当前位置:网站首页>How to protect user privacy without password authentication?
How to protect user privacy without password authentication?
2022-07-21 02:45:00 【nginx】
The security risks of common authentication methods are as follows :

Since both static and dynamic password authentication methods have vulnerabilities , Then whether authentication can be independent of passwords ?
Actually , Long ago , Someone began to imagine “ Password-free login ”. Of course ,“ Password-free login ” It does not mean that there is no password , Instead, use a new authentication method , To replace the existing password authentication system .HMS Core Online Fast Authentication Service (HMS Core FIDO) Based on this starting point , It provides a more advantageous solution for developers : User authentication without password , Provide local biometric authentication and online fast authentication capabilities , It can be used for user login 、 Purchase payment and other scenarios , meanwhile , Through system integrity detection and key verification mechanism , To ensure that the verification results are safe and reliable . The implementation process is as follows .

In terms of security , First ,HMS Core FIDO It avoids the user entering the account password manually , Therefore, there is no need to worry about the risk of account password disclosure .
secondly , Use HMS Core FIDO There is no need for users to carry additional second authentication devices .App The user's identity can be verified through the built-in components of the user's mobile phone , Such as fingerprint verifier 、3D Face sensor 、 Iris verifier, etc . If App Hope to strengthen the verification , In addition to using or inserting the second device , Users' mobile phones can be directly used as security key hardware , Complete authentication . A cell phone , Support multiple verification scenarios , Users do not need to carry additional equipment ,HMS Core FIDO It not only improves the user experience , At the same time, it also reduces the deployment cost of Internet service providers .
Last , The user biometric information used in the verification process will never leave the user's device , It can only be used after unlocking locally , Therefore, there is no need to worry about leaking user data from the server .
In addition to providing secure authentication ,HMS Core FIDO It can also help developers optimize the user experience .
HMS Core FIDO The protocol is always designed around protecting users' privacy , These protocols do not provide information that can be used to track users on Internet platforms , If biometric technology is adopted , User biometric information will never leave the user device . This is compared with the traditional biometric authentication , Great improvements have been made in security and privacy protection , Because traditional biometric authentication will collect user data to the server , Once the server data leaks , There will be serious consequences . From the user's point of view , The privacy experience has been greatly improved .
During authentication , The user operation is simple , The process is smooth and uninterrupted , Don't spend too much time waiting , For example, accept the verification code 、 Enter the password, etc .
HMS Core FIDO Application scenarios of
at present ,FIDO Technology has been developed by global equipment manufacturers 、 Widespread recognition of Internet service providers , Including some large banks and other financial institutions 、 Government network platform, etc , Mature application in high security scenarios involving capital changes , Such as : Shopping websites or App Purchase payment 、 Digital currency transfer 、 Mobile Banking ( Online Banking Service ) Large transactions in , wait . Take the use process for example ,App Check whether the device supports when the user logs in HMS Core FIDO, If the support ,App It can guide users to open fingerprints or 3D Face login , Users only need to verify their fingerprints or 3D Face can be .
HMS Core FIDO Is based on FIDO Standardize the open capabilities for developers at home and abroad , It can help Internet service providers to make the authentication process more secure 、 It's simpler , At the same time, it can also gain a better user experience .FIDO Its full name is Fast Identity Online standard , By FIDO The alliance has launched and continues to maintain a set of authentication framework protocols , It uses standard public key cryptography , Provide a more powerful authentication method .
Click to enter HMS Core FIDO Official website , Get development guidance document , Experience high-quality authentication capabilities .
Learn more >>
Visit the official website of Huawei developer alliance
Get development guidance document
Huawei mobile service open source warehouse address :GitHub、Gitee
Pay attention to our , The first time to understand HMS Core Latest technical information ~
边栏推荐
- 国外域名能注册吗?
- 得物App数据模拟平台的探索和实践
- One article speed learning - basis of pyspark data analysis: detailed explanation of pyspark basic functions and basic grammar
- 爱学啊的博客-人生苦短,只做好课!
- How do independent website sellers use Facebook homepage for social media marketing?
- 从概念到安全实践:软件供应链基础指南
- 结构体完结(柔性数组)
- To get to the bottom: Principle Analysis of Objective-C correlation attribute
- Can the tidb of a single machine be used in the production environment?
- Date range generator
猜你喜欢
How does HMS core security detection service help freshmen prevent Telecom fraud?
Excel打印技巧 十二种Excel打印技巧汇总
[Muduo log system 2] timestamp time
EF Core学习笔记:额外的外键属性 / 单项导航属性
Analysis on the wallet system architecture of Baidu trading platform
百度交易中台之钱包系统架构浅析
软件界面和简单系统仿真
中文主播也能海外带货!同声传译助直播类应用开拓海外市场
买量洞察与渠道评估,助力营销决策优化
Excel怎么转换为Word格式?将Excel转换为Word格式的方法
随机推荐
织梦添加栏目修改栏目时提示“保存目录数据时失败,请检查你的输入资料是否存在问题”
结构体完结(柔性数组)
Date range generator
Get the way to optimize the one-stop worktable of customer service
从对象中获取一年中的日期(范围 1-366 中的数字)Date
解读Go分布式链路追踪实现原理
Get the date of the year (number in the range 1-366) date from the object
[Android Development iOS Series] Language: SWIFT vs kotlin
cnvd_ 2019_ twenty-two thousand two hundred and thirty-eight
Jenkins自动化部署
excel宏被禁用如何启用?excel无法启用宏的解决方法
分布式笔记(05)— 分布式锁之 etcd(分布式锁原理、etcd特点、分布式锁实现方案)
Can the tidb of a single machine be used in the production environment?
C语言中getchar()函数的详解
PPT柱状图如何增加柱子
swift 使用SMAMB2包,重新打包的心酸历程
买量洞察与渠道评估,助力营销决策优化
How to convert Excel to word format? Method of converting Excel to word format
老域名建站有什么优势?
TCP协议的相关特性