COMMENT 2 Identity Authentication Opening a New Land for Information Security