Joke Collection Website - Public benefit messages - What does abnormal authentication mean?

What does abnormal authentication mean?

In fact, bank card authentication is to verify whether the four elements of the cardholder's name, ID number, bank card number and bank reserved mobile phone number conform to the meaning. If the authentication fails, it is likely that the information of the four elements is inconsistent. At this time, users need to bring their ID cards and bank cards to the bank to reapply, and that's all.

If there is no authentication function, mobile users can access and use any wireless network at will, the interests of operators can not be guaranteed, and the safety of users will also be threatened. At the beginning of the development of mobile communication network, this problem was considered and solved: user authentication was used to identify illegal users.

User authentication is to authenticate users who try to access the network and check whether they have the right to access the network. User authentication can protect the network and prevent illegal theft; At the same time, it protects customers in the network by rejecting the "invasion" of fake legitimate customers.

The meaning of certification:

Authentication refers to verifying whether the user has access to the system. Traditional authentication is verified by a password. The premise of this method is that every user who gets the password is authorized.

When a user is created, a password is assigned to the user. The user's password can be specified by the administrator or applied by the user himself. The weakness of this method is obvious: once the password is stolen or the user is lost, the situation will be very troublesome, and the administrator needs to modify the user's password again, and must manually verify the legal identity of the user before modifying the password.

In order to overcome the shortcomings of this authentication method, a more reliable authentication method is needed. The mainstream authentication method is to use authentication authorization to verify the correctness of digital signature.

Logically speaking, authorization occurs after authentication, but in fact, the two are often a process.