Authentication technology includes authentication-related technologies including digital signature technology, identity recognition technology and information integrity verification technology.
Certification technical specifications refer to technical documents formulated by the certification body to meet compliance requirements for product, service, and management system certification. These documents are the basis for certification and are standard-level documents, not rules or work procedure documents that designate agencies to implement certification.
The basis of authentication technology is cryptographic technology with good security guarantee. Technology that prevents attacks such as forgery, tampering, and impersonation by checking certain parameters during message transmission. Usually based on cryptographic techniques that provide good security guarantees for authentication techniques.
Certification is usually divided into product, service and management system certification. The CCC certification that everyone is more familiar with is compulsory product certification. The basis of authentication technology is cryptographic technology with good security guarantees. Technology that prevents attacks such as forgery, tampering, and impersonation by checking certain parameters during message transmission. Usually based on cryptographic techniques that provide good security guarantees for authentication techniques.
Extensions:
Practical security. Evaluated based on the amount of computation required by a scrambler to decipher an authentication system, if it is theoretically possible to decipher an authentication system, but cannot be completed with existing computing power, it is called a computationally secure authentication system; if the difficulty of deciphering the authentication system can be proven If the security is equivalent to solving a certain mathematical problem, it is called a provably secure authentication system.