, hand geometry, "keyboard handwriting" (the intervals between the keystrokes that make up the word code, and the intensity of the presses) are also used. But such technologies are less common. Also, authentication systems specifically for operating systems are being developed, for example, NTLM authentication created by Microsoft for Windows NT.

Disadvantages of Authentication

The greatest number of weaknesses in password authentication. A secret word can be stolen from the owner or hacked by him. Often, users choose easy-to-guess simple passwords: the derivative of the identifier (often it is the identifier itself), the word of a language, and so on.

Not without its shortcomings is subjective authentication. This kidnapping or taking the object away from the owner. In addition, to work with objects you will need special equipment. Also often for unauthorized access , copies or emulators of the object are made.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.birmiss.com. Theme powered by WordPress.