Electronic Authentication - Tokens

Tokens

Tokens generically are something the claimant possesses and controls that may be used to authenticate the claimant’s identity. In e-authentication, the claimant authenticates to a system or application over a network. Therefore, a token used for e-authentication is a secret and the token must be protected. The token may, for example, be a cryptographic key, that is protected by encrypting it under a password. An impostor must steal the encrypted key and learn the password to use the token. Authentication systems are often categorized by the number of factors that they incorporate. The three factors often considered as the cornerstone of authentication are: • Something you know (for example, a password) • Something you have (for example, an ID badge or a cryptographic key) • Something you are (for example, a voice print or other biometric)

Read more about this topic:  Electronic Authentication

Famous quotes containing the word tokens:

    It is the part of men to fear and tremble
    When the most mighty gods by tokens send
    Such dreadful heralds to astonish us.
    William Shakespeare (1564–1616)