Identity authentication is the foundation of the whole information safety system. It’s first defense line of network security, also the most important defense line. Identity authentication is such a technique to determine user’s identity.
The most common way for a user or service to authenticate is to supply a password. Authenticator requests to identify should have an ID. This ID is unique in authenticator user’s database.
A password is a secret word or a series of characters that have a follow some predefined rules (e.g. be a certain length and contain a mixture of letters and digits). Passwords can take many forms. For example, a password can be a string of random characters, a phrase (known as a pass-phrase), a graphical character or even a sentence (known as a pass-sentence)
Mobile identity authentication method contains traditional password, dynamic password, etc. But they all exist user privacy leakage problem.
Traditional password is easy to be cracked and memorized, and it easy to be intercepted by network sniffer over transmission. Dynamic password, such as Short Message Service verification code, can effectively ensure security of user identity by using password each time.
Password as identity authentication
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
The PageRank algorithm, developed by Larry Page and Sergey Brin, is a cornerstone of modern search engine technology. Introduced in 1996 dur...
-
The ARPANET, or Advanced Research Projects Agency Network, played a pivotal role in the history of the internet. Initiated in 1969 by the U....
-
Google Books is a giant catalog millions of books on almost any topic. Google intends to scan every books ever published, and to make full t...
-
An Enterprise Information Portal (EIP) is a centralized, digital hub that enables employees within an organization to access a wide array of...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...