Thursday, November 4, 2010

Identity Verification

Identity verification, say again "verify", "jian rights", refers to through certain means and the completion of the user's identity confirmation.
Identity verification purpose is to identify the current claims for a sense of identity, user is indeed claimed user. In daily life, Identity verification is not rare; For example, through check their papers, we usually can be sure that each other's identity. Although in daily life this confirmation each other identity practice also belong to the generalized "identity verification", but "Identity verification" one word were more likely to be used in computer, communication, etc.
Identity verification method has a lot of, basically can be divided into: based on Shared key identity verification, based on biological characters of Identity verification and public-key encryption algorithm based on the Identity verification.
Different identity verification method, safety also have each level.
Based on the sharing key Identity verification
Based on the sharing key Identity verification refers to the server and user a jointly owned or group of password. When the user needs Identity verification, the user via input or pass a preservation have submitted by the user password equipment and server Shared password. The server received user submitted the password, check the user submitted password with the server save whether the password is consistent, if consistent, judge whether the user for legitimate users. If the user submitted password with the server held by the password is not consistent, whereas it is considered Identity verification failed.
Use based on Shared key Identity verification services has a lot of, such as: the overwhelming majority of Internet access services, most of the BBS and wikipedia, etc.
Public-key encryption algorithm based on the Identity verification
Based on public-key encryption algorithm identity verification refers to the communication of both sides respectively holds public key and private keys, by one of the parties using private key to specific data encryption, and the other party adopted public-key for data decryption decryption, if successful, think users is a legitimate user, otherwise considered Identity verification failed.
Use public-key encryption algorithm based on the Identity verification services include: SSL and digital signature, etc.

No comments:

Post a Comment