USER AUTHENTICATION SECURITY

Authors

  • Andris Lastovskis Rēzeknes Tehnoloģiju akadēmija (LV)
  • Pēteris Grabusts Rēzeknes Tehnoloģiju akadēmija (LV)

DOI:

https://doi.org/10.17770/het2017.21.3555

Keywords:

Authentication, identification, identity, security, user

Abstract

Nowadays, the rapid development of technology and increased amount of data that must be processed and stored. All stakeholders are interested in security level of their system. To improve security, specific process was created, which will help identify the user, and only then give him access. As a result, developed process – authentication, it’s purpose of this is to improve user identification process, and to let him go further. In the end, as a result, this process either allows the user to work with the system, or rejects it because incorrect data was received by system. Often, the authentication process is based on some secret element that both the system and the user himself knows about. As an example it can be system’s provided login and password, some readable element, or even fingerprints.

Downloads

Download data is not yet available.

References

Downloads

Published

2017-04-19

Issue

Section

Information technology, mechatronics, electronics

How to Cite

[1]
A. Lastovskis and P. Grabusts, “USER AUTHENTICATION SECURITY”, HET, no. 21, pp. 158–163, Apr. 2017, doi: 10.17770/het2017.21.3555.