![]() ![]() The server then sends back an encrypted response that can only be decrypted by the device. Security token technology is based on the use of a device that generates a random number, encrypts it and sends it to a server with user authentication information. The device generates a new password every time it is used, so a security token can be used to log in to a computer or virtual private network by typing the password generated by the token into the prompt. This can include a smart card, a Universal Serial Bus key, a mobile device or a radio frequency identification card. A security token provides authentication for accessing a system through any device that generates a password.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |