Slide Show: Extreme And Alternative Authentication Methods

Passwords are the weakest link in access control, but there are plenty of other, less-traveled options for authentication

\Another option still making its way through the academic research process is the idea of utilizing images as a sort of authenticating lock. Users click on a number of points known only to them during enrollment and repeat the process at authentication.

Screen shot courtesy of Mininova Labs

Recommended Reading: