Skip to Main Content
Operating Systems: Concurrent and Distributed Software Design
book

Operating Systems: Concurrent and Distributed Software Design

by Jean Bacon, Tim Harris
March 2003
Intermediate to advanced content levelIntermediate to advanced
912 pages
27h 17m
English
Pearson Business
Content preview from Operating Systems: Concurrent and Distributed Software Design

30.4. Authentication by PIN

In Section 30.2 we considered payment by cheque, credit card and debit card. In all of these cases a handwritten signature was the basis for authenticating the purchaser. In the next section we consider automatic teller machines (ATMs) which are EFT terminals which give cash dispensing and other banking services. For these machines a handwritten signature is not used. Before going on to the design of an ATM system we first consider authentication by personal identification numbers (PINs), a method suitable for banking and other applications. As well as being an authentication mechanism that is easier to automate than handwritten signatures, the PIN method has also been found to be very much less subject to fraud.

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Principles of Concurrent and Distributed Programming, Second Edition

Principles of Concurrent and Distributed Programming, Second Edition

M. Ben-Ari
Operating Systems in Depth

Operating Systems in Depth

Thomas W. Doeppner

Publisher Resources

ISBN: 0321117891Purchase book