Home Common Problem What method is usually not used to verify the identity of the subject in computer information systems?

What method is usually not used to verify the identity of the subject in computer information systems?

Nov 21, 2022 pm 02:05 PM
computer information system

In computer information systems, electronic signatures are usually not used to verify the identity of the subject; in computers, "static passwords", "smart cards", "USB KEY", "SMS passwords" or "dynamic passwords" are usually used " method to verify the legitimacy of the user's identity.

What method is usually not used to verify the identity of the subject in computer information systems?

#The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

What methods are not usually used to verify the identity of the subject in computer information systems?

In computer information systems, electronic signature methods are usually not used to verify the identity of the subject.

The computer uses the following methods to verify the legitimacy of the user's identity:

1. Static password

The user's password is set by the user himself. When you enter the correct password when logging in to the network, the computer will consider the operator to be a legitimate user. In fact, in order to prevent forgetting passwords, many users often use easily guessed strings such as birthdays and phone numbers as passwords, or write passwords on paper and put them in a place they think is safe, which can easily lead to password leaks. .

2. Smart card

The general name for a plastic card (usually the size of a credit card) embedded with a microchip. Some smart cards contain a microelectronic chip, and the smart card requires a reader/writer for data exchange. Smart cards are equipped with CPU, RAM and I/O, and can handle large amounts of data without interfering with the work of the host CPU.

3. USB KEY

The USB Key-based identity authentication method is a convenient and secure identity authentication technology developed in recent years. It adopts a strong two-factor authentication mode that combines software and hardware and one-time password, which effectively solves the contradiction between security and ease of use.

4. SMS password

SMS dynamic password is also called SMS password. It is a 6-digit random number dynamic password sent in the form of mobile phone text message. It is also a form of mobile phone dynamic password and identity authentication system. A random 6 to 8-digit password is sent to the customer's mobile phone in the form of a text message. The customer enters this dynamic password when logging in or performing transaction authentication, thereby ensuring the security of the system's identity authentication.

5. Dynamic password

Dynamic password is a terminal held by the customer to generate dynamic password. The mainstream one is based on time synchronization. The dynamic password is changed every 60 seconds, and the password is valid once. , which generates 6-digit dynamic numbers for one-time pad authentication.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What method is usually not used to verify the identity of the subject in computer information systems?. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)