SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Authentication
- Deepak Mishra
- Hasan Ali
What is Authentication ?
Authentication is the act of confirming the truth
of an attribute of a datum or entity.
This might involve confirming the identity of a
person or software program, tracing the origins of
an artifact, or ensuring that a product is what
its packaging and labeling claims to be.
Authentication often involves verifying the validity
of at least one form of identification.
Authentication in simple term
• Positive verification of identity (man or
machine)
• Verification of a person‟s claimed identity
• 3 Categories:
– What you know
– What you have
– Who you are
Review: 3 Categories
• What you know
– Password
– PIN
• What you have
– e-Token
– RFID
– Certificate
• Who you are
– Biometrics
Four main types of authentication
available are:
Password
based
authentication
Certificate
based
authentication
E-Token
based
authentication
Biometric
based
authentication
Password based authentication :
• Password are the most common form of
authentication.
• Password may be a string of alphabets ,numbers
and special characters
• This password is compulsorily to be known by the
ENTITY or the THING or a PERSON that is being
Authenticated
How does the Authentication Process
takes places(password)..
Steps :
1. Prompts for user id and password.
2. User enters user id and password.
3. User id and password validation.
4. Authentication result back to the server.
5. Inform user accordingly.
Certificate based authentication :
• A certificate is a digital document that at a
minimum includes a Distinguished Name (DN) and
an associated public key.
• The certificate is digitally signed by a trusted third
party known as the Certificate Authority (CA).Digital
Certificates can then be reused for user
authentication.
•Certificate based authentication is stronger as
compared to password based authentication.
•Because here the user is expected to HAVE
something(CERTIFICATE) rather than to KNOW
something(PASSWORD).
Certificate based authentication is an electronic
document that contains information on:
(1) The Entity it belongs to…
(2) The Entity it was issued by…
(3) Unique serial number or some other unique identification…
(4) Valid dates …
(5) A Digital fingerprint…
How does the Authentication Process
takes places(certificate)..
Steps :
1. Creation, storage and distribution of
DC(Digital Certificate).
2. Login request (user to server).
3. Server creates a random challenge.
4. User signs the random challenge.
5. Server returns an appropriate message
back to the user.
E-Token based authentication :
•An authentication token is a small device that generates a new
random value every time it is used.
•This random value becomes the basis for authentication{an
alternative to a password}
•Can be implemented on a USB key fob or a smart card.
•Data physically protected on the device itself
•May store credentials such as passwords, digital signatures and
certificates, and private keys.
Usually an Authentication Token has
the foll components or features:
1. Processor.
2. LCD for displaying outputs or
random values.
3. Battery.
4. Small keypad for entering
information.
5. Real-time clock.
optional
How does the Authentication Process
takes places(e-token)..
Steps :
1. Creation of a token.
2. Use of token.
3. Token validation.
4. Server returns an appropriate message
back to the user.
Biometric based authentication :
•Biometrics (or biometric authentication)
refers to the identification of humans by their
characteristics such as fingerprint, voice, Iris
pattern of the eye, vein pattern, etc.
•Biometrics is used in computer science as a
form of identification and access control.
•It is also used to identify individuals in groups
that are under observation.
How does the Authentication Process
takes places(Biometric)..
• The user database contains a sample of
user’s biometric characteristics
•During Authentication process, the user is
required to provide a new sample of the user’s
biometric.
•This sample is sent to encryption.
•This current sample is decrypted &
compared.(if the sample matches )
•User is considered as valid one
Biometrics Process
No
Yes
Biometric
Data Collection
Transmission
Quality
Sufficient?
Yes
Template Match
Signal Processing,
Feature Extraction,
Representation
Database
Decision
Confidence?
new biometric sample is
requested. No
database
The common Physical characteristics are:
•Fingerprint
•Face
•Retina
•Iris
•Vein pattern
•Hand and finger geometry
The Behavioral characteristics are:
•Keystroke dynamics
•Voice
•Gait
• Signature dynamics
 The angle at which the pen is held
 The number of times the pen is lifted
 The time it takes to write the entire
signature
 The pressure exerted by the person
while signing
 The variations in the speed with
which different parts of the signature
are written.
Signature Verification Process
Aadhaar card:
One-time standardized Aadhaar enrolment establishes uniqueness of resident via
„biometric de-duplication‟
– Only one Aadhaar number per eligible individual
Online Authentication is provided by UIDAI
– Demographic Data (Name, Address, DOB, Gender)
– Biometric Data (Fingerprint, Iris, Face)
Aadhaar :subject to online authentication is proof of ID
Aadhaar enrollment / Update = KYC
Aadhaar No. Issued,
stored in Auth. Server
“Verification” of KYC (Authentication)
Advantages of biometrics
1. Uniqueness
2. Universality
3. Performance
4. Measurability
5. User friendly
6. Accuracy
7. Comfort
Thank you..!

Weitere ähnliche Inhalte

Was ist angesagt?

Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
koolkampus
 
1 security goals
1   security goals1   security goals
1 security goals
drewz lin
 

Was ist angesagt? (20)

Web Security
Web SecurityWeb Security
Web Security
 
Email security
Email securityEmail security
Email security
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Email security
Email securityEmail security
Email security
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Electronic mail security
Electronic mail securityElectronic mail security
Electronic mail security
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Security attacks
Security attacksSecurity attacks
Security attacks
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
Authentication Application in Network Security NS4
Authentication Application in Network Security NS4Authentication Application in Network Security NS4
Authentication Application in Network Security NS4
 
User Authentication Overview
User Authentication OverviewUser Authentication Overview
User Authentication Overview
 
1 security goals
1   security goals1   security goals
1 security goals
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 

Andere mochten auch

Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
Nicholas Davis
 

Andere mochten auch (20)

Authentication Technologies
Authentication TechnologiesAuthentication Technologies
Authentication Technologies
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
A study on biometric authentication techniques
A study on biometric authentication techniquesA study on biometric authentication techniques
A study on biometric authentication techniques
 
Authentication Systems
Authentication SystemsAuthentication Systems
Authentication Systems
 
Kerberos
KerberosKerberos
Kerberos
 
Security threats
Security threatsSecurity threats
Security threats
 
Unique identification authority of india uid
Unique identification authority of india   uidUnique identification authority of india   uid
Unique identification authority of india uid
 
Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3Aadhaar at 5th_elephant_v3
Aadhaar at 5th_elephant_v3
 
Srikanth Nadhamuni
Srikanth NadhamuniSrikanth Nadhamuni
Srikanth Nadhamuni
 
Aadhaar
AadhaarAadhaar
Aadhaar
 
practical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome thempractical risks in aadhaar project and measures to overcome them
practical risks in aadhaar project and measures to overcome them
 
What database
What databaseWhat database
What database
 
Uid
UidUid
Uid
 
Facebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streamsFacebook style notifications using hbase and event streams
Facebook style notifications using hbase and event streams
 
E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres E commerce data migration in moving systems across data centres
E commerce data migration in moving systems across data centres
 
Building tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systemsBuilding tiered data stores using aesop to bridge sql and no sql systems
Building tiered data stores using aesop to bridge sql and no sql systems
 
Aesop change data propagation
Aesop change data propagationAesop change data propagation
Aesop change data propagation
 
Hadoop at aadhaar
Hadoop at aadhaarHadoop at aadhaar
Hadoop at aadhaar
 
Building the Flipkart phantom
Building the Flipkart phantomBuilding the Flipkart phantom
Building the Flipkart phantom
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

Ähnlich wie Authentication(pswrd,token,certificate,biometric)

Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
NEHA SINGH
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
Wajahat Rajab
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
Hai Nguyen
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
Rekha Yadav
 
Biometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursusBiometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursus
SMK Hamid Khan Tapah
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
Nicholas Davis
 

Ähnlich wie Authentication(pswrd,token,certificate,biometric) (20)

Authentication
AuthenticationAuthentication
Authentication
 
Eds user authenticationuser authentication methods
Eds user authenticationuser authentication methodsEds user authenticationuser authentication methods
Eds user authenticationuser authentication methods
 
Basic of Biometrics Technology
Basic of Biometrics Technology Basic of Biometrics Technology
Basic of Biometrics Technology
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
Biometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak DasBiometrics Authentication Technology by Sayak Das
Biometrics Authentication Technology by Sayak Das
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01Authenticationtechnologies 120711134100-phpapp01
Authenticationtechnologies 120711134100-phpapp01
 
MAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdfMAIN_BIOMETRIC.pdf
MAIN_BIOMETRIC.pdf
 
Cryptography in user authentication
Cryptography in user authenticationCryptography in user authentication
Cryptography in user authentication
 
Date security identifcation and authentication
Date security   identifcation and authenticationDate security   identifcation and authentication
Date security identifcation and authentication
 
Information and network security 47 authentication applications
Information and network security 47 authentication applicationsInformation and network security 47 authentication applications
Information and network security 47 authentication applications
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
Biometrics
BiometricsBiometrics
Biometrics
 
Electronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a PasswordElectronic Authentication, More Than Just a Password
Electronic Authentication, More Than Just a Password
 
Biometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursusBiometrics n authentication divices kerja khursus
Biometrics n authentication divices kerja khursus
 
Authentication technologies
Authentication technologiesAuthentication technologies
Authentication technologies
 
Identity Proofing to provision accurately
Identity Proofing to provision accuratelyIdentity Proofing to provision accurately
Identity Proofing to provision accurately
 
Chapters_1_2.ppt
Chapters_1_2.pptChapters_1_2.ppt
Chapters_1_2.ppt
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Broken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptxBroken Authentication and Authorization(1).pptx
Broken Authentication and Authorization(1).pptx
 

Kürzlich hochgeladen

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Kürzlich hochgeladen (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Authentication(pswrd,token,certificate,biometric)

  • 2. What is Authentication ? Authentication is the act of confirming the truth of an attribute of a datum or entity. This might involve confirming the identity of a person or software program, tracing the origins of an artifact, or ensuring that a product is what its packaging and labeling claims to be. Authentication often involves verifying the validity of at least one form of identification.
  • 3. Authentication in simple term • Positive verification of identity (man or machine) • Verification of a person‟s claimed identity • 3 Categories: – What you know – What you have – Who you are
  • 4. Review: 3 Categories • What you know – Password – PIN • What you have – e-Token – RFID – Certificate • Who you are – Biometrics
  • 5. Four main types of authentication available are: Password based authentication Certificate based authentication E-Token based authentication Biometric based authentication
  • 6. Password based authentication : • Password are the most common form of authentication. • Password may be a string of alphabets ,numbers and special characters • This password is compulsorily to be known by the ENTITY or the THING or a PERSON that is being Authenticated
  • 7. How does the Authentication Process takes places(password).. Steps : 1. Prompts for user id and password. 2. User enters user id and password. 3. User id and password validation. 4. Authentication result back to the server. 5. Inform user accordingly.
  • 8. Certificate based authentication : • A certificate is a digital document that at a minimum includes a Distinguished Name (DN) and an associated public key. • The certificate is digitally signed by a trusted third party known as the Certificate Authority (CA).Digital Certificates can then be reused for user authentication. •Certificate based authentication is stronger as compared to password based authentication. •Because here the user is expected to HAVE something(CERTIFICATE) rather than to KNOW something(PASSWORD).
  • 9. Certificate based authentication is an electronic document that contains information on: (1) The Entity it belongs to… (2) The Entity it was issued by… (3) Unique serial number or some other unique identification… (4) Valid dates … (5) A Digital fingerprint…
  • 10. How does the Authentication Process takes places(certificate).. Steps : 1. Creation, storage and distribution of DC(Digital Certificate). 2. Login request (user to server). 3. Server creates a random challenge. 4. User signs the random challenge. 5. Server returns an appropriate message back to the user.
  • 11. E-Token based authentication : •An authentication token is a small device that generates a new random value every time it is used. •This random value becomes the basis for authentication{an alternative to a password} •Can be implemented on a USB key fob or a smart card. •Data physically protected on the device itself •May store credentials such as passwords, digital signatures and certificates, and private keys.
  • 12. Usually an Authentication Token has the foll components or features: 1. Processor. 2. LCD for displaying outputs or random values. 3. Battery. 4. Small keypad for entering information. 5. Real-time clock. optional
  • 13. How does the Authentication Process takes places(e-token).. Steps : 1. Creation of a token. 2. Use of token. 3. Token validation. 4. Server returns an appropriate message back to the user.
  • 14. Biometric based authentication : •Biometrics (or biometric authentication) refers to the identification of humans by their characteristics such as fingerprint, voice, Iris pattern of the eye, vein pattern, etc. •Biometrics is used in computer science as a form of identification and access control. •It is also used to identify individuals in groups that are under observation.
  • 15. How does the Authentication Process takes places(Biometric).. • The user database contains a sample of user’s biometric characteristics •During Authentication process, the user is required to provide a new sample of the user’s biometric. •This sample is sent to encryption. •This current sample is decrypted & compared.(if the sample matches ) •User is considered as valid one
  • 16. Biometrics Process No Yes Biometric Data Collection Transmission Quality Sufficient? Yes Template Match Signal Processing, Feature Extraction, Representation Database Decision Confidence? new biometric sample is requested. No database
  • 17. The common Physical characteristics are: •Fingerprint •Face •Retina •Iris •Vein pattern •Hand and finger geometry
  • 18. The Behavioral characteristics are: •Keystroke dynamics •Voice •Gait • Signature dynamics
  • 19.  The angle at which the pen is held  The number of times the pen is lifted  The time it takes to write the entire signature  The pressure exerted by the person while signing  The variations in the speed with which different parts of the signature are written. Signature Verification Process
  • 20. Aadhaar card: One-time standardized Aadhaar enrolment establishes uniqueness of resident via „biometric de-duplication‟ – Only one Aadhaar number per eligible individual Online Authentication is provided by UIDAI – Demographic Data (Name, Address, DOB, Gender) – Biometric Data (Fingerprint, Iris, Face) Aadhaar :subject to online authentication is proof of ID Aadhaar enrollment / Update = KYC Aadhaar No. Issued, stored in Auth. Server “Verification” of KYC (Authentication)
  • 21. Advantages of biometrics 1. Uniqueness 2. Universality 3. Performance 4. Measurability 5. User friendly 6. Accuracy 7. Comfort