Home  >  Article  >  What method is usually not used to verify the identity of the subject in computer information systems?

What method is usually not used to verify the identity of the subject in computer information systems?

藏色散人
藏色散人Original
2022-11-21 14:05:561562browse

In computer information systems, electronic signatures are usually not used to verify the identity of the subject; in computers, "static passwords", "smart cards", "USB KEY", "SMS passwords" or "dynamic passwords" are usually used " method to verify the legitimacy of the user's identity.

What method is usually not used to verify the identity of the subject in computer information systems?

#The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

What methods are not usually used to verify the identity of the subject in computer information systems?

In computer information systems, electronic signature methods are usually not used to verify the identity of the subject.

The computer uses the following methods to verify the legitimacy of the user's identity:

1. Static password

The user's password is set by the user himself. When you enter the correct password when logging in to the network, the computer will consider the operator to be a legitimate user. In fact, in order to prevent forgetting passwords, many users often use easily guessed strings such as birthdays and phone numbers as passwords, or write passwords on paper and put them in a place they think is safe, which can easily lead to password leaks. .

2. Smart card

The general name for a plastic card (usually the size of a credit card) embedded with a microchip. Some smart cards contain a microelectronic chip, and the smart card requires a reader/writer for data exchange. Smart cards are equipped with CPU, RAM and I/O, and can handle large amounts of data without interfering with the work of the host CPU.

3. USB KEY

The USB Key-based identity authentication method is a convenient and secure identity authentication technology developed in recent years. It adopts a strong two-factor authentication mode that combines software and hardware and one-time password, which effectively solves the contradiction between security and ease of use.

4. SMS password

SMS dynamic password is also called SMS password. It is a 6-digit random number dynamic password sent in the form of mobile phone text message. It is also a form of mobile phone dynamic password and identity authentication system. A random 6 to 8-digit password is sent to the customer's mobile phone in the form of a text message. The customer enters this dynamic password when logging in or performing transaction authentication, thereby ensuring the security of the system's identity authentication.

5. Dynamic password

Dynamic password is a terminal held by the customer to generate dynamic password. The mainstream one is based on time synchronization. The dynamic password is changed every 60 seconds, and the password is valid once. , which generates 6-digit dynamic numbers for one-time pad authentication.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What method is usually not used to verify the identity of the subject in computer information systems?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn