Soft token
From
whatis.techtarget.com
A soft token is
a software-based security token that generates a single-use login PIN.
Traditionally,
a security token has been a hardware device that produces a new, secure and
individual PIN for each use and displays it on a built-in LCD display. The
system may activate after the user presses a button or enters an initial PIN.
Security tokens are generally used in environments with higher security
requirements as part of a multifactor authentication system. While the
hardware-based systems are more secure, they are also costly and difficult to
deploy on a large scale, as is required for online banking, for example.
Soft tokens are an attempt to replicate the security advantages of multifactor authentication, while simplifying distribution and lowering costs. A smartphone soft token app performs the same task as a hardware-based security token. Like a hardware token, a smartphone provides an easy-to-protect and easy-to-remember location for secure login information: on the device itself. Unlike a hardware token, smartphones are connected devices, which make them inherently less secure. The extent of their security largely depends on the device’s operating system and client software.
Soft tokens are an attempt to replicate the security advantages of multifactor authentication, while simplifying distribution and lowering costs. A smartphone soft token app performs the same task as a hardware-based security token. Like a hardware token, a smartphone provides an easy-to-protect and easy-to-remember location for secure login information: on the device itself. Unlike a hardware token, smartphones are connected devices, which make them inherently less secure. The extent of their security largely depends on the device’s operating system and client software.
===============================
In
addition to this blog, I have authored the premiere book on
Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance
and Add Power to Your Email". You can view my profile, reviews of the
book and content excerpts at:
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and PSG of Mercer County New Jersey.
==========================================
www.amazon.com/author/paulbabicki
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and PSG of Mercer County New Jersey.
==========================================
No comments:
Post a Comment