ComputersProgramming

What is ID? ID-password

How is the recognition of the necessary data? You downloaded the game, and it provided exactly your data. Or you came back to the site, and he recognized you. What is the mechanism for realizing this skill in technology to recognize who is who among people? Recognition is possible thanks to the identifiers. But what is an ID?

The issue of user or object identification in programming and system engineering

An identifier is understood as a unique feature that will allow you to select the desired object among many others:

  1. Unique feature of the object or subject of access.
  2. A unique name for an electrical signal transmitted inside the device or its functional circuitry.
  3. A lexical token that defines an entity. Analogy can be done with a unique name. There is a way to refer to it in the system itself.

General-theoretical base ID

In general, there are few requirements for identifiers. One common thing is the uniqueness and the ability to search for a specific object on it. Also, depending on the implementation environment, there may be requirements for the content of the identifier: only numbers or a set of Latin characters, or something like that. Also almost everywhere you can not use words reserved by the system as identifiers. That 's what ID is. On this short theoretical course can be considered completed.

Using ID to protect

What is an ID for data protection? Let's say there is a situation when the local network is spread out. It should not be connected to third-party computers, as this could mean information leakage. How to ensure security on the network? Each computer has its own unique number, which by default is known only to him. Configures the protocol of the local network, according to which computers from a certain list can connect to it. Then you should list all computers on this list - and ID-based protection is ready. Such an ID-code perfectly copes with the password duties inside the network.

It should be borne in mind that such use still has certain disadvantages like the ability to gain access to one of the computers and send requests from it to the local network. But such an aspect is not limited to the possibility of application. So, using the identifier, you can configure the access level from different machines (which will have a different level of protection behind the default). Then new employees or those who do not have the appropriate level of access will not be able to send out commands and mistakenly or intentionally harm companies. That is, a scheme will be implemented in which an ID-password is used, but there will be a "limited number of people (computers)" knowing it. "

Using ID in applications

And are identifiers used in application programs, such as assistant accountants or games? Yes, and more like that! If we consider the example with the game, then there are separate identifiers for each user of the computer, separate for each stored item that is in the backpack and bag. Its identifier (even if it is temporary) is also found in items that are used in games. Their presence allows you to tie the lines of the program code to certain pictures with which the player can interact with the keyboard or mouse.

In work programs, each field has its own identifiers, into which information is entered for further processing. Thanks to the identifier, it can then be extracted from the database and used for its intended purpose. Also, with their help, it can be established which of them has access to users with a certain access level.

Use ID for recognition in online services

Are they used here, and if so, what is an ID in network technologies? Identifiers found their use in online services. Let's look at the simplest example - social networks. How do they differentiate users? Thanks to the unique identifier that is contained even in the address of the page of any user. Using the identifier, the system determines which correspondence should be displayed and with which people, what photos and videos should be displayed in the user's personal page. But even this is not the only restriction: so, when entering from each new address to a certain page-identifier, the system asks to enter a password to check whether the owner is a profile or not. Even applications within social networks use an iframe ID for convenient user interaction with the application based on its profile data.

Use their identifiers in any site where users are created. The technology of identifiers in games for which access to the world network is needed is used. But is it always necessary? Suppose you are playing somewhere in the game, will the computer always send data? No, this is not necessary - after passing through the identification process, the data exchange with the computer opens, and the service knows that you are on the other side. And things like the ID of items in Minecraft or another game are transmitted just when the user is identified, and when the client closes and opens it again they will come again.

But this entails the need to observe a certain safety technique. So, the data exchange flow can close itself after a certain time (usually several hours), and may not be closed at all (if it is not provided). So if you do not want someone else to access the profile on the site, who has access to the computer, it will not be superfluous to protect yourself by clicking on the exit button every time you leave.

Conclusion

That's what the identifier provides, and so are the aspects of its application. But even in general terms everything was not covered - so, it was worthwhile to tell more about the identifiers in microelectronics, the types of identifiers in different systems (having considered the most common ones) and a number of other things within which they are used. Now you can use this knowledge to create additional security in your home computer network or to understand the complexity of network services.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.atomiyme.com. Theme powered by WordPress.