Authentication Technology

4.5 Authentication Technology

The concept of Authentication: Authentication is the most important link in e-commerce. It is usually divided into digital Authentication and biological Authentication.

4.5.1 Digital Authentication Technology

Digital Authentication is to use encryption to realize the Authentication. The most common Authentication is password. However, as far as the security is concerned, password is the most insecure Authentication. E-commerce transactions usually use digital signature to implement Authentication, as introduced in the previous part.

Digital Authentication is by now the most reliable and commonly used one, but its weak points are also obvious. The biggest problem is that the digital

4 Security Technologies in E-commerce

signature with public key encryption requires tremendous computation. Generally it is impossible to compute instantly with respect to public key encryption. Therefore on some occasions where the requirements for security are not so high, some simpler Authentication such as password is used. In addition, there are some Authentication methods such as biological Authentication.

4.5.2 Biological Verification Technology

Because of the importance of identity Authentication, aside from the above- mentioned Authentication, there are many other ways based on the user’s biological characteristics, such as face ID Authentication, fingerprint ID Authentication, iris ID Authentication, palmprint ID Authentication, voice ID Authentication and manual signature ID Authentication, etc.

1. Fingerprint Authentication

Fingerprint Authentication is one of the oldest biological Authentication, which has been successfully applied to many areas. Fingerprint refers to the lines on the surface of a fingertip. The details of the fingerprint constitute the unique information of the fingerprint. A Authentication procedure includes three parts: pattern extraction, fingerprint classification and match decision. Pattern extraction means extracting details from the fingerprint image; the fingerprint images are classified to promote the Authentication speed; match decision determines if two fingerprints come from the same finger.

Figure 4.3 Automatic fingerprint identification systems

2. Iris Authentication

Iris is the ring area between pupil and sclera. Compared with other biological Authentication, Iris Authentication is highly unique, stable, anti-fake, and useable. The procedure of iris Authentication includes: iris location, iris alignment, pattern expression, and match decision. Iris location extracts iris from the whole image; iris alignment determines the corresponding relation between the structures of two images; pattern expression captures the unique spatial characters of the iris;

Introduction to E-commerce

match decision uses the Hamming distance to represent the match degree. This procedure requires little computation, and consequently enables this Authentication to be used in the large database, as illustrated in Fig. 4.4.

Figure 4.4 Illustration of iris verification system

3. Face Authentication

Face Authentication is an active research domain. Although the accuracy of face Authentication is lower than iris and fingerprint Authentication, it is simple, natural and harmless to the user. So, it has become the most acceptable way in biological Authentication. There are two steps involved in face Authentication: location of the face in the image; pattern extraction for matching decision. In the current face Authentication, the background of the image is usually controllable or nearly controllable, which makes the location of face comparatively easier. However, because of the change of factors such as facial expression, location, direction, and light, the extraction of face is thus quite difficult.

4. Hand Shape Authentication

Hand Shape Authentication is the speediest one in biological Authentication since it is comparatively easy to measure the shape of hand and extract the image of hand-shape. However, characteristics of hand shape do not have high uniqueness, and cannot be used alone for Authentication as a result. Typical characteristics of hand shape include the length and width of fingers, thickness of palm, ration of length-to-width of fingers, etc.

5. Palmprint Authentication

Compared with fingerprint, palmprint Authentication is much highly accepted in that the main characteristics of palmprint are much more obvious than those of fingerprint. Furthermore, the main characteristics of palmprint are more stable

4 Security Technologies in E-commerce

and classifiable than those of fingerprint; therefore palmprint Authentication should be a method of ID Authentication with high potential of development. Current palmprint Authentication basically utilizes major lines and palmar creases.

6. Gait Authentication

Gait Authentication is a new domain of biometric Authentication technology. As

a traditional issue of pattern recognition, biometric Authentication is made by means of human physiological features or behavioral characteristics. The first generation of biometric Authentication, which utilizes facial features, fingerprints, and iris and so on, is based on the short-distance perception. As it turns out in the visual monitoring, gait is visible in the long distance, and it can be observed without bothering the person to be observed. These characteristics of gait arouse great interest among many researchers. HID (human identification at a distance) patronized by DARPA is a case in point.

Gait Authentication is a quite fresh direction, which aims at finding and extracting the change patterns from walking behaviors to realize automatic ID Authentication. An automatic gait Authentication system on safety monitoring occasions is illustrated in Fig. 4.5. The system integrates computer vision, pattern recognition and video/image sequence processing.

Figure 4.5 Illustration of gait identification system

7. Manual Signature Authentication

Manual Signature Authentication is a behavior Authentication technology. The difficulty lies in that the data is highly variable, even the signature of the same person will not be identical. According to the ways of obtaining data, the verification can be divided into two kinds: offline Authentication and online Authentication. Offline Authentication is to obtain the image of the signature via scanner; online Authentication is to use the digital word-pad or pressure-sensitive pen to record the process of writing (Fig. 4.6).

Introduction to E-commerce

Figure 4.6 Flow chart of online verification system

8. Voice Authentication

Voice Authentication is also a kind of behavior Authentication technology. Like other technology of this kind, the variation of voice is broad, and it is subject to the influence of background noises and the physical and mental status. A voice Authentication system usually consists of three parts: the partition of voice signal, pattern extraction and speaker Authentication. The partition of voice signal is to separate the important vocal part from the signal; pattern extraction is to extract the vocal features of the person to be verified; speaker Authentication is to make

a decision based on the comparison between the stored vocal features in the database and the extracted patterns.

The biological Authentication system stores the biological features and behavioral features of the users, and uses these features to replace password input. When the user’s features match those stored in the system, the user is verified and given the access to the system.

9. Comparison of biological Authentication technology

Each biological verification technology has its own advantages and disadvantages. The selection of a certain technology mainly depends on the application; none of these technology can surpass other technology in all respects. In this sense, any one of these technology is worth using. The security degree is dependent on the accuracy of these biological features. In practice these technology are usually used jointly rather than separately.

Dokumen yang terkait

AN ALIS IS YU RID IS PUT USAN BE B AS DAL AM P E RKAR A TIND AK P IDA NA P E NY E RTA AN M E L AK U K A N P R AK T IK K E DO K T E RA N YA NG M E N G A K IB ATK AN M ATINYA P AS IE N ( PUT USA N N O MOR: 9 0/PID.B /2011/ PN.MD O)

0 82 16

Anal isi s L e ve l Pe r tanyaan p ad a S oal Ce r ita d alam B u k u T e k s M at e m at ik a Pe n u n jang S MK Pr ogr a m Keahl ian T e k n ologi , Kese h at an , d an Pe r tani an Kelas X T e r b itan E r lan gga B e r d asarkan T ak s on om i S OL O

2 99 16

The Effectiveness of Computer-Assisted Language Learning in Teaching Past Tense to the Tenth Grade Students of SMAN 5 Tangerang Selatan

4 116 138

Modul TK E 2016 150 hlm edit Tina M imas

2 44 165

Membangun aplikasi e-commerce pada Toko Reafshop Bandung

1 26 687

Pengaruh Persepsi Kemudahan dan Kepuasan Wajib Pajak Terhadap Penggunaan E Filling (Survei Pada Wajib Pajak Orang Pribadi Di Kpp Pratama Soreang)

12 68 1

PENGARUH ARUS PENGELASAN TERHADAP KEKUATAN TARIK PADA PENGELASAN BIMETAL (STAINLESS STEEL A 240 Type 304 DAN CARBON STEEL A 516 Grade 70) DENGAN ELEKTRODA E 309-16

10 133 86

Factors Related to Somatosensory Amplification of Patients with Epigas- tric Pain

0 0 15

TEKNIK PERLAKUAN PENDAHULUAN DAN METODE PERKECAMBAHAN UNTUK MEMPERTAHANKAN VIABILITAS BENIH Acacia crassicarpa HASIL PEMULIAAN (Pretreatment Technique and Germination Method to Maintain the Viability of Acacia crassicarpa Improved Seed)

0 1 11

The Risk and Trust Factors in Relation to the Consumer Buying Decision Process Model

0 0 15