加拿大论文代写:登录安全

08 2月 加拿大论文代写:登录安全

加拿大论文代写:登录安全

传统的登录方法有用户名、口令认证系统。令牌为基础的身份证系统已被使用,旁边的单点登录服务,使易于登录的用户。这些形式的鉴定主要是为了确保使用系统的人是被授权使用它的人。然而,这些形式的识别只是代理表示。他们可以轻易妥协或自己的用户可能会失去用户名或密码(Jain等人,2008)。此外,用户身份参数将需要定期更改,以确保参数不能丢失。
特别是金融系统将受益,因为这种生物认证。金融系统,如网上银行模块,自动取款机是进行金融交易的一些形式是需要密码。对于网上银行是一个安全的银行登录密码,信用卡借记卡交易,一次性口令OTP可能产生,在风格的ATM交易销安巴作为密码。然而,这种形式的密码受到严重损害,因为可以复制的数据(除了一次性密码)。有用于销黑客撇油器,同样的在线密码破解是因为他们的组合不是傻瓜证明在制造或因为按键记录器和其他恶意软件的使用。一些金融机构已经开始使用某种形式的手掌静脉认证系统的其中一个有效的客户将他们的手掌静脉确定(Jain等人,2008)。只有当客户的静脉图案通过红外线光源与现有红外模式相匹配时,金融交易才能通过。企业发现员工忘记密码或丢失这些通过存储诸如PDA结果问题的设备在金融交易的背景。企业必须聘请外部顾问或工作的认证系统,以进行交易,这导致安全问题。企业已经诉诸使用生物认证如手掌静脉认证的读者和语音识别过程,方便使用,更大的唯一性和安全性,产生的商业利益,可以收集。

加拿大论文代写:登录安全

Some of the traditional methods of logon have been in the form of the user name, password authentication system. Token based id card systems have been used, alongside single sign on services which enables ease of sign on for the user. These forms of identification primarily came into existence for ensuring that the person using a system is the person who is authorized to use it. However these forms of identification are only surrogate representations. They can be compromised easily or the user by themselves might lose the username or password (Jain et al, 2008). Furthermore the user identity parameters would need to be changed regularly in order to ensure that the parameters cannot be lost.
(c) Financial Transactions
Financial systems in particular will benefit because of this biometric authentication. Financial systems such as online banking modules, ATMs are some forms of conducting financial transactions were a password is required. For an online banking it is a secure banking logon password, for credit debit card transactions, a onetime password OTP might be generated, in ATM style transactions a PIN umber would be used as password. However such forms of passwords are heavily compromised because of the data that can be reproduced (except for the one time password). There are skimmers used for PIN hacking, similarly online passwords are hacked because of their combinations either not being fool proof in the making or because of the use of key loggers and other malicious softwares. Some financial institutions have already resorted to using a form of palm vein authentication system wherein a validity of the customer will be determined by their palm veins (Jain et al, 2008). The financial transaction will go through only when the vein pattern of the customer read through an infrared lighting source can be matched to the existing infrared patterns. In the context of financial transactions for business it has been noted that employees forgetting their passwords or losing the devices in which these pass are stored such as their PDAs results in problems. Businesses have to hire external consultants or work around the authentication system in order to conduct transactions and this results in security issues. Already businesses are resorting to using biometric authentication such as the palm vein reader and the voice recognizer for the authentication processes because of the convenience of use, the greater uniqueness and security that is generated and the commercial gain that could be gathered.