J. Fellman
Along with the automation of our electronic equipment life, security problems become a lot of important and necessary. There square measure queries asked in our existence like “is this the correct person to be allowed to access the system?”, “is this the licensed person to perform such action?”, and “does this person belong to the current country?” there have been 2 strategies for responsive this questions: 1st one supported “what you have” and referred to as (knowledge factors), like ID cards, and therefore the other supported “what you know” and referred to as (ownership factors), but each strategies will be borrowed or traced or purloined, therefore users have to be compelled to carry several IDs and study loads of passwords.
分享此文章