Читать книгу The Internet of Medical Things (IoMT) - Группа авторов - Страница 45
2.2.1.6 Biometrics
ОглавлениеThis is a strong certification [9]. The third aspect of authentication to be done is based on the user. He said that those that they know (username) and (either network or token) or after work that they have (retinal scan, fingerprint or thermal scanning). In cases necessary for data, such as military/defense, are confidential.