Computers and computer software  support - find it on CompInfo
The Computer Information Center (CompInfo)
The top one-stop reference resource for corporate IT, computers and communications
Millions of IT users world-wide rely on our Web-based support resources
Tell your colleagues and friends, and bookmark us at http://www.compinfo-center.com/
Manufacturers Technical
Topic Centers
News Events Books Magazines Jobs Search Free Newsletter Add URL Add News/Events

 
Help on CompInfo
Find your way around CompInfo
HOME ( IT News ) page
SEARCH CompInfo
Certification Resources
 
Free Newsletters
Keep up-to-date with news, events, resources, and special offers. Subscribe here
 
IT Support Centers
Technical Knowledge bases
Support Desk - Drivers, Documentation, etc.
Introduction Pages to Technologies
Product Reviews and Evaluations
White Papers, Articles and Reports
Download Software
Computer History, Dictionaries & Encyclopaedias
 
Information Centers
The latest News!
What's On - Computer Events
Find a Book
Technology Futures
Computer Magazines
IT Publishers
Looking for a Job?
 
Business Centers
Business Applications
VAR Business
IT Investors' Center
 
Computer Directories
Manufacturers
Distributors
Resellers
Solution Providers
Service Providers
Consultants
Trainers
Maintenance Companies
Internet Service Providers
Organizations
User Groups
 
And For Leisure ...
Non IT Sites
 
Add Your Information
Add Your Company's URL
Add News
Add Events
Promote Your Products and Services
 
Sundry
Contact Us
Privacy Policy
Feedback on site changes


Identity Verification

Beginners, Glossary and Background | Technical Knowledge Bases | News | Events | Books | Magazines | Manufacturers | Products and Reviews | White Papers, Reports and Articles | Training Tools | Where to buy | Where to get help | Trainers | News Groups, Discussion Forums, Mail Lists and FAQs | User Groups | Trade Associations
 

Beginners, Glossary and Background


Identity Verification is used to authenticate the user of a system - to show whether the person is who he or she claims to be. Passwords are commonly used but the computer can only check that the password is valid, not whether it is being entered by the authorised person. [

Biometrics makes use a biological characterstic that uniquely identifies the individual. Fingerprints and retinal images have been used for this.

Digital signatures can be used to show that a document has been signed and that the document has not been subsequently modified. This can be done using a real hand written signature, captured using an electronic touch tablet, or by using an encryption key known only by the sender.

Digital certificates can also be used to identify the sender of data or a message.</td></tr><tr><td align=center colspan=3><hr noshade size=1></td></tr></table></td></tr><tr><td align=center><p> </p><a href=/compinfo/reginterest.nsf/GenInterestWeb?OpenForm><img border=0 src=/images/compinfo/inform.gif alt="Keep me informed"></a>

</table><center><table border="0" width="85%"><tr><td align=center><br><br><br><br><br><hr noshade size="1"><font face="arial" size="-2" color="#000000">©Copyright The Computer Information Center 1995 - 2000<p><b>Disclaimer</b><p align=justify>The Computer Information Center provides information in good faith, but does not provide any warranties whatsoever, nor assume any legal liability or responsibility whatsoever, for the accuracy, completeness or usefulness of any of the information supplied. It is not in any way responsible, and has no legal liability, in respect of the contents of any other site referenced from this site. The ownership of all trademarks, etc. referred to on this site is acknowledged<hr noshade size="1"><a href="mailto:webmaster@compinfo-center.com">Webmaster </a></td></tr></table>
</TD><TD VALIGN="TOP" ALIGN="CENTER" WIDTH="25%"><TABLE BORDER="0" CELLPADDING="2" WIDTH="100%"><TR><TD VALIGN="TOP" ALIGN="CENTER"><B><FONT COLOR="#990033" SIZE="-2" FACE="Arial, Helvetica, sans-serif">21 October, 2000<HR></FONT></B></TD></TR><tr><td align=center valign=top bgcolor=#000066><font size=-1 color=#FFFFFF><b>Find</td></tr><tr><td align=left valign=top><font size=-2><a href=/compinfo/companies.nsf/varresults?OpenForm&Query=Identity+Verification class=menu-item>Reseller Opportunities</a></td></tr><tr><td align=left valign=top><font size=-2><a href=/compinfo/companies.nsf/empresults?OpenForm&Query=Identity+Verification class=menu-item>Job Opportunities</a></td></tr><tr><td align=left valign=top><font size=-2><a href=/quotes.htm class=menu-item>Competitive prices for products and services</a><hr></td></tr><tr><td align=center valign=top bgcolor=#000066><font size=-1 color=#FFFFFF><b>News</td></tr><tr><td align=left valign=top><font size=-2><a href=/compinfo/tt.nsf/Usage?OpenAgent&DB=What's+News&UNID=02689F3FFB2EB7A98025697C0028678A&URL=http://www.koreaherald.co.kr/news/2000/10/__10/20001017_1054.htm&CO=Pass+21+develops+fingerprint+identification+solution&SRC=Technical+Topic+-+Identity+Verification+(Beginners,+Glossary+and+Background) target=_new class=menu-item>Pass 21 develops fingerprint identification solution</a></td></tr><tr><td align=left valign=top><font size=-2><a href=/compinfo/tt.nsf/Usage?OpenAgent&DB=What's+News&UNID=301F7931DB37FEBC8025696F00299209&URL=http://www.koreaherald.co.kr/news/2000/10/__10/20001005_1024.htm&CO=LGE+unveils+monitor+with+fingerprint+identification+system+to+access+computer&SRC=Technical+Topic+-+Identity+Verification+(Beginners,+Glossary+and+Background) target=_new class=menu-item>LGE unveils monitor with fingerprint identification system to access computer</a></td></tr><tr><td align=left valign=top><font size=-2><a href=/compinfo/tt.nsf/Usage?OpenAgent&DB=What's+News&UNID=CCCEAA6781BE2B77802569650057A43E&URL=http://www.techweb.com/wire/story/TWB20000925S0007&CO=Biometrics'+Next+Frontier:+Online+Exchanges&SRC=Technical+Topic+-+Identity+Verification+(Beginners,+Glossary+and+Background) target=_new class=menu-item>Biometrics' Next Frontier: Online Exchanges</a></td></tr><tr><td align=left valign=top><font size=-2><a href=/compinfo/tt.nsf/Usage?OpenAgent&DB=What's+News&UNID=E06FCE5B740DEAC08025695A006D5753&URL=http://www.pcworld.com/pcwtoday/article/0,1510,18466,00.html&CO=The+First+Electronic+Tooth?&SRC=Technical+Topic+-+Identity+Verification+(Beginners,+Glossary+and+Background) target=_new class=menu-item>The First Electronic Tooth?</a></td></tr><tr><td align=left valign=top><font size=-2><a href=/compinfo/tt.nsf/Usage?OpenAgent&DB=What's+News&UNID=F03F18E3F1CE7EB7802569460064248F&URL=http://www.vnunet.com/News/1107369&CO=E-signature+law+labelled+as+'red+herring'&SRC=Technical+Topic+-+Identity+Verification+(Beginners,+Glossary+and+Background) target=_new class=menu-item>E-signature law labelled as 'red herring'</a></td></tr><tr><td align=left valign=top><font size=-2 color=#0000ff>.......... <a href=/compinfo/tt.nsf/infoform?OpenForm&Type=News&Topic=Identity+Verification class=menu-item>More News</a><hr></table></td></tr></table>]