Study of Electronic Identity Authentication Model

Liqing Xu,Yongzhen Li
DOI: https://doi.org/10.1145/3641343.3641381
2024-01-01
Abstract:With the development of computer technology, cyberspace has become the focus of attention of all countries. However, cyber space is facing increasing security threats, and the leakage of online identity information is the most prominent one. Most of the major countries in the world have begun to formulate the rules and policies of network trusted identity management to protect the security of cyberspace by regulating each participant in the network. Therefore, it is particularly important to ensure its safe and stable operation. This paper briefly analyzes the current electronic identity authentication, puts forward the electronic identity authentication model to ensure the security of network identity, and puts forward some suggestions on the management of network electronic identity.
What problem does this paper attempt to address?