• security token (authentication token)

    A security token (sometimes called an authentication token) is a small hardware device that the owner carries to authorize access to a network service.

    Margaret Rouse24,565 pointsBadges:
  • Google to release two-factor security token

    Google is planning a two-factor authentication token, the firm’s principal engineer has confirmed

    WAshford10,570 pointsBadges:
  • soft token

    A soft token is a software-based security token that generates a single-use login PIN. Traditionally, a security token has been a hardware device that produces a new, secure and individual PIN for each use and displays it on a built-in LCD display.

    Margaret Rouse24,565 pointsBadges:
  • possession factor

    The possession factor, in a security context, is a category of user authentication credentials based on items that the user has with them, typically a hardware device such as a security token or a mobile phone used in conjunction with a software token.

    Margaret Rouse24,565 pointsBadges:
  • multifactor token

    Multifactor tokens are security tokens that use more than one category of credential to confirm user authentication. The standard categories of authentication credentials are knowledge factors things that the user knows) inherence factors (things that the user is) and possession factors (things...

    Margaret Rouse24,565 pointsBadges:
  • single-factor token

    A single-factor token is a small hardware device that produces one confirming credential for user authentication; the devices may be used in conjunction with other types of credentials for multifactor authentication.

    Margaret Rouse24,565 pointsBadges:
  • Survey finds users re-evaluating two-factor authentication options

    In the wake of the RSA SecurID breach, a vendor survey finds a reduced level of confidence in the security provided by tokens.

    searchsecurity26,345 pointsBadges:
  • RSA responds to SecurID attack, plans security token replacement

    Following a retooling of its manufacturing and supply chain management processes, RSA plans to replace security tokens for high risk customers.

    searchsecurity26,345 pointsBadges:
  • Two-factor authentication and tokens

    An introduction to tokens including how they work, their pros and cons, and the best circumstances in which to use them.

    searchsecurity26,345 pointsBadges:
  • Security tokens, the OASIS approach to Web services security

    One approach to Web services security is to focus on authorization and authentication with the OASIS security standards and the security assertion markup language (SAML).

    James Denman1,680 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

Thanks! We'll email you when relevant content is added and updated.