What are some of the strongest form of authentications? - ProProfs Discuss
Advertisement

What are some of the strongest form of authentications?

Asked by Logan, Last updated: Apr 09, 2024

+ Answer
Request
Question menu
Vote up Vote down

3 Answers

h.Jennifer

h.Jennifer

h.Jennifer
H.Jennifer

Answered Apr 23, 2018

Biometrics is the technical term for body estimations and figurings. It alludes to measurements identified with human qualities. Biometrics authentication is utilized as a part of computer science as a type of distinguishing proof and access control. It is likewise used to distinguish people in bunches that are under observation.

Biometric identifiers are the unmistakable, quantifiable attributes used to mark and depict people. Biometric identifiers are regularly sorted as physiological versus behavioral qualities. Physiological qualities are identified with the state of the body. Illustrations incorporate, yet are not restricted to unique fingerprints, palm veins, , DNA, palm print, hand geometry, eye verification , retina and smell/aroma. Behavioral attributes are identified with the example of conduct of a man, including yet not restricted to writing musicality, walk, and voice. A few analysts have authored the term behaviometrics to depict the last class of biometrics.

upvote downvote
Reply 

John Adney

John Adney

John Adney
John Adney

Answered May 18, 2017

Biometrics -biometrics is the use of authenticating a user by scanning on of their unique physiological body parts
upvote downvote
Reply 

John Smith

John Smith

John Smith
John Smith

Answered Sep 08, 2016

Biometrics -biometrics is the use of authenticating a user by scanning on of their unique physiological body parts. just like in the movies, a user places their hand on a finger print scanner or they put their eyes against a retinal scanner. if the image matches whats on the database, it authenticates the user. since a persons fingerprint, blood vessel print, or retinal image is unique the only way the system can authenticate is if the proper user is there. the only way an unauthorized user to get access is to physically kidnap the authorized user and force them through the system. for this reason, biometrics are the strongest (and the costliest) for of authentication.
upvote downvote
Reply 

Advertisement
Advertisement
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader

Email Sent
We have sent an email to your address "" with instructions to reset your password.