Biometric (fingerprint, retinal scan,
etc.) |
An alternative to using token cards, etc.
is using biometric authentication. Authentication is done using
physical attributes such as retinal scans and fingerprints. It
authenticates the person, not just the holder of an
authentication token. |
Caller-ID verification of remote location
|
In this security model, the remote user
calls up the system from a known phone number as verified by the
caller id service. This model falls in the telephone
connectivity software setup, which is outside the Oracle
database security framework. |
Telephone callback for remote users |
This is also outside the realm of the
Oracle database security framework. After a user dials the
number for remote connectivity, the number is confirmed by
caller id service as that of a known caller. The call is then
terminated and the system initiates the call to the remote
number to establish the connection. This ensures security even
if the remote user somehow masquerades the calling number. |