answersLogoWhite

0


Best Answer

An ID card portrays authentication based upon something the user has.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

A biometric reading, such as a fingerprint, retina scan or DNA sample portrays authentication based upon something a user is.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the portrays authentication based on something the user has?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Does a fingerprint portray authentication based upon something known?

Not always. Authentication is based upon one or more of the following:Something the user knows (such as a PIN).Something the user has (such as an ID card).Something the user is (such as a fingerprint).


Does your fingerprint portray authentication based upon something the user is?

Yes. Any biometric reading, such as a fingerprint, retina scan or DNA sample portrays authentication based upon something the user is.


What portrays authentication based on something?

You cannot portray identification upon something unknown. It must be something known only to the user, or be something the user is (such as a fingerprint, retina scan or DNA sample) or something the user has (such as an ID card).


What portrays authentication based on something unknown?

You cannot portray identification upon something unknown. It must be something known only to the user, or be something the user is (such as a fingerprint, retina scan or DNA sample) or something the user has (such as an ID card).


Is authentication based on something a person is?

Not always. Authentication is based upon one or more of the following:Something the user knows (such as a PIN).Something the user has (such as an ID card).Something the user is (such as a fingerprint).


What portrays authentication based on something the user is 1 fingerprint 2 pin 3 ATM card 4 RFID tag?

1. Fingerprint.


Why Authentication system that uses something a user has in conjunction with something a user knows is called?

Two-factor authentication uses something a user has in conjunction with something a user knows.


What is an An authentication system that uses something a user has in conjunction with something a user?

An authentication system that uses something a user has in conjunction with something a user knows is called:


An authentication system that uses something a user has in conjunction with something a user knows is called what?

An authentication system that uses something a user has in conjunction with something a user knows is called:


Is DNA something the user portrays that is known?

No. A biometric identification, such as fingerprint, retina scan or DNA sample portrays something that the user is.Authentication is achieved in one of three ways:something the user is (a biometric reading)something a user has (such as an ID card)or something the user knows (such as a PIN)For improved security, the user may be required to present two such authentications, such as an ID card and PIN. Or, preferably, all three, such as an ID card, PIN and retina scan.


How can I say java based applications are secure?

All Java Based Apps are secure because Java is one of the most secure programming languages. For Ex: In Web applications, security can be implemented using strong authentication. The different types of Authentication used in Web Applications are:• HTTP Basic Authentication - Authentication based on a username and password. It is the authentication mechanism defined in the HTTP/1.0 specification. A Web server requests a Web client to authenticate the user. The Web client obtains the username and the password from the user and transmits them to the Web server. The Web server then authenticates the user. This is the lowest level security of the four here.• HTTP Digest Authentication - The password is encrypted. Like HTTP Basic Authentication, HTTP Digest Authentication authenticates a user based on a username and a password. However, the authentication is performed by transmitting the password in an encrypted form.• HTTPS Client Authentication - This is end user authentication using HTTPS (HTTP over SSL). This mechanism uses public key encryption, which requires the user to possess a Public Key Certificate (PKC). This is the highest level security of the four here.• Form Based Authentication - This is similar to Basic except that a form is used with predefined fields. These fields must be named j_username and j_password, respectively and the form method and action must be named POST and j_security_check, respectively


What is IP based authentication?

user and organizations can be authenticated upon their IP-address without having to enter username and password