What is an ID? ID Password

How is the necessary data recognized? You downloaded the game, and it provided exactly your data. Or they went back to the site and he recognized you. What is the mechanism for implementing such a skill in technology to recognize who is who among people? Recognition is possible thanks to identifiers. But what is an ID?

what is id

The issue of identifying the user or objects in programming and systems engineering

Under the identifier is understood a unique feature that will allow you to highlight the desired object among many others:

  1. A unique attribute of an object or subject of access.
  2. A unique name for an electrical signal transmitted within a device or its functional circuit.
  3. The lexical token that defines the entity. An analogy can be drawn with a unique name. There is for the possibility of links to it in the system itself.

General theoretical base ID

In general, identifiers have few requirements. One thing in common is the uniqueness and the ability to search for a specific object on it. Also, depending on the implementation environment, requirements for the content of the identifier may be put forward: only numbers or Latin letters, or something like that. Also almost everywhere it is impossible to use the words reserved by the system as identifiers. Here is what ID is. On this, a brief theoretical course can be considered completed.

Using ID to protect

What is a data protection ID? Suppose there is a situation when the local network is spread. Third-party computers should not be connected to it, as this may mean information leakage. How to ensure network security? Each computer has its own unique number, which by default is known only to him. The local network operation protocol is configured, according to which computers from a certain list can connect to it. Then you should enter the numbers of all computers in this list - and protection based on the identifier is ready. Such an ID-code perfectly copes with the responsibilities of the password within the network.

id items in minecraft

Keep in mind that such use still has certain disadvantages, such as the ability to gain access to one of the computers and send requests from it to the local network. But this aspect is not limited to the possibility of application. So, using the identifier, you can configure the access level from various machines (which, by default, will have a different level of protection). Then new employees or those who do not have the appropriate access level will not be able to send out teams and by mistake or willfully harm the company. That is, a scheme will be implemented in which an ID password is used, but a limited number of people (computers) will “know it”.

Using IDs in applications

Are identifiers used in application programs, like assistant accountants or games? Yes, and how! If we consider the example of the game, then there are separate identifiers for each computer user, separate for each stored thing that is in the backpack and bag. Items that are used in games also have their identifier (albeit a temporary one). Their presence allows you to bind lines of program code to certain pictures with which the player can interact with the keyboard or mouse.

iframe id

In work programs, each field has its own identifiers in which information is entered for subsequent processing. Thanks to the identifier, it can then be retrieved from the database and used for its intended purpose. Also, with their help it can be established which of them has access to users with a certain level of access.

Using ID for recognition in online services

Do they apply here, and if so, what is an ID in network technology? Identifiers have found their use in online services. Let's look at the simplest example - social networks. How do their users differ? Thanks to the unique identifier, which is contained even in the address of the page of any user. Using the identifier, the system determines which correspondence should be displayed and with which people, which photos and videos should be displayed in the user's personal page. But even this is not the only restriction: for example, when entering from each new address to a specific identifier page, the system asks for a password to check whether this is the owner of the profile or not. Even applications within social networks use iframe IDs for convenient user work with the application based on their profile data.

id code

Their identifiers are used in any site where user creation is provided. The technology of identifiers is used in games that require access to the global network. But is it constantly necessary? Suppose you play somewhere in the game, will the computer send data all the time? No, this is not necessary - after going through the identification process with this computer, a data exchange stream opens, and the service knows that you are on the other side. And things like item IDs in Minecraft or another game are transmitted just when the user is identified, and when you close the client and open it again, they will come again.

But this entails the need to follow certain safety precautions. So, the data exchange flow may close itself after a certain time (usually several hours), or it may not be closed at all (if this is not provided). So if you do not want someone else who has access to the computer to access the profile on the site, it will not be amiss to secure yourself by clicking on the exit button every time you leave.

id password

Conclusion

This is what an identifier provides, and so broad are the aspects of its application. But even in general terms, everything was not covered - so, it was worthwhile to talk more about identifiers in microelectronics, types of identifiers in various systems (having considered the most common ones) and a number of other things in which they are used. Now you can use this knowledge to create additional security in your home network of computers or to understand the complexity of network services.

Source: https://habr.com/ru/post/K7412/


All Articles