Identity authentication is the foundation of the whole information safety system. It’s first defense line of network security, also the most important defense line. Identity authentication is such a technique to determine user’s identity.
The most common way for a user or service to authenticate is to supply a password. Authenticator requests to identify should have an ID. This ID is unique in authenticator user’s database.
A password is a secret word or a series of characters that have a follow some predefined rules (e.g. be a certain length and contain a mixture of letters and digits). Passwords can take many forms. For example, a password can be a string of random characters, a phrase (known as a pass-phrase), a graphical character or even a sentence (known as a pass-sentence)
Mobile identity authentication method contains traditional password, dynamic password, etc. But they all exist user privacy leakage problem.
Traditional password is easy to be cracked and memorized, and it easy to be intercepted by network sniffer over transmission. Dynamic password, such as Short Message Service verification code, can effectively ensure security of user identity by using password each time.
Password as identity authentication
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
CyberCash Inc. was founded in 1994 and is performing secure credit card presentations since April 1995. CyberCash provides a range of commer...
-
The trash can has been a familiar presence on computer desktops starting with the early Macintosh systems. Unwanted files can be moved t...
-
Doxxing is the word coined to describe the process of releasing of personally identifying information to the public without their consent. ...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...
-
Spreadsheet is a simple worksheet consisting of rows and columns in which any data can be entered. It does calculations and other operation ...
-
-
An international team of researchers from Switzerland, the United Kingdom, and Canada has identified the gene responsible for a rare but life-threatening...
-
Adenosine diphosphate (ADP) is a key molecule in cellular energy regulation, consisting of adenosine and two phosphate groups. It is central to the cell's ...