Premium Content

Access "Examining device-based authentication"

Diana Kelley, Contributor Published: 03 Aug 2003

Driving the authentication down toward Layer 2 of the network invokes the question, "Can we authenticate the machine as well as the user?" Here's the idea: Using a unique footprint or ID from the machine itself provides a reliable way to control access, because it enables companies to lock out any unauthorized machine. Steal the machine but don't know the password? The machine gets cut off from network access. Steal the password but not the machine? Again, no access. So, when used together, passwords and machine IDs give companies strong security without the need deploying smart cards, tokens or other devices that users can misplace or break. As appealing as this solution is, the offerings in the market for it are still quite new. But with major players such as Microsoft, Intel, Hewlett-Packard and IBM involved, it may gain traction. These companies, with others, formed the Trusted Computing Group (TGC) in April to "develop and promote open industry standard specifications for trusted computing hardware building blocks and software interfaces across multiple... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
  • Columns
    • Examining device-based authentication by Diana Kelley, Contributor

      Combining device-based authentication technology with existing user-based authentication would be appealing for many organizations, but technical details remain unclear.

More Premium Content Accessible For Free