Several Techniques of Authentication
The first technique for authentication is by using voice.
Unfortunately, its accuracy can be affected by things such as noise and the effects of illness or fatigue in the voice.
One real problem with the voice recognition is the system can be fooled by the sound of someone.
For this reason, advanced sound system must be able to expand or extend the verification process by giving the more difficult and longer words or asking a different word that is read every time.
The second technique is through palm introduction.
Same as fingerprint recognition, the biometric of palm focuses on a variety of arrangements, such as the edge parts and parts that are not worth to find on the palms.
The third technique is arm geometry.
Using this system, the user straightens his arm as directed by signs on the hardware of arm readers, captures three-dimensional images of the fingers and bones, and then saves the data in a template.
The fourth technique is finger geometry.
This equipment is same for systems of geometry.
The users place one or two fingers under a camera which captures the form and length of fingers and bones.
The system captures three-dimensional image and reconciles data with stored templates to determine the identity.
The fifth technique is signature verification.
This technique requires one main thing, that is public acceptance in general.
Society tends to accept a signature as proof of identity.
This verification can also be done automatically using digital image recognition techniques.
The sixth technique is dynamic keystroke.
This is an authentication technique which is most unique.
This technique sees how you are typing the password on the keyboard.
So, even though someone has stolen your password, the thief will not be able to break into your system because of the way each person in typing on the keyboard will always differ from one other.
Unfortunately, its accuracy can be affected by things such as noise and the effects of illness or fatigue in the voice.
One real problem with the voice recognition is the system can be fooled by the sound of someone.
For this reason, advanced sound system must be able to expand or extend the verification process by giving the more difficult and longer words or asking a different word that is read every time.
The second technique is through palm introduction.
Same as fingerprint recognition, the biometric of palm focuses on a variety of arrangements, such as the edge parts and parts that are not worth to find on the palms.
The third technique is arm geometry.
Using this system, the user straightens his arm as directed by signs on the hardware of arm readers, captures three-dimensional images of the fingers and bones, and then saves the data in a template.
The fourth technique is finger geometry.
This equipment is same for systems of geometry.
The users place one or two fingers under a camera which captures the form and length of fingers and bones.
The system captures three-dimensional image and reconciles data with stored templates to determine the identity.
The fifth technique is signature verification.
This technique requires one main thing, that is public acceptance in general.
Society tends to accept a signature as proof of identity.
This verification can also be done automatically using digital image recognition techniques.
The sixth technique is dynamic keystroke.
This is an authentication technique which is most unique.
This technique sees how you are typing the password on the keyboard.
So, even though someone has stolen your password, the thief will not be able to break into your system because of the way each person in typing on the keyboard will always differ from one other.
Source...