No matter what authentication methods are applied, the main thing is to use them. So which one to choose? There is no simple answer: both software and hardware tokens have their advantages. When you use tokens, the OTP passwords are not sent over the GSM or the Internet, where they can theoretically be intercepted. The one-time passwords can be obtained in different ways, but you should understand that both software and hardware tokens are more reliable than SMS or e-mail delivery. To start working with your Protectimus Ultra token, you need to enter a PIN-code. It has a secret key generated during the activation process and unknown even for the manufacturer. It takes time into account as an extra authentication parameter. It works according to the “challenge-response” algorithm. Thus, the hardware OTP token Protectimus Ultra has the highest security level and is recommended to use on the most important areas of data interchange. You pay for high quality and reliability. There is no sense to dispute this fact, but it must be kept in mind that it is worth it.
0 Comments
Leave a Reply. |