Password their finger electrically. When a finger is

Password
and Fingerprint Recognition Authentication Systems

 

Abstract

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

This report investigates password and fingerprint
authentication systems,

 

 

 

Table of
Contents
Abstract. 1
1.0
Introduction. 1
2.0
How the systems work. 1
2.1
How password authentication systems work. 2
2.2
How fingerprint recognition authentication systems work. 2
3.0
Security methods used by the
authentication systems for protecting its data. 2
3.1
Security methods used by password authentication systems. 2
3.2
Security methods used by fingerprint authentication systems. 2
 

1.0 Introduction

The majority of the companies have physical
assets like expensive hardware and servers that contain confidential data of
their customers or employees, which are extremely valuable, not only for money
but also for legal issues. These assets should be available for access and
modification only from authorized persons like the system administrator, but
unfortunately that’s not always the case.

To protect their assets and decrease the risk
of human disaster threat, most companies use the two most commonly used
authentication systems, password and biometric. This report is focused on the
physical access control this authentication systems offer.

2.0 How the systems work

The purpose of both password and fingerprint recognition authentication
systems is to determinate whether someone is in fact who is declared to be and
as a result allow physical access to that person. To achieve their goal, the
systems use different authentication methods.

 

2.1 How password authentication systems work

The way password authentication systems work is by comparing
a given username or ID and a password with the corresponding credentials inside
a database that holds all authorized users and their password. With that
authentication method, password authentication systems have 100% chance of knowing
whether someone is a legitimate user or not.

 

2.2 How fingerprint recognition authentication systems
work

The very first time a user registers into a server by
fingerprint recognition authentication system, a procedure called enrolment
takes place, which translates illuminated images of the fingerprint into
digital code.

 After the enrolment is
complete, if the user wants to get physical access to the server, must scan their
fingerprint again, then the verification procedure happens, which uses a
capacitive scanner that measures their finger electrically. When a finger is
pushed on a surface, the ridges in the fingerprint touch the surface while the
hollows between the ridges stand slightly clear of it.

A capacitive scanner builds up a picture of the fingerprint
by measuring these distances and then translates that picture into a digital
code which is finally compared with the previously stored sample. Even if this
comparison is happening in less than a second, there is no clear answer whether
a fingerprint scanned is the same as the one saved inside the database, but
only a percentage of similarity called authentication threshold of the two
samples in term of distance pattern, which is set by the system administrator.

 

 

 

 

3.0 Security
methods used by the authentication systems for protecting its data

Da

 

 

3.1
Security methods used by password authentication systems

Password authentication systems are not saving passwords as clear
text but as an irreversible coded form which is generated using hash algorithms
like MD5, SHA-1, etc. Just using hash algorithms is not enough for a password to
be protected, because if two users have the same password then the hash counterparts
would be the same, and as a result leaving the system more vulnerable to potential
attacks.

To fix this issue a computer random generated component called
salt is added to the password before is inputted into the hash algorithm, by doing
that, every password in the database is unique even if is identical to another

 

 

 

3.2
Security methods used by fingerprint authentication systems