In general, there are two types of authentication techniques-hardware based authentication and non hardware based authentication. Hardware based authentication employ USB token devices. USB tokens are designed to store an individual’s digital identity in a most secure way. If you remove USB token, other users cannot access your session of work. It is not possible to duplicate USB tokens. A PIN number is associated with the token which gives a security against any sort of theft of the token. The main disadvantage with the USB token is that of a particular software requirement, so that tokens may not be compatible across platforms. Smart card is another type of storage system which is very much advantageous for personal data storage but requires a hardware reader and related software drivers.
No comments:
Post a Comment