Based on listed authentication types the following groups of authentication mechanisms can be listed.
Biometrics is the comparison of anatomical, physiological and behavioral characteristics of a person. Biometric authentication mechanisms fall into two basic categories:
It’s difficult to compare biometric technologies within each other. Each has a different range of accuracy, reliability and usability. In case of usability the simple biometric is face detection. Conversely methods that require specific position of the body to the sensor (iris detection), and are thus less comfortable to use, can achieve more accurate results.
This type of authentication mechanism is based on generating random sequences of letters or numbers, called password in case is word or the PIN if it is a numerical expression or passphrase if it contains more than one word. Passwords can be also in semantic form.
Password types:
Idea graphical authentication is based on the user's visual memory. Scientific studies point to the fact that the human being has a huge and practically unlimited possibilities to remember the pictures [9].
Graphic codes are gaining popularity especially in the case of mobile or tablets technologies, e.g. to unlock mobile phone. There are two main principles:
Authentication can be based on something that a user owns. This object is token. A good example is the token SecureID from RSA Security in Fig. 4.3. [15]
Token through a cryptographic function that combines the lock and a secret key, create a numerical code displayed on the LCD. To authenticate user type number from SecureID. The authentication server also knows the secret key stored in the user's token, as well as the time and date. Based on this knowledge the authentication server performs the same cryptographic functions. For successful authentication, the generated value must match the value that was inserted by the user.
Another type of authentication token is the one with USB (Universal Serial Bus) interface.
Tokens are provided as software (SW) or hardware (HW).
The main disadvantage of HW token is that user has to always carry it.
The SW tokens are stored in users PC or laptop. In this case user can access the system only from PC where the token is stored.