Defense in depth can also be used to solve the problem of protecting cryptographicauthentication information (usually called a key) from people who break into your machine.
深度防御也可以用于解决保护密码认证信息(通常称为密钥)以防止别人入侵您的机器的问题。
2
Finally, there is strong authentication in which an identity is verified using two or more methods, such as a password and a cryptographickey.
最后是强身份验证,其中使用两种或者更多的方法对一个标识进行验证,如密码和加密密钥。
3
Every time cryptographicauthentication is to be used, a password must be given in order to decode the key.