Joke Collection Website - Public benefit messages - What are the main means of identity authentication at present?
What are the main means of identity authentication at present?
(1) Static password: the user's password is set by himself. Enter the correct password when logging in to the network, and the computer will think that the operator is a legitimate user. The use and deployment of static password mechanism is very simple, but from the perspective of security, username/password is an unsafe authentication method.
(2) Smart card: Smart card authentication is to ensure that the user's identity will not be forged by the fact that the smart card hardware cannot be copied.
(3) SMS password: SMS password requests a dynamic password containing a 6-digit random number in the form of SMS, and the identity authentication system sends a random 6-digit password to the customer's mobile phone in the form of SMS. Customers enter the dynamic password when logging in or authenticating transactions, thus ensuring the security of system authentication.
(4) Dynamic password: Dynamic password is the most widely used identification method, which is generally a string with a length of 5~8, consisting of numbers, letters, special characters and control characters.
(5)USB KEY: The authentication method based on USB KEY is a convenient and safe authentication technology developed in recent years. The strong two-factor authentication mode combining software and hardware, one secret at a time, solves the contradiction between security and ease of use.
(6) Biometrics: A technology of identity authentication through measurable physical or behavioral characteristics by using the "who are you" method.
(7) Double factor: The so-called double factor is to combine the two authentication methods to further strengthen the security of authentication.
2. Identity authentication: also known as "identity authentication" or "identity authentication", it refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to a certain resource, so that the access strategy of the computer and network system can be reliably and effectively implemented, preventing attackers from impersonating legitimate users to gain access rights to resources, ensuring the security of the system and data, and authorizing the legitimate interests of visitors.
- Related articles
- Blessing message to leaders on New Year's Day
- Text messages? :) What do you mean?
- What will happen if my husband cheats? Is ambiguous SMS evidence of cheating?
- Wenxian Wenquan Road sweeps out the yellow code to find out who to report.
- Does China Mobile charge for SMS notification traffic?
- Is there a cheaper Unicom card package suitable for the elderly?
- Father's 60th birthday, should I go back?
- Auchan x5app mobile phone opens the door to display network abnormality.
- How to fill in the verification code of Anhui adult college entrance examination results query
- China Mobile package processing failed. An exception occurred while calling the interface.