版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
DIGITAL
&TRENDSBeyondpasswords:
Biometrics,multifactor,
and
passwordlessauthenticationAtrendreport
on
how
newauthentication
methods
arepavingtheway
forapasswordlessfutureAre
we
goingpasswordless?ExecutivesummaryFromsecuritytooverallbusiness
development
purposes,
the
needforsecureauthentication
methods
hasbecome
vitalforenterprises
andconsumers
whendealing
withonline
andphysicalsystems.timeline
of
secureauthentication
measures.Withgrowing
digitaldependency
–both
athomeandwork–comesagreaterawarenessof
online
security.
Duetocomplianceregulations,
MFA
iscurrently
afundamental
requirement
incertainindustries
as
atransitionalphasetoapasswordless
future.This
Statistatrend
report
provides
an
extensive
analysisof
the
mostimportant
authentication
methods,
underlining
the
securitylayersaddedover
timeaswellasthe
journey
to
passwordlessmethods.
Thesetrends
areas
follows:•
Passwordlessauthentication,
the
mostsecuremeasureavailable
thateliminatesthe
intrinsic
weakness
ofpasswordsandMFA.
However,there
aremanychallengestoimplementing
the
method
and•
Corporate
andconsumer
passwordbehaviors,
together
withtheincreaseinpasswordmanagerusage,areproof
thatpasswordshavestood
the
test
of
timeby
being
the
firstlineof
defense
inanyauthentication
process.
However,
withits
associatedrisksandsignificanttechnological
developments,
the
internetcallsformoresecurereinforcements.replacingthe
password,
especiallywhenitcomes
tolegacysystems.•
The
threatsfacedby
every
online
userhavebrought
together
varioustechgiants,including
Google,
Apple,
andMicrosoft,
toformanalliance
inorder
to
increasesecurityby
moving
frompasswordsto
passwordless
authentication.
These
companiessupportthe
development
andcomplianceof
standards,acceleratingtheavailability
of
passwordless
authentication
methods
tothe
world.•
Biometrictechnologies
havestrengthened
online
securityby
addingasecondverificationfactorbased
onauser’sunique
biologicalfeatures,
suchastheir
fingerprint
orface.Withthe
help
of
machinelearning,biometric
authentication
methods
mark
the
beginning
of
anew
eraintechnological
andonline
security.Someofthe
mostrelevantquestions
answeredin
thisreport
are:Whatarethe
current
securitymeasures?Whataretheir
weaknesses?Whatsolutions
areavailable?
Whatisthe
stateof
the
latestsecuritymeasures?Whatis
the
future
of
secureauthentication
methods?•
Multifactor
authentication
(MFA)isanother
level
ofsecurityinthe301Passwords:After
all
this
time•
Thehistory
of
passwords•
Consumer
andcorporate
password
behaviors•
Password
managerusageAshort
historyofcomputer
passwordsAwindow
to
the
pastFirst
computerpasswordFirst
passwordbreachBeginningsofpassword
encryptionThepassword
is
dead.Longlive
the
password!CodephrasesThe
history
of
passwordsgoes
backtosome
of
theworld’searliestandItwas
not
until
1960thatFernandoCorbatóimplemented
the
firstcomputer
password.MIT’s
Compatible
Time-SharingSystem
(CTSS)introduced
the
conceptof
authentication
forthe
firsttimeinthecomputingTwo
yearslater,AllanScherrcommittedthefirstpassword
theft
inhistoryby
printing
thesystem’spasswordfileswhileworking
as
aPh.D.student
on
the
CTSS.
Themain
concernfollowingCorbató’s
passwordimplementation
was
thatpasswordswerestoredincomputer
systemsinplaintext.Inthe
1970s,
RobertMorris–anAmericancryptographer
andHowever,
asCorbatósaidinaninterview
for
The
Wall
StreetJournalin2014,
“Wedidnotforesee
the
internet.”
Today,people
havepasswordsforeverything.
Socialmediaplatformsand,more
recently,
the
Internet
ofThings
arepartially
responsible
forthe
astonishing
growth
inthenumber
of
passwords.Studiesreported
thatthe
global
numberof
passwordswas
estimatedtohaveexceeded
300
billion
by2020.
Nevertheless,
inahyper-connected
anddigitized
world,passwordsarerapidlyfallingintoobsolescence.biggest
empires.
Fromwatchwords
engravedinwood
by
Roman
guardstomilitary
countersigns
usedby
Allied
forcesonD-Dayduring
WorldWarII,codewords
laid
the
foundationformodern-daycomputer
scientist
–developed
aone-wayencryption
systemcalledhashing.Fromthenon,
itwas
just
amatteroftimeuntil
dataencryptionturned
from
popular
tonecessary,
andenvironment.passwords.passwordsbecamepartof
everydaylife.Notes(s):
MIT=MassachusettsInstitute
of
TechnologySource(s):
The
WallStreet
Journal5Usingweaker
passwords
poses
asignificantriskUncoveringconsumer
password
behaviorAverage
timespent
settingup
a
newdigital
account
in2021Whentalkingaboutpassword
security,
there
aretwodifferent
applicationsegments:
consumer
andcorporate.
Regardingconsumerbehavior,passwordsareeasilycompromised
becausepeople
often
resorttopredictable
shortcuts
andpatterns
during
the
creationprocess.29%25%21%11%9%Specops,
aprovider
of
passwordmanagementandauthentication
solutions,analyzed
800
millionbreachedpasswords.The
resultsshowed
most
userswerelikely
tofollow
certainthemes
andpatterns
whencreatingapassword,such
as
favoritemusicians,sports
teams,movies,
orTVshows.5%1min2-3
min4-5
min6-10min
Over10
min
Don'tknow/notsureIn2021,
mostindividuals
spent
fiveminutes
orlesssetting
up
anew
digitalaccount.
Ontop
of
that,manyusersrarelycompliedwithpasswordsecurityrequirements.
Forinstance,in
the
United
Statesandthe
United
Kingdom,only
twoin10
people
always
created
passwordscontaining
more
than
12characters.Suchbehavior
stretches
beyond
consumer
purposes
andallthe
way
toworkenvironments.
The
significantshift
toremote
working
conditions
during
theCOVID-19
pandemic
showed
thatmany
companies
werenot
prepared
forsuch
changesin
securityandtechnology.
This
becomes
even
moreconcerningwhenacompany’ssecuritysystemrelieson
passwords,
whichcanbecompromised
due
tohumanerror.Note(s):Worldwide;
March
12
to
26,
2021;
1,000
respondentsSource(s):
IBM;ID13051216Source(s):
Specops;
NCCIC;
CybSafe;
ID1305222Passwords
are
theprimarysecuritymeasure
of
mostbusinessesMainsecurity
factorsused
by
companiesworldwidein2021
and2022Manycompanies
wereforced
tostrengthen
their
securitywhen84%PasswordSecurityquestion95%switching
toremote
workenvironments.Unlike
consumers,the
corporatesectorusuallyhasmorerobust
securitymeasuresinplaceto
protect
criticalinfrastructure
from
breachesanddatatheft.
Suchmeasuresinclude
variousauthentication
methods,
such
as
asoftwareone-time
password(OTP),
asecuritykey,
orahardwareOTP.56%68%52%SMS,voice,e-mailOTPSoftwareOTP60%41%43%35%34%PushauthenticatorBiometrics(WindowsHello)HardwareOTP13%Whenitcomes
tobusinesses,passwordsarerarelyusedasthe
soleauthentication
method.
They
areoftenused
as
partof
amultifactor
ortwo-factorauthentication
process,
alongwithother
verificationfactors,suchasanSMS.
Nevertheless,
passwordsremainedthe
mainsecurityfactorusedby
companies
worldwidein2022.45%30%2022202117%16%21%SecuritykeyNote(s):Worldwide;
2022;
700
respondents;
VPs,
directors,andC-level
executivesSource(s):
Okta;
ID13002417Strugglingtoremember
yourpasswords?For
those
usingapassword
manager,we
saluteyou!Mostimportant
reasonsforstartingtouseapassword
manager
worldwide
in2022Apasswordmanager
isasoftwareapplicationdeveloped
withthe
purpose
ofsecurelystoring
andmanagingpasswords.Allstored
credentialsfor
variousaccountsandappsareusuallymanagedusing
amaster
password.Password
managers
areby
farone
of
the
mostsecure
waystoprotect
passwords.They
allowusers
tokeep
track
of
their
credentials
withouthavingtomemorizethem,
actaspasswordgenerators,andmakesharingdata
withfriends
andfamilysafer
by
entering
asharedencryption
key.50%44%31%22%16%15%Itseemedlikea
Ikeepforgettingmy
IuseoneatworkgoodwaytoprotectmydigitalIheardorreadaboutitinthe
news
passwordswithmyfamilyIwantedtoshareIwashackedpasswordsinformationMostimportant
reasonsfornotusinga
password
manager
worldwide
in202238%32%27%27%21%Somedisadvantagesof
apasswordmanager
include
the
riskof
havingallcredentials
stored
inone
placeandtheadditional
cost–
prices
rangefromapproximatelytwoto10U.S.
dollarspermonthper
user.MycurrentsystemworksIdon'twanttopayfor
Idon'tknowwhichone
I'mafraidthe
password
Idon'tknowhowtogetpasswordprotectiontousemanagementsoftwarewillget
hackedstartedNote(s):Worldwide;
2022;
more
than2,000
respondentsSource(s):
Bitwarden;
ID1303526;
ID
13059628How
passwordmanagers
improved
securityWhatdoesapassword
managerdo?The
rapiddevelopment
of
the
internet
led
toanincreasingnumber
andvarietyofcyberattacks,
whichquicklyillustrated
thatpasswordswerenot
even
close
toproviding
secure
online
access.
Browser-basedpasswordmanagerswerethe
firstgeneration
of
passwordmanagers,andthey
playedakey
role
inimproving
one
of
the
biggest
passwordlimitations:
safe
storage.New
password
managers
haveemerged,
adding
further
securitylayersdue
tothe
riseof
maliciousactorsandmodern
cyber
threats.Passwordmanagersareconstantlyintroducing
new
functions,
such
as
cloud-basedapplications
oratwo-factor
authentication
mode.
Thelatestpasswordmanagers
also
comeequipped
withseveralautomaticfunctions.
Somelockaccesswhenthe
inactivitytimerismet,whileothers
lockandunlockbasedon
user
proximity.However,
inthe
early
2000s,
the
secondgeneration
ofpasswordmanagersaddressedthe
most
importantpasswordweakness:security.Unlike
the
firstgeneration,
whichonlymanaged
passwords,the
secondgeneration
developed
anew
algorithmtoensure
passwordsecuritybyintroducing
one
passwordto
rulethem
all.Simplyput,
inordertoaccessthe
passwordsstored
inthe
software
vault,the
usermust
insertamaster
password
–
along
andcomplex
passwordthat
should
not
bedisclosed
tothird
parties.3.07bn2.90bnPasswordmanagement
marketrevenueworldwide(inbillionU.S.
dollars)20201.25bn20252027By2027,
the
overallrevenue
of
the
passwordmanagementmarket
isforecasttodecreaseas
passwordsslowly
become
obsolete.
Untilthen,passwordmanagersremain
the
best
solution
for
both
consumersandbusinesses
toensure
secure
passwordauthentication.In2020,
the
passwordmanagementmarket
wasvaluedat1.25billionU.S.
dollarsandis
expected
toexceed
three
billion
U.S.
dollarsby
2025.The
riseinmarketrevenue
suggests
that
passwordmanagers
arestillhighlyrelevantin
maintainingpasswordsecurity.Note(s):Worldwide;
2022Source(s):
GlobeNewswire;
SANS
Institute;
ID1300988;
ID
13056489Passwords:Thegood,
the
bad,andthe
unknownThefuture
of
password
securityTHEGOODTHEBADWhenaskedaboutthe
future
ofcomputerpasswordsin2014,
FernandoCorbatótoldTheWallStreetJournal,
“Passwordsarenota
super-high
level
ofsecuritybutareenough
toprotectagainstcasual
snooping.”
Attheendoftheday,passwords
areeasytoimplement,
easy
tochange,
andnoadditionalhardwareisrequiredtoensurepasswordauthenticationworks–which
iswhytheyarestillsowidely
used.Passwordsecurityremainsimportant
bymaintainingthe
firstlineofdefenseinsecuringacomputersystem.
Thedirector
ofBoresConsultancy,JamesBore,
definedthepersistenceofpasswordsecuritybysaying
passwords
werethe
worstformof
secureauthentication,exceptfor
allotherformsthat
havebeentried.Inthe
contextofcyberattacksbeingpoweredbyartificialintelligence,
itwillnotbelonguntil
computingsystems
areabletofullyrecognizeusers’passwordbehaviorsbasedonwordsandactivitytracking.Oneaspect
thatremainsuncontestableisthatanyfuture
passwordusagemustinvolvea
large-scaleadoptionoflonganddiversecredentialsacrossaccounts.
However,
thisoftenresultsinpasswordfatigue,
acommonfeelingexperiencedbyindividuals
whenhavingtorememberanoverwhelmingnumberofcredentials.
Thefuture
ofpasswordsecuritymayfranklybethattheywillceasetoexistinfavorofmore
secureandreliablemeasures,such
asbiometricsor
passwordless
authentication.THEUNKNOWNDespitethe
increasing
number
ofredflagsrelatedtopasswordsecurity,the
future
ofpasswordsisyet
tobedecided.Password
managers
haveaddressedthe
mostimportantconcernsrelatedtopasswords:
creation,storage,
andsecurity.Havingthissoftwarewidelyaccessible
toboth
consumersand
businesses
mayjust
betheboostthatpasswords
needtosurvive.
Withoutadoubt,
passwords
remainessential
tosecurity,buttheyarenotthe
onlyauthenticationmethodthatcan
orshouldprotectdevicesordata.Passwords
alonewillmostprobablyneverbesecureenough.
However,whenincludedina
multifactorortwo-factorauthenticationsystem,
theyprovide
just
the
right
securitylayer.10Source(s):
The
WallStreet
Journal;Bores
Consultancy
Ltd.02Biometrics:The
user
is
the
password•
Biometric
authenticationsystems•
Multimodal
and
behavioral
biometrics•
Thelimitationsofbiometric
authenticationsystemsFrom
passwords
tobiometricsShifting
theauthenticationprocess
from
thehumanfactorto
physicalandbehavioral
attributesPassword
authenticationsystems
require
usersto:Biometric
authenticationsystems
eliminateknowledge-basedBiometric
data
doesnotneedtoberemembered,cannotbestolen,bought,orshared.Thereisalso
noneedtoinsecurely
keeppasswords
onaPost-itnoteinthe
officeBiometric
systems
fulfill
thedemandfor:Unlikepasswords,users
cansafely
have
thesamebiometric
authentication
–fingerprint
identificationorfacerecognition
–
acrossmultipleaccountsThemostsecurepassword
is
theone
youcannotremember•••creatememorizeeventuallysharetheircredentials•••saferquickermore
convenientauthenticationmethodsauthenticationprocesses12Biometricauthentication
systems:
What,
when,
andwhy?Applications
anddevelopmentBiometricsisderivedfromthe
Greekwords
for“bio”
(meaninglife)and“metrics”
(measure).Simplyput,
abiometric
authentication
processrelieson
anindividual’sunique
biologicalfeaturesto
verifytheir
identity.
Hence,
biometrics
areuniversal,unique,
andimmutable.The
current
automatedbiometric
systemshaveonlybeen
availabletoconsumers
andcompaniesfor
the
pastfew
decades.Nevertheless,
this
technology
isbasedon
concepts
developedhundreds
of
yearsago.Biometricsystemsgainedvisibilityat
theend
of
the
19th
century,
withthe
development
of
the
Henryclassificationsystemfor
fingerprints
and,
subsequently,
thefingerprint
branchatNew
ScotlandYard
inthe
UK.The
market
revenue
ofbiometric
authentication
systemsreachedanestimated43billion
U.S.dollarsin2022
andisforecasttoalmostdouble
invalueby
2027.
One
of
thereasonsforthe
growth
isthe
extensive
useof
biometricauthentication
inconsumerelectronics
forend-userconvenience.
Additionally,
corporationsandgovernmentinstitutions
areset
toincreasetheir
adoption
of
identityandaccessmanagementsolutions.Inthe
1960s,
facerecognition
was
the
firstbiometric
tobecomesemi-automated,
makingreal-timefacedetection
possibleby
1991.The
development
ofbiometric
authentication
systems
skyrocketedinthe
21st
century.
The
firststatewide
automateddatabasesofpalm
prints
were
deployed
inthe
U.S.
in2004.
By
2010,
biometricsystemswerealready
being
used
forterrorist
identification.13Biometricsystems
are
beingintegrated
intomillionsof
devicesGlobal
biometric
system
market
revenue
from
2020to
2027(inbillion
U.S.dollars)By2024,
facialrecognitionhardwareisforecasttobedeployedinover800millionmobiledevices.
Atthesametime,
4.6
billionsmartphoneswillbeequippedwithfingerprint
sensors.In2019,
facialrecognitionhardwarewasdeployedinapproximately96
millionmobiledevices.Note(s):Worldwide;
2022;
*forecastSource(s):
ReportLinker;
MarketsandMarkets;
ID104870514Themarket
revenue
of
biometricsecurity
systemsisgrowingFacial
recognitionandfingerprint
identification
are
themostpopular
biometric
security
systemsFacialrecognition
market
sizeworldwide
from
2019
to2028(inbillionU.S.
dollars)Someofthe
mostrelevantinnovations
concerningfacial
recognition
systemshavebeen
due
totheintegration
of
artificial
intelligence.
This
led
toreal-timeidentification,
anti-spoofing
measures,aswellasdiminished
racial
orgender
bias.12.9212.675.014.353.60Alack
of
proper
andclear
regulations
togovern
itsusewas
one
of
the
reasonswhyfacial
recognition
marketrevenue
fluctuated
until
2021.
However,
by
2027,
themarket
sizeisforecast
tojump
tonearly13billion
U.S.dollars.2019202020212027*2028*Automated
fingerprint
identificationsystemmarket
revenueworldwide
from
2021
to2027(inbillionU.S.
dollars)Meanwhile,
withamarket
revenue
of
nearlyninebillion
U.S.
dollarsin2022,
fingerprint
identificationremainsthe
strongest
andmost
frequently19.53implemented
biometric
securitysystem.
The
increaseindemandfor
fingerprintidentification
infinance
andbanking
–aswellasinsmartphones
andotherconsumer
electronics
–isexpected
todrivethemarket’sgrowth
inthe
upcoming
years.8.937.66202120222027*(1)
Note(s):
Worldwide;
2019
to2021;
*forecastSource(s):
ReportLinker;
GlobeNewswire;
ID
1153970(2)
Note(s):
Worldwide;
2022;
*forecastSource(s):
Business
Wire;
ID
126457915Theriseof
biometrics
inthefinance
andbanking
sectorSaudi
Arabialeads
astheUnited
States
lags
behindBiometric
usageworldwide
in2021,
by
typeIncreaseinbiometric
authenticationworldwide
in2021,
by
industryShare
ofconsumers
ready
tousefingerprint
authenticationinsteadofa
PIN
code
whenpaying
instorein2021,
by
country70%1,100%94%92%88%86%73%770%70%69%43%580%25%17%160%11%Financial
Education
Healthservices
careITand
TechnologytelecomsFingerprintFaceVoiceIrisSaudiArabiaIndiaBrazilSouth
Australia
UKAfricaU.S.(3)
Note(s):Worldwide;
2021;
3,422
respondentsSource(s):
Idemia;Dentsu
DigitalInc.;
ID1338830(1)
Note(s):
Worldwide;
2021;
3,422
respondentsSource(s):
Idemia;Dentsu
DigitalInc.;ID1338824(2)
Note(s):
Worldwide;
June
1,
2020,
toMay
31,
2021Source(s):
DuoSecurity;
ID130322716Fingerprint
authentication
forend-userconvenienceandsecurityMitigating
risks,addressingchallenges,andimprovinguser-experienceSensortypesFirst
smartphone
modelstoimplementthe
technologyCapacitiveUses
the
flow
of
electricalcurrents
to
form
animageof
afingerprintQuickandpreciseCannotbeimplementedon
screenPantechGI100Toshiba
Portégé
g500HTCOne
MaxiPhone
5s2004200720072015OpticalWorks
like
adigital
cameratoproduceanimage
ofafingerprintCanbeimplementedbehindthescreenSlower
and
less
accuratecompared
withothertechnologies
andcanbefooled
easilyVivo
X20
Plus2017UltrasonicUses
high-frequencysoundwaves
to
locateridges
and
grooves
toform
afingerprint
imageCanbeimplementedbehindthescreenHighcostSamsung
Galaxy
S10201917Multimodal
biometricsMitigating
risks,addressingchallenges,andimprovinguserexperienceWhichbiometric
do
youthink
isthemostlikelytoshowthegreatestincreaseinuseoverthenext
fewyears?One
of
the
segments
most
likelytoshow
asignificantincreaseinusageis50%multimodalbiometrics.
Simplyput,unimodal
biometric
authentication
verifiesonly
one
humancharacteristic,whereasmultimodalsystems
ensure
an
extra
layerof
securityby
checking
atleasttwobiometric
characteristics.Someof
themostimportantadvantagesofamultimodalauthentication
systemareimproved
recognition
accuracy,centralizedandunified
systemmanagement,andincreasedsecurity
–
by
diminishingthe
chancesof
spoofing.
Thismethod
willcontinue
todevelop
as
the
authenticationmarket
isconstantly
searchingforwaystofind
the
rightbalancebetween
securityandimproved
userexperience.Inaddition
to
beingsecure,convenient,anduser-friendly,biometricauthenticationmethodsare
constantlyimproving
andadaptinginorder
to
mitigate
risksandaddress
further
challenges.14%9%6%5%4%3%3%FaceMultimodalBehavioralVoiceContactlessfinger/veinIrisFingerprintDon'tknowNote(s):Worldwide;
May
2022;
220
respondents;industry
professionalsSource(s):
BiometricsInstitute;
ID
133934918Behavioral
biometricsRevolutionaryauthenticationmethodrequiresnouser
actionWiththe
help
of
machinelearning,behavioralbiometricauthenticationidentifies
auser
basedon
their
uniquebehaviorsandpatternswhen
interacting,
forexample,
withadevice
such
as
amouse,keyboard,
ortouchscreen.MouseactivitySpeed,
movement
patterns,andscrollpreferencesKeystroke
movementSpeed,
shortcuts,andadvanced
keysUnlike
other
activeauthentication
methodslike
passwordsor
physicalbiometrics,behavioralbiometricsarepassiveauthentication
methods
sincethey
donotrequire
any
additional
actiononbehalf
ofthe
user.Analyzepatternsin
humanactivityTouchscreen
behaviorPresssize,area,and
pressureApasswordsystemisdeterministic
–meaningits
onlyfocus
ison
the
content
ofthe
password.Consequently,
the
user
isauthenticated
once
the
passwordmatches.However,
inthis
case,there
isno
knowingwhoentered
the
password.Withbehavioralbiometrics,
the
useristhe
password.DevicemovementGyro,
orientation,andscrolling19Thelimitations
of
biometric
authentication
systemsCanbiometrics
be
hacked?Overall,when
comparedwithpasswords,biometric
authentication
methods
provide
higher
securitystandardssince
breachingthemisafarmorechallenging
process
thanhacking
alphanumericcodes.
However,
biometric
authentication
isfar
from
flawless.Themethods
simply
createasaferenvironment,
thus
layingthe
foundation
of
anew
systemthat
isasaferalternative
topasswords.Security
limitationsEthicalandprivacy
concernsDevicelimitationWhilebiometricsensurehigher
securitystandardsthanpasswords,theidea
ofbreachingabiometricauthenticationsystem
isfarscarier.Unlikepasswords,
biometricdatacannotbechanged.Whileeverysmartphonecomeswithintegrated
biometricsoftware,notallpersonal
electronicdevicesarecurrentlyequippedtosupportsuch
anauthenticationmethod.Biometric
datatakesethical
andprivacyconcernstoawholenewlevel
becausethe
dataisunforgettable,
unconcealable,
andpermanent.Thatexplainswhyusersstillturn
to
passwords
whenowningaPC,
laptop,or
Macthatdoesnothaveabiometricauthenticationsystem
incorporated.Themainprivacyconcernrelatestodatastorageandenrollment.Forexample,
when
itcomestobiometricpaymentcards,54
percentofsurveyrespondentsworldwidepreferredto
enrolltheir
biometricdataathomebythemselves;
45
percentwantedtohavetheirbiometricdatastoredonthe
cardandnotata
bank.Biometric
technologiesarebasedonpatternrecognitionalgorithms
thatleavespacefortwosecurityconcerns:However,
such
a
limitationcanbebypassedbyusingatwo-factorauthenticationmethodconsistingofacomputerpasswordalongwithbiometricauthenticationonasmartphone.Biometric
authenticationcan
also
beaddedtoa
PCor
laptopviaaUSB
scanner,which
usesalight-sensitivemicrochiptoproduceadigitalimage
ofauser’sfingerprint.1.
Afalsepositive(whenanunauthorizeduserisgranted
access
tothe
system).2.
Afalsenegative(when
the
right
useriserroneouslynotauthenticated).Commerce,
social
media,
andlawenforcement
werethe
industriesinwhich
biometricslegislationwas
perceived
asnotstrict
enough,accordingtoaglobalsurveyin2022.
However,
the
samesurveyfoundthatsixoutof10
Europeanrespondentsbelieved
thel
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年保险业理赔流程手册
- 商务中心消防安全管理规范
- 2026年加工工艺中的设备自动化技术
- 2026年基于虚拟仿真的机械加工工艺设计
- 土木工程职业发展蓝图
- 2026年生态风险评估与经济保护
- 小儿支气管炎护理
- 2026秋招:中联重科题库及答案
- 2026秋招:中国平安真题及答案
- 代理销售协议2026年餐饮服务销售代理合同
- 物业小区控烟监督制度
- 2026年郑州市检验检测有限公司公开招聘19人笔试备考题库及答案解析
- 2025年11月中国人民财产保险股份有限公司临海支公司招考笔试历年典型考点题库附带答案详解试卷2套
- 2025年内蒙古建筑职业技术学院单招职业技能考试试题及答案解析
- 多模式镇痛临床实践与应用
- 2026吉林农业大学三江实验室办公室招聘工作人员笔试备考试题及答案解析
- 农田水利工程施工组织设计范例
- 2026年官方标准版离婚协议书
- 化验室复工安全培训课件
- 半导体物理与光电器件课件
- 04第四章-火箭导弹的气动布局
评论
0/150
提交评论