O'Reilly logo

Biometrics for Network Security by Paul Reid

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Authentication Technologies

Everywhere you go, you are constantly identifying and authenticating whomever you see. For example, the way you would identify a friend in a crowded mall is to look for familiar features. Is the person male or female? What color is his/her hair? Is he/she short or tall? Is he/she wearing a familiar piece of clothing? When your friend sees you looking at him/her, that friend may respond by greeting you by name. By using your previous knowledge, you have authenticated that person as your friend. Can we be assured that we have the right person? Probably not 100%, but we have mitigated the risks and come to an acceptable level of comfort with his/her identity.

The above scenario is very similar to what a computer ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required