Recently, the Internet covers more and more areas of our lives.Almost everything can be accomplished using this resource.For example, to pay for utility services, transfer money to another city, recharge your mobile device, and so on.This often leaves a message on the screen of the authentication.Sometimes we do not even think about its importance and just do not pay attention to it.It would be nice to know in more detail what authentication.For this process to protect our personal information from fraudulent actions.
Concept and types
Consider first the notion that such authentication.It is a test, or, in other words, verification of the authenticity of accesses to a particular user's system.There are several types of this process:
-
unilateral and bilateral authentication.
-
univariate and multivariate authentication.They differ in the number of methods used.
-
Static - with the protection of information is carried out by using the site.
-
sustainability - are protected from eavesdropping user identity through the use of dynamic.
-
Continuous Authentication - ping occur at each stage.
authenticity control methods
reveal more detail the question of what authentication will help to examine the methods used in this process.There are several methods of testing:
-
using a password.
-
combined - in addition to the password, use the other attributes of control.This may be cryptographic papers, smart cards, e-tokens, mobile phone.
-
Using scanning or analysis of physiological characteristics.This so-called biometric verification methods.
-
With the use of satellite communications - is the authentication process is performed on the basis of confirmation of the location by using the navigation system GPS.
principle of
authentication process object occurs when you try to log on the user with the requested ID and secret information.An example of using a one-time password is most clearly reflects that such authentication.At each session, the user enters a username and password generated by the system.In addition, there are various ways of drawing up the password.For example, the characters change, but the algorithm input remains constant.
systems to ensure the safety
At the moment, there are different authentication systems that provide protection for different areas.In this system, different programs use different methods, thereby achieving the most successful prevention of information leakage.Thus, the system Indeed-Id is specially designed to protect companies from unauthorized outsiders.The system is based on strong authentication with the use of various methods of testing - and the employees receive universal access.
Cases of hacking
However, with the development of control technologies authenticity attack by hackers have become tougher.Thus, according to one of the employees of the German Police Mirko Manske, cases of hacking bank accounts.Moreover, authentication using two methods of verification can not be justified, and money continues to flow out of the banks in Germany in "pockets" of cybercriminals.Mirko Manske spoke at the conference in London with a message of insolvency of a system using codes iTan, which is used almost all banking institutions in Germany.
As can be seen in the face of increasing attacks by malicious users require authentication with advanced methods of data protection.Developers devise reliable methods, but they also know how to approach and hackers.