Authentication Tokens

Authentication Tokens

Picture
Authentication Token provide computing and business systems the enormous benefit of portable and secure storage of data and value. Authentication Token containing an embedded microchip that can be programmed to store specific user authentication information. The chip on Authentication Token can store multiple identification factors of a specific user (i.e. password and fingerprint).
Authentication Token have become common place in high-security networking environments because:
  1. They offer an added layer of security. Intruders cannot just guess a userís password and gain access to the network; they must also possess the physical cards.
  2. They are tamper-resistant. Because they are self-contained and donít depend on external resources, it is more difficult for a hacker to compromise their security.
  3. They are flexible. In many cases, the PIN can be changed (by an authorized user) for added security.
  4. They are relatively inexpensive when compared to other high-security authentication methods such as biometric devices (fingerprint readers, retina scanners, and iris scanners, etc.)