Axborot texnologiyalari, tarmoqlar va telekommunikatsiyalar



Download 5,02 Mb.
Pdf ko'rish
bet160/222
Sana15.11.2022
Hajmi5,02 Mb.
#866857
1   ...   156   157   158   159   160   161   162   163   ...   222
Key words
: authentication, identification, methods, biometrical graphical 
password. 
Proper authentication of users is critical to the proper operation of secure 
systems such as those used in e-commerce. The traditional method of system 
authentication is for the user to supply a username and associated password. This 
has been increasingly inadequate in practice since users tend to use passwords that 
are too simple, rarely use password management systems, and often use the same 
password for multiple sites [1],[2]. 
It is important to distinguish between the various scenarios for 
authentication. These include: authenticating to a device (such as a mobile phone 
or computer), remote authentication via the web, and remote authentication via 
other protocols. The best choice for an authentication method varies for different 
scenarios. An authentication method that is acceptably secure in some instances 
would be insecure in others. For example passwords are harder to guess in an 
environment, such as an ATM that limits the number of guesses than in a file 
encryption scenario 
User identification and authentication methods take one of three general 
forms[3] 
1.
Something the user possesses such as a one-time password[4] generator, 
certificate, or smart card 
2.
Something the user knows, such as a password or the answer to a security 
question. The system must then have a method of checking the user response. 
3.
Something that the user is, as represented by a fingerprint or iris scan. 
Or “something you had once, something you’ve forgotten, or something you 
once were”. The common username and password authentication method would be 
classified as “something you’ve forgotten”. There have been several alternative 
authentication methods proposed including biometrics graphical passwords and 


International scientific conference "INFORMATION TECHNOLOGIES, NETWORKS AND 
TELECOMMUNICATIONS" ITN&T-2022 Urgench, 2022y April 29-30 
572 
public key authentication. These have their own limitations and drawbacks and 
none have replaced the username and password combination in common use 
though some have served as secondary authentication methods.[5] 
Considering the traditional username-password authentication, the 
alphanumeric passwords are either easy to guess or difficult to remember. Also, 
users generally keep the same passwords for all their accounts because it is 
difficult to remember a lot of them. Alternative authentication methods, such as 
biometrics, graphical passwords are used to overcome these problems associated 
with the traditional username-password authentication technique. 
In a 

Download 5,02 Mb.

Do'stlaringiz bilan baham:
1   ...   156   157   158   159   160   161   162   163   ...   222




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish