Current location - Quotes Website - Personality signature - What technologies are not included in the certification?
What technologies are not included in the certification?
The technology used for authentication does not include (c).

A. Message authentication

B. Identity authentication

C. artificial intelligence technology

D. digital signature

Commonly used network authentication technologies are as follows:

1. Authentication technology: When users of the system want to access system resources, they need to confirm whether they are legal users, which is authentication. The simplest methods such as user name and password are often used for user authentication and identification.

2. Message authentication technology: Message authentication mainly verifies the contents of communication between the two parties to ensure that the message has not been modified during transmission.

3. Digital signature authentication technology: Digital signature is a method to encrypt and authenticate electronic information, which is a message stored in electronic form and can be transmitted in communication networks. Because digital signature is carried out by using cryptographic technology, its security depends on the security degree of the adopted cryptographic system.

4. Authentication technology based on lightweight public key algorithm: In view of the fact that the classical public key algorithm needs a lot of calculation and is not operable in wireless sensor networks with limited resources, some researches are currently devoted to public key algorithms, such as.

Tiny PK authentication scheme of RSA public key algorithm and identity-based authentication algorithm.

5. Authentication technology based on random key pre-distribution: This technology allows each node to randomly select a key from the key pool. The number of keys that a node needs to access can be determined by the size of the key pool by using the local connectivity probability of the node or the size of the key pool can be determined by the storage capacity of the node.