Joke Collection Website - Blessing messages - What method is used in the computer to verify the legitimacy of user identity?
What method is used in the computer to verify the legitimacy of user identity?
The user's password is set by the user himself. Enter the correct password when logging in to the network, and the computer will think that the operator is a legitimate user. In fact, in order to avoid forgetting the password, many users often use easily guessed strings such as birthdays and phone numbers as passwords, or copy the passwords on paper and put them in places they think are safe, which can easily lead to password leakage.
2. Smart card
A generic term for a plastic card (usually the size of a credit card) embedded with a microchip. Some smart cards contain microelectronic chips, and smart cards need to interact with each other through card readers. Smart card is equipped with CPU, RAM and I/O, which can handle a large amount of data by itself without disturbing the work of the host CPU.
3、USB KEY
The authentication method based on USB Key is a convenient and safe authentication technology developed in recent years. The strong two-factor authentication mode combining software and hardware, one secret at a time, solves the contradiction between security and ease of use.
4. SMS password
SMS dynamic password, also called SMS password, is a 6-digit random number dynamic password sent in the form of SMS, and it is also a mobile phone dynamic password form. The identity authentication system sends a random 6-8-digit password to the customer's mobile phone in the form of short message, and the customer enters this dynamic password when logging in or authenticating the transaction, thus ensuring the security of the system identity authentication.
5. Dynamic password
Dynamic password card is a terminal held by customers to generate dynamic passwords. The mainstream is based on time synchronization. The dynamic password is changed every 60 seconds, and the password is valid once. It generates 6-bit dynamic numbers for one-time and one-secret authentication.
Baidu encyclopedia-identity authentication
- Related articles
- Kunming SMS watch
- What is the way to individually set up and shut down small virtual accounts in the same city?
- How can the blackmailer get the message back?
- Weibo's online loan is overdue.
- Teacher's English cover letter?
The function of the cover letter is to realize communication, so that job seekers can show their talents, abilities and qualifications, highlight their achievemen
- Yunfu institution recruitment registration entrance
- For the seller, the best payment method.
- Ask me to sign at the government affairs center. How can I verify the loan arrears?
- How to ask for leave from the leader?
- Simple excerpts from daily good night.