Preliminary ideological on password system alternatives

xiaoxiao2021-03-06  57

The authentication user is authenticated by the random call user log. There are several questions to be discussed, 1: The distinctiveness of the calling problem is easy to recall, ie the problem has operability. 2: Randomly call the most commonly used log, that is, the generation call of the pseudo-random number. 3: Does the user log need to be encrypted. 4: Start the security process mechanism for the user-incorrect response.

转载请注明原文地址:https://www.9cbs.com/read-113926.html

New Post(0)