Get started

Bring yourself up to speed with our introductory content.

Security Token and Smart Card Technology

  • soft token

    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.Continue Reading

  • possession factor

    The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software ...Continue Reading

  • one-time password token (OTP token)

    A one-time password token (OTP token) is a security device or software program that produces new single-use passwords or passcodes at preset time intervals. One-time password tokens were originally hardware devices (such as key fobs, for example) ...Continue Reading

  • Is FIDO authentication the future of online authentication products?

    Can FIDO Alliance standards bring biometrics to the masses? See 11 of the products that may represent the future of online authentication products.Continue Reading

  • one-time password (OTP)

    A one-time password (OTP) is an automatically generated numeric or alphanumeric string of characters that will authenticate the user for a single transaction or session.Continue Reading

  • tokenization

    Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.Continue Reading

  • national identity card

    A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity. Since the World Trade Center tragedy of ...Continue Reading

  • Understanding tokenization amid PCI encryption requirements

    This mini learning guide offers a brief introduction to tokenization technology, as well as PCI DSS encryption requirements. Learn more about the future of tokenization and how the technology may help to ease PCI DSS compliance burdens.Continue Reading

  • authentication server

    An authentication server is an application that facilitates authentication of an entity that attempts to access a network...(Continued)Continue Reading

  • key string

    A key string is the authentication code included in each key in a key chain, which is a series of keys that can be created to help ensure secure communication between routers in a network.Continue Reading

  • key chain

    A key chain is a series of keys that can be created to help ensure secure communication between routers in a network. Authentication occurs whenever neighboring routers exchange information. Plain text authentication sends a plain text key with each...Continue Reading

  • Chameleon Card

    The Chameleon Card is a programmable card in development at Chameleon Network that can represent each of the owner's credit, debit, and customer cards as required, making it unnecessary to carry all of the aforementioned.Continue Reading

  • two-factor authentication (2FA)

    Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.Continue Reading

  • key fob

    A key fob is a type of security token: a small hardware device with built-in authentication mechanisms.Continue Reading

  • security token (authentication token)

    A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close