/ / Authentication is an identity verification on the Internet

Authentication is the verification of identity on the Internet

We all easily know each other in the ordinarylife. Friends are recognized in person, and unfamiliar - on the passport or another document, where there is a photo that confirms the identity. But how to identify a person who is behind a computer on the other side of the web? This task is much more complicated, and here we use a specific method - authentication. This is a way to verify the identity on the Internet.

authentication is

To authenticate users, usuallyuse a certain software module that is directly on the computer to which the person wants to get remote or direct access. Conditionally, the work of such a module is divided into two stages:

- preliminary. Here, a "reference sample" is formed. For example, a password can be requested. Also, the verification code can be assigned by the system;

biometric authentication

- the final stage. This is the authentication pass. Here, the requested identification information is compared with the reference. Based on the results of such verification, the user is considered to be recognized or unidentified.

Authentication is a procedure that is carried out using information from three main types:

- the user demonstrates to the computer something unique that he knows in advance. The most common type is password authentication. This is a simple, but not the most reliable way;

- the user has an item with uniquecharacteristics or content. As such an object can act as a SIM card, a card with a magnetic strip, USB token, electronic tablet iButton. Each such item contains information that determines its uniqueness. The simplest case is that the user's ID and password are read from the media and fed to the authentication module. In a complex case, there is a cryptographic key on the medium;

- in another case, information for verificationuser - an integral part of it. By this principle, biometric authentication is built. Here, for example, a fingerprint can be used as information.

About the last - biometric - authenticationit is necessary to talk separately. Once encountered only in fantastic works, these technologies are in our time at the stage of rapid development. Here, as authenticators, the original characteristics of a person are used, which are inherent only to him. Especially often, fingerprints, the iris card, facial features are used.

ntlm authentication

As unique features are also usedcharacteristics of a person's voice, handwritten signature samples, hand geometry, "keyboard handwriting" (the intervals between the keystrokes that make up the word code, and the intensity of the presses). But such technologies are less common. Also, authentication systems specifically for operating systems are being developed, for example, NTLM authentication created by Microsoft for Windows NT.

Disadvantages of Authentication

The greatest number of weaknesses in the passwordauthentication. Secret words can be stolen from the owner or hacked by him. Often, users choose easy-to-guess simple passwords: the derivative of the identifier (often it is the identifier itself), the word of a language, and so on.

There is also no lack of substantive authentication. This kidnapping or taking away the object from the owner. In addition, to work with objects you will need special equipment. Also often for unauthorized access, copies or emulators of the object are made.

Read more: