The system separates identity keys from encrypted passwords and applies controlled IP regions and safe behavior models.