Thread: Authentication Methods.

  1. #1
    Registered User
    Join Date
    May 2009
    Posts
    22

    Authentication Methods.

    Well, I've been racking my brain thinking about some authentication techniques, rather than the old password auth.

    Does anyone have any ideas?

  2. #2
    Officially An Architect brewbuck's Avatar
    Join Date
    Mar 2007
    Location
    Portland, OR
    Posts
    7,396
    Quote Originally Posted by mkthnx001 View Post
    Well, I've been racking my brain thinking about some authentication techniques, rather than the old password auth.

    Does anyone have any ideas?
    The classic authentication breakdown is:

    1. Something you know
    2. Something you have
    3. Something you are

    "Something you know" would be a password, passphrase, PIN code, etc.

    "Something you have" would be an authentication token, a physical key, a USB device, etc.

    "Something you are" would be your fingerprints, retinal pattern, DNA, other biometrics.

    In high-security applications at least TWO of these factors are used. For instance, banking in Europe and other places sometimes involves both a password and an authentication token. If somebody discovers your password, they do not have your token. If they steal your token, they don't know your password.
    Code:
    //try
    //{
    	if (a) do { f( b); } while(1);
    	else   do { f(!b); } while(1);
    //}

  3. #3
    Registered User
    Join Date
    Aug 2003
    Posts
    1,218
    Voice
    Iris scan
    Fingerprints

    Are just a few i can think of. All depends on how secure you need your application

  4. #4
    Algorithm Dissector iMalc's Avatar
    Join Date
    Dec 2005
    Location
    New Zealand
    Posts
    6,318
    Quote Originally Posted by Shakti View Post
    Voice
    Iris scan
    Fingerprints

    Are just a few i can think of. All depends on how secure you need your application
    That would be three examples of biometrics. Number 3 on brebuck's list.
    I actually get to play with some such technologies, given that I work for an Access Control company.

    mkthnx001: What do you actually want? Are you wanting a list of all techniques such as for studying etc, or are you after something new and inventive with perhaps a specific application in mind? Are you after something that doesn't require specialised hardware, such as a fingerprint reader?
    My homepage
    Advice: Take only as directed - If symptoms persist, please see your debugger

    Linus Torvalds: "But it clearly is the only right way. The fact that everybody else does it some other way only means that they are wrong"

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. Generalising methods to handle multiple weapon types
    By Swarvy in forum Game Programming
    Replies: 2
    Last Post: 05-22-2009, 02:52 AM
  2. Class methods in header or source file?
    By TriKri in forum C++ Programming
    Replies: 13
    Last Post: 09-17-2007, 05:23 AM
  3. Turn Based Stradegy System Methods
    By TylerMoyer in forum Game Programming
    Replies: 2
    Last Post: 07-30-2007, 10:45 PM
  4. Lesson #5 - Methods
    By oval in forum C# Programming
    Replies: 1
    Last Post: 05-04-2006, 03:09 PM
  5. Replies: 8
    Last Post: 07-27-2003, 01:52 PM