Any phone that receives SMS messages, which Paul's and practically every mobile in the world does, can be used as an authentication token
Features include an ability to plug the device into any standard USB port, a 32k memory and interoperability with other authentication tokens
and smart cards.
Digital content and transaction security solutions provider Rainbow eSecurity, part of US-based Rainbow Technologies, has received an order for its iKey authentication token
from the Health Insurance Commission (HIC) Australia.
TELECOMWORLDWIRE-29 February 2000-Algorithmic Research releases portable authentication token
(C)1994-2000 M2 COMMUNICATIONS LTD http://www.
A one-time password authentication token
in thin card form that can be kept in a wallet, the ICT DisplayCard is always at hand when needed - solving the common problem of misplaced fob-style tokens.
For the first time, users can logon with a combination of password, the Lenovo Fingerprint Reader or the RSA SecureID SID800 two-factor authentication token
, before the system has completed the boot process.
Today, once a maintenance worker has reviewed the Red Tags, they simply contact the clearance station by radio or phone, switch on CRYPTOCard's RB-1 authentication token
and enter their PIN (something only they know).
The SafeNet iKey authentication token
offers a compact hardware solution for authentication and digital identity management.
IC ID can be used to detect counterfeited or modified ICs, and it can be integrated into smart cards, credit cards and other authentication tokens
to improve their security.
The company said technology currently in pre-beta will allow users of SecurID two-factor authentication tokens
to replace the Windows login on their PCs with SecurID logins, further reducing the number of passwords to be remembered.