Vous êtes sur la page 1sur 1

User Authentication

Security refers to providing a protection system to computer system resources such as CPU,
memory, disk, software programs and most importantly data/information stored in the
computer system. If a computer program is run by an unauthorized user, then he/she may cause
severe damage to computer or data stored in it. So a computer system must be protected against
unauthorized access, malicious access to system memory, viruses, worms etc.
Authentication refers to identifying each user of the system and associating the executing
programs with those users. It is the responsibility of the Operating System to create a
protection system which ensures that a user who is running a particular program is authentic.
Operating Systems generally identifies/authenticates users using following three ways
Username / Password
User need to enter a registered username and password with Operating system to login
into the system.it is the simplplest way to use authentication scheme.
Each user is asked to enter username and password to logging into the system. The
combination of both matched against the stored id_pwd in database.if match is found
then user is legitimate. And allow him/her to access thr system. Otherwise access is
denied.
This is very important to store password in encrypted format.the system use
function (f(x)) to encrypt all password whenever user attemoys to login into the system ,
the password is first encrypted with the same function and then match using with the
stored list of encrypted password.

User card/key
In this method each user is provide a smart card that is used for identification . the smart
card has an key stored on an embedded chip, and os of smart card ensures that the key can
never be read.
Instead it allows data to be sent to the card for encryption or decryption using that private
key. Smart card is programmed in such a way that it is difficult to extract value from it. so it
is secure device.

Biomatric techniques:
This technique use unique characteristics of a person to authentic the person.
It will use physiological attribute such as (fingerprint/ eye retina pattern/signature ) or
behavior attribute such as (voice pattern).
User need to pass his/her attribute via designated input device used by operating system
to login into the system.
Biomatric authentication is technically complex and expensive.
Sometimes these attributes are changed under some condition .
for ex: under stressful condition or when suffering from a throat pain or cold. Due to this
it typically used in conjunction with other authentication technique.

Vous aimerez peut-être aussi