Читать книгу The Internet of Medical Things (IoMT) - Группа авторов - Страница 45

2.2.1.6 Biometrics

Оглавление

This is a strong certification [9]. The third aspect of authentication to be done is based on the user. He said that those that they know (username) and (either network or token) or after work that they have (retinal scan, fingerprint or thermal scanning). In cases necessary for data, such as military/defense, are confidential.

The Internet of Medical Things (IoMT)

Подняться наверх