The authentication user is authenticated by the random call user log. There are several questions to be discussed, 1: The distinctiveness of the calling problem is easy to recall, ie the problem has operability. 2: Randomly call the most commonly used log, that is, the generation call of the pseudo-random number. 3: Does the user log need to be encrypted. 4: Start the security process mechanism for the user-incorrect response.