A computer system is a collection of hardware and software components designed to provide an effective tool for computation. Computer system are used in every walk of life to assist us in the various tasks we perform. The wide availability of the internet has enhance the use of computer for information sharing and communication. Computer system allows us to store, process, display and communicate information. In any modern computer system even a simple one, in general needs several different programs in order to accomplish its various functions.

Saturday, April 8, 2017

Password as identity authentication

Identity authentication is the foundation of the whole information safety system. It’s first defense line of network security, also the most important defense line. Identity authentication is such a technique to determine user’s identity.

The most common way for a user or service to authenticate is to supply a password. Authenticator requests to identify should have an ID. This ID is unique in authenticator user’s database.
A password is a secret word or a series of characters that have a follow some predefined rules (e.g. be a certain length and contain a mixture of letters and digits). Passwords can take many forms. For example, a password can be a string of random characters, a phrase (known as a pass-phrase), a graphical character or even a sentence (known as a pass-sentence)

Mobile identity authentication method contains traditional password, dynamic password, etc. But they all exist user privacy leakage problem.

Traditional password is easy to be cracked and memorized, and it easy to be intercepted by network sniffer over transmission. Dynamic password, such as Short Message Service verification code, can effectively ensure security of user identity by using password each time.
Password as identity authentication
Related Posts Plugin for WordPress, Blogger...

The Most Popular Posts