Information technologies are becoming more diverse and
pervasive, but your personal data is under risk. Today everyone is talking
about a fact, that such aspect of informational security as user authentication
needs a reliable security facilities. That is why the method of two-factor authentication
became very popular, so it means that the recognition of user is not by one parameter
(a personal password, smart card,
fingerprint, etc.) but using some of them ( two) provided at the same time when
you are logging in or when you request an
access to a certain service. In this article we will focus on the material
which was presented at the conference Fujitsu World Tour 2014, in which the
method of two-factor authentication based on contactless RFID-cards and palm
vein pattern scanner Fujitsu Palm Secure and also about Palm Secure technology.
Showing posts with label informational security. Show all posts
Showing posts with label informational security. Show all posts
Tuesday, 30 September 2014
Tuesday, 23 September 2014
Subscribe to:
Posts (Atom)