Professional Documents
Culture Documents
A K Project
A K Project
A K Project
Animesh Kahyap
Invertis University Bareilly.
Gaurav Singh Guided by-
Akhilesh Nirala
Mr.Chandan Kumar
CONTENT
>>User Authentication
-Password Authenticaton
-Biometrics
-Voice Recognition
-Email Authentication
1. WHAT USER AUTHENTICATION IS
• Most users are familiar with passwords. In fact, passwords have been the tried-and-true
method for user authentication since the beginning of the internet. You probably have quite
a few passwords yourself!
• A password-based user authentication process generally looks like this:
• When you land on the page, you’ll be asked to enter your username and password.
• Your credentials are sent to the website’s server and compared with the information they
have on file.
• When a match is found, you’ll be able to enter your account.
BIOMETRICS
3.ABOUT BIOMETRICS
• Fingerprint and iris scanning, facial recognition, and other types of verification through biological characteristics all fall under
the category of biometrics and are considered an “inheritance” authentication factor.
• This type of user authentication is often considered one of the most secure options for users because everyone’s biological
characteristics are unique and can’t be easily duplicated.
• Biometrics can also provide a user experience that is convenient and easy to understand. For example, with fingerprint
authentication, the user only needs to complete one step—the rest is the system’s responsibility:
• The user presses his finger on the scanner and waits for the system to grant him access.
• Behind the scenes, the system compares the fingerprint scanned with the original print on file.
• If the two match, the system grants the user access.
3.VOICE RECOGNITION
• Longer passwords are more secure. Security experts suggest that you create
passwords with a minimum of 8 characters, but we recommend that you create
passwords closer to 12 characters in length.
• Passwords should have a mix of characters. Passwords with a random combination
of uppercase and lowercase letters, numbers, and symbols are harder to crack.
• Users should avoid using formulas when generating passwords. The truth is that
patterns and formulas make it easy for hackers to guess your password and can offer
users a false sense of security.
REFRENCE
• From Internet
• Under Chandan Kumar Sir Guidence
THANK YOU