A K Project

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

PROJECT: USER AUTHENTICATION

Submitted By:- B.Tech.(C.S.E)3rd Year


Aditya Kumar

Animesh Kahyap
Invertis University Bareilly.
Gaurav Singh Guided by-
Akhilesh Nirala
Mr.Chandan Kumar
CONTENT

>>User Authentication
-Password Authenticaton
-Biometrics
-Voice Recognition
-Email Authentication
1. WHAT USER AUTHENTICATION IS

• User authentication is a security process that covers all of the human-to-


computer interactions that require the user to register and log in. Said
more simply, authentication asks each user, “who are you?” and verifies
their response.
• When a user registers for an account, they must create a unique ID and key
that will allow them to access their account later on. Generally, a username
and password are used as the ID and key
THE IMPORTANCE OF USER
AUTHENTICATION

• Understanding user authentication is crucial because it’s a key step in the


process that keeps unauthorized users from gaining access to sensitive
information. A strengthened authentication process ensures that User A only has
access to the information they need and can’t see the sensitive information of
User B.
• When your user authentication isn’t secure, however, cybercriminals can
hack the system and gain access, taking whatever information the user is
authorized to access. 
2.PASSWORD-BASED USER AUTHENTICATION
METHODS

• Most users are familiar with passwords. In fact, passwords have been the tried-and-true
method for user authentication since the beginning of the internet. You probably have quite
a few passwords yourself!
• A password-based user authentication process generally looks like this:
• When you land on the page, you’ll be asked to enter your username and password.
• Your credentials are sent to the website’s server and compared with the information they
have on file.
• When a match is found, you’ll be able to enter your account.
BIOMETRICS
3.ABOUT BIOMETRICS

• Fingerprint and iris scanning, facial recognition, and other types of verification through biological characteristics all fall under
the category of biometrics and are considered an “inheritance” authentication factor.
• This type of user authentication is often considered one of the most secure options for users because everyone’s biological
characteristics are unique and can’t be easily duplicated. 
• Biometrics can also provide a user experience that is convenient and easy to understand. For example, with fingerprint
authentication, the user only needs to complete one step—the rest is the system’s responsibility:
• The user presses his finger on the scanner and waits for the system to grant him access.
• Behind the scenes, the system compares the fingerprint scanned with the original print on file.
• If the two match, the system grants the user access.
3.VOICE RECOGNITION

• Voice recognition is a form of biometrics, and voice authentication is the use


of a user's speech to authenticate users. Like fingerprints and facial scans,
voice and user speech can serve as a unique marker of a user's ID.
HOW DOES VOICE RECOGNITION WORKS

• Voice biometric recognition works by inputting the the voice of the


individual whose identity has to be stored in the system. This input is kept as
a print for authentication. The input print is made with software that can split
the voice statement into multiple frequencies.
EMAIL AUTHENTICATION
4.EMAIL AUTHENTICATION

• Email authentication is one of the most


universally accessible types of 
passwordless user authentication,
largely because anyone with an email
account can use this method. Thanks to
this method, users can create an account,
log in, and access their sensitive data
with just a click of a button!
HOW TO IMPROVE USER AUTHENTICATION

• Longer passwords are more secure. Security experts suggest that you create
passwords with a minimum of 8 characters, but we recommend that you create
passwords closer to 12 characters in length.
• Passwords should have a mix of characters. Passwords with a random combination
of uppercase and lowercase letters, numbers, and symbols are harder to crack. 
• Users should avoid using formulas when generating passwords. The truth is that
patterns and formulas make it easy for hackers to guess your password and can offer
users a false sense of security.
REFRENCE
• From Internet
• Under Chandan Kumar Sir Guidence
THANK YOU

You might also like