Steve, a scientist who works in a governmental security agency, developed a technological solution to identify people based on walking patterns and implemented this app
roach to a physical control access.
A camera captures people walking and identifies the individuals using Steve-s approach.
After that, people must approximate their RFID badges. Both the identifications are required to open the door.
In this case, we ca
n say:
A. Although the approach has two phases, it actually implements just one authentication factor
B. The solution implements the two authentication factors: physical object and physical characteristic
C. The solution will have a high level of false po
sitives
D. Biological motion cannot be used to identify people