Information Security 14 min read

Design Principles and Security Considerations for User Account Systems

This article shares practical insights on building robust user account systems, covering the shift from usernames to phone numbers as unique identifiers, the drawbacks of passwords, the limited value of periodic password changes, the pitfalls of security questions, and best practices for token management, SMS/voice verification, captcha usage, and multi‑layered future security strategies.

Hujiang Technology
Hujiang Technology
Hujiang Technology
Design Principles and Security Considerations for User Account Systems

Almost every website or app has its own user account system. For product managers and developers new to account systems, it is crucial to understand that account design goes far beyond simple login, registration, and password recovery functions.

Historically, many systems have used usernames as the unique identifier, but modern trends favor phone numbers because they are easy to obtain, memorable, and comply with real‑name regulations. Nicknames can replace usernames for display purposes, allowing duplicates and simplifying user experience.

The article argues that passwords may no longer be necessary, especially on mobile devices where the phone itself serves as a private token. Using phone numbers combined with SMS verification can replace password‑based login, and storing passwords adds unnecessary complexity and security risk.

Periodic password changes are examined critically; while they can mitigate damage from large data breaches, they often degrade user experience and provide limited security benefits. The cost‑benefit balance should be evaluated for each product.

Security questions are deemed ineffective due to low usage rates and high maintenance costs, with studies showing that answers are easily guessed or guessed by attackers, making SMS or email verification preferable.

SMS verification is not foolproof; delivery rates are around 95%, so a backup channel such as voice verification is recommended. Alternative authentication methods like app‑based authenticators (e.g., Google Authenticator) offer higher security.

Image captchas should not be overused, especially for registration, as automated solving services can bypass them. In high‑risk scenarios, stronger verification methods like SMS or voice codes are more appropriate.

Token expiration is questioned; automatic token expiry does not significantly improve security and adds complexity for developers and users. Instead, tokens should be revoked on logout by notifying the server, preventing reuse of stale tokens.

Looking forward, account security will become multi‑layered and personalized, adapting authentication strength to the sensitivity of the protected resource, and incorporating emerging biometric methods.

user experienceSecurityAuthenticationaccount designToken ManagementpasswordlessSMS verification
Hujiang Technology
Written by

Hujiang Technology

We focus on the real-world challenges developers face, delivering authentic, practical content and a direct platform for technical networking among developers.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.