当前位置:网站首页>How to protect user privacy without password authentication?
How to protect user privacy without password authentication?
2022-07-05 11:30:00 【Huawei mobile services】
In the Internet world , Verifying user identity is a common and important scenario , The most widely used method is account password verification . As developers' requirements for authentication security continue to improve , In addition, users pay more attention to privacy and convenience in the process , Authentication methods are gradually diversified , With dynamic token 、 SMS verification code 、 Biometric authentication and other methods . This article mainly from the perspective of security , Discuss the security vulnerabilities of several common authentication methods , Provide more advantageous solutions for developers .
The security risks of common authentication methods are as follows :

Since both static and dynamic password authentication methods have vulnerabilities , Then whether authentication can be independent of passwords ?
Actually , Long ago , Someone began to imagine “ Password-free login ”. Of course ,“ Password-free login ” It does not mean that there is no password , Instead, use a new authentication method , To replace the existing password authentication system .HMS Core Online Fast Authentication Service (HMS Core FIDO) Based on this starting point , It provides a more advantageous solution for developers : User authentication without password , Provide local biometric authentication and online fast authentication capabilities , It can be used for user login 、 Purchase payment and other scenarios , meanwhile , Through system integrity detection and key verification mechanism , To ensure that the verification results are safe and reliable . The implementation process is as follows .

In terms of security , First ,HMS Core FIDO It avoids the user entering the account password manually , Therefore, there is no need to worry about the risk of account password disclosure .
secondly , Use HMS Core FIDO There is no need for users to carry additional second authentication devices .App The user's identity can be verified through the built-in components of the user's mobile phone , Such as fingerprint verifier 、3D Face sensor 、 Iris verifier, etc . If App Hope to strengthen the verification , In addition to using or inserting the second device , Users' mobile phones can be directly used as security key hardware , Complete authentication . A cell phone , Support multiple verification scenarios , Users do not need to carry additional equipment ,HMS Core FIDO It not only improves the user experience , At the same time, it also reduces the deployment cost of Internet service providers .
Last , The user biometric information used in the verification process will never leave the user's device , It can only be used after unlocking locally , Therefore, there is no need to worry about leaking user data from the server .
In addition to providing secure authentication ,HMS Core FIDO It can also help developers optimize the user experience .
HMS Core FIDO The protocol is always designed around protecting users' privacy , These protocols do not provide information that can be used to track users on Internet platforms , If biometric technology is adopted , User biometric information will never leave the user device . This is compared with the traditional biometric authentication , Great improvements have been made in security and privacy protection , Because traditional biometric authentication will collect user data to the server , Once the server data leaks , There will be serious consequences . From the user's point of view , The privacy experience has been greatly improved .
During authentication , The user operation is simple , The process is smooth and uninterrupted , Don't spend too much time waiting , For example, accept the verification code 、 Enter the password, etc .
HMS Core FIDO Application scenarios of
at present ,FIDO Technology has been developed by global equipment manufacturers 、 Widespread recognition of Internet service providers , Including some large banks and other financial institutions 、 Government network platform, etc , Mature application in high security scenarios involving capital changes , Such as : Shopping websites or App Purchase payment 、 Digital currency transfer 、 Mobile Banking ( Online Banking Service ) Large transactions in , wait . Take the use process for example ,App Check whether the device supports when the user logs in HMS Core FIDO, If the support ,App It can guide users to open fingerprints or 3D Face login , Users only need to verify their fingerprints or 3D Face can be .
HMS Core FIDO Is based on FIDO Standardize the open capabilities for developers at home and abroad , It can help Internet service providers to make the authentication process more secure 、 It's simpler , At the same time, it can also gain a better user experience .FIDO Its full name is Fast Identity Online standard , By FIDO The alliance has launched and continues to maintain a set of authentication framework protocols , It uses standard public key cryptography , Provide a more powerful authentication method .
Click to enter HMS Core FIDO Official website , obtain Development guidance document , Experience high-quality authentication capabilities .
Learn more >>
visit Official website of Huawei developer Alliance
obtain Development guidance document
Huawei mobile service open source warehouse address :GitHub、Gitee
Pay attention to our , The first time to understand HMS Core Latest technical information ~
边栏推荐
- ZCMU--1390: 队列问题(1)
- POJ 3176-Cow Bowling(DP||记忆化搜索)
- 分类TAB商品流多目标排序模型的演进
- Cron表达式(七子表达式)
- 紫光展锐全球首个5G R17 IoT NTN卫星物联网上星实测完成
- What does cross-border e-commerce mean? What do you mainly do? What are the business models?
- 我用开天平台做了一个城市防疫政策查询系统【开天aPaaS大作战】
- pytorch训练进程被中断了
- Question and answer 45: application of performance probe monitoring principle node JS probe
- POJ 3176 cow bowling (DP | memory search)
猜你喜欢

基于OpenHarmony的智能金属探测器

Characteristics and electrical parameters of DDR4

Detailed explanation of DDR4 hardware schematic design

Lombok 同时使⽤@Data和@Builder 的坑,你中招没?

Ddrx addressing principle

基础篇——REST风格开发

Advanced technology management - what is the physical, mental and mental strength of managers

COMSOL -- establishment of geometric model -- establishment of two-dimensional graphics

COMSOL--三维随便画--扫掠
![[Oracle] use DataGrid to connect to Oracle Database](/img/4f/886378667889f730eaed39b97f0a39.png)
[Oracle] use DataGrid to connect to Oracle Database
随机推荐
百问百答第45期:应用性能探针监测原理-node JS 探针
基础篇——基础项目解析
Zcmu--1390: queue problem (1)
NFT 交易市场主要使用 ETH 本位进行交易的局面是如何形成的?
SLAM 01. Modeling of human recognition Environment & path
Unity Xlua MonoProxy Mono代理类
Evolution of multi-objective sorting model for classified tab commodity flow
Solve the grpc connection problem. Dial succeeds with transientfailure
Project summary notes series wstax kt session2 code analysis
Differences between IPv6 and IPv4 three departments including the office of network information technology promote IPv6 scale deployment
[crawler] Charles unknown error
AutoCAD -- mask command, how to use CAD to locally enlarge drawings
Huawei equipment configures channel switching services without interruption
Leetcode 185 All employees with the top three highest wages in the Department (July 4, 2022)
871. Minimum Number of Refueling Stops
跨境电商是啥意思?主要是做什么的?业务模式有哪些?
[LeetCode] Wildcard Matching 外卡匹配
Stop saying that microservices can solve all problems!
汉诺塔问题思路的证明
go语言学习笔记-初识Go语言