Identification, Authentication and Operational Security
Identification, Authentication and Operational Security
Marks 20
Syllabus
2.4 Biometrics: finger prints, hand prints, Retina, patterns, voice patterns,
signature and writing patterns, keystrokes.
What is Username ?
What is Password ?
READ
WRITE
EXECUTE
User U03
READ
WRITE
NOTE: Only ADMINISTRATOR is responsible for defining access control policies.
Label TOP
SECRET
Object SECRET INTERNAL PUBLIC
E
E
Atomic √
Weapons Label TOP
SECRET
Data File Subject SECRET INTERNAL PUBLIC
E
E
Atomic
Power Ajay
√
plant Data
√
File √
A. Kalam
Other √
Weapons Vikas
√
Data File
Tender √ Sameer
√
Notification
File
Abraham
√
Registered √
Vendors
How it works
1. Hand-print ( Physical )
2. Fingerprint ( Physical )
3. Eye retina ( Physical )
4. Keystroke ( Behavioral )
5. Voice pattern ( Behavioral )
Hand-Print (Physical Biometric)
o Length of fingers
o thickness of hand
o shape of curves
o depth of skin
Advantages
• Very high accuracy.
• Speedy results.
Disadvantages
• Some disease such as diabetic and retinal disorder cause to change eye
retina after some age.
Retinal Scanning:
The human retina is a
thin tissue composed of neuralcells that is
located in the posterior portion of the eye.
Because of the complex structure of
the capillaries that supply the retina
with blood, each person’s retina is unique.
The network of blood vessels in the retina
is so complex that even identical twins do
not share a similar pattern.
A biometric identifier known as a retinal
scan is used to map the unique patterns of
a person’s retina. The blood vessels within
the retina absorb light more readily than
the surrounding tissue and are easily
identified with appropriate lighting.
A retinal scan is performed by casting
an unperceived beam of low-
energy infrared light into a person’s
eye as they look through the scanner’s
eyepiece. This beam of light traces a
standardized path on the retina.
Because retinal blood vessels are more
absorbent of this light than the rest of
the eye, the amount of reflection varies
during the scan. The pattern of
variations is converted to computer
code and stored in a database.