The basic methods of user authentication can be divided into the following three types:
1, prove your identity according to the information you know.
2. Prove your identity according to what you have (what you have, what you have);
3, directly according to the unique physical characteristics to prove your identity (who are you, who are you), such as fingerprints, appearance, etc.
Extended data:
Reasons for authentication:
1, all information in the computer network world, including the user's identity information, is represented by a specific set of data. Computers can only identify users' digital identities, and all authorizations to users are also authorizations to users' digital identities.
2. How to ensure that the operator operating in a digital identity is the legal owner of this digital identity, that is to say, to ensure that the physical identity of the operator corresponds to the digital identity, identity authentication is to solve this problem. As the first gateway to protect network assets, identity authentication plays an important role.
Baidu encyclopedia-identity authentication