|
Electronic authentication, also referred to as e-authentication is the process of establishing confidence in user identities electronically presented to an information system. In online environments, the username identifies the user, while the password authenticates that the user is whom he claims to be. There are various ways to increase layer of security to transaction through E-authentication, often known as MFA( multifactor authentication). It can be a token, captcha, or a challenge question. Users can only continue with their activities or/and access more information from database after verified through E-authentication. Usually, accounts which are complicated to register and have more restrictions on users are secured with more advanced e-authentication procedures. E-authentication also presents a technical challenge when this process involves the remote authentication of individual people over a network, for the purpose of electronic government and commerce. ==Overview== In the conceptual e-authentication model, a claimant in an authentication protocol is a subscriber to some Credential Service Provider (CSP). At some point, an applicant registers with a Registration Authority (RA), which verifies the identity of the applicant, typically through the presentation of paper credentials and by records in databases. This process is called identity proofing. The RA, in turn, vouches for the identity of the applicant (and possibly other verified attributes) to a CSP. The applicant then becomes a subscriber of the CSP. The CSP establishes a mechanism to uniquely identify each subscriber and the associated tokens and credentials issued to that subscriber. There is always a relationship between the RA and CSP. In the simplest and perhaps the most common case, the RA/CSP are separate functions of the same entity. However, an RA might be part of a company or organization that registers subscribers with an independent CSP, or several different CSPs. Therefore, a CSP may have an integral RA, or it may have relationships with multiple independent RAs, and an RA may have relationships with different CSPs as well. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「Electronic authentication」の詳細全文を読む スポンサード リンク
|