Page 74 - DCAP516_COMPUTER_SECURITY
P. 74
Computer Security
Notes Many experts predict that user authentication will assume a major new network control function,
filling the void left by telephone numbers to identify users for billing voice, data and multimedia
services; define service assignments, such as three-way calling, incoming caller ID and voice
messaging; and provide security.
In an advanced, converged network of multiple user devices – desktops, laptops, personal
digital assistants and cell phones – each conducting multiple simultaneous sessions with a
dynamically assigned temporary client address, there will be an infinite mix of user authentication
requirements to accurately and securely provide and bill services. Once user authentication has
assumed this role, control of the network, from infrastructure to services, will have completed
its migration to software.
6.8 Biometrics
Biometric devices authenticate users to access control systems through some sort of personal
identifier such as a fingerprint, voiceprint, iris scan, retina scan, facial scan, or signature dynamics.
The nice thing about using biometrics is that end-users do not lose or misplace their personal
identifier. It’s hard to leave your fingers at home. However, biometrics have not caught on as
fast as originally anticipated due to the false positives and false negatives that are common
when using biometric technologies.
Biometric authentication systems employ unique physical characteristics (or attributes) of an
individual person in order to authenticate the person’s identity. Physical attributes employed in
biometric authentication systems include fingerprints, hand geometry, handwritten signatures,
retina patterns and voice patterns. Biometric authentication systems based upon these physical
attributes have been developed for computer login applications.
Figure 6.2: Various Biometric Techniques
68 LOVELY PROFESSIONAL UNIVERSITY