Usually, authentication needs to transmit password or identity information, but it would be nice if you can authenticate your identity without transmitting this information. Zero-knowledge proof is a technology: the authenticated party A has some secret information, and A tries to convince the authenticator B that he does have that information, but he doesn't want the authenticator B to know that information.
Second, the authentication methods are different.
The identity authentication methods based on physical security, although the above-mentioned identity authentication methods are different in principle, all have the same feature, that is, they only rely on some secret information known by users. On the contrary, another authentication scheme relies on some unique biological information or hardware held by users.
Include fingerprint-based authentication, voice-based authentication and iris-based authentication. This technology uses the powerful functions of computer and network technology for image processing and pattern recognition, and has good security, reliability and effectiveness.
Third, password checking.
Password verification means that the system establishes a username/password pair for each legal user. When the user logs in to the system or uses a function, the system will prompt the user to enter the user name and password. The system verifies whether the user name and password entered by the user match the user name/password pairs of existing legal users in the system (these user name/password pairs are encrypted and stored in the system). If they match a username/password pair, the user's identity is verified.