Specially adapted hardware may include a cryptographic token embedded in the device itself or the operating system, or other, pre-configured hardware that may store cryptographic tokens on the device or on the computer. The user’s device is equipped with a cryptographic token that is used as a single-factor identifier when the device connects to the computer to provide access to the computing system. The cryptographic token is stored in an encrypted form in a hardware storage device, or a secure and cryptographically secure data storage system.

The system maintains a database that includes device credentials, cryptographic tokens, and secure storage media to which the cryptographic tokens are stored and, through associated functions, can provide data access to the device. The cryptographic token and the secured storage media are bound to a user’s computing system (e.g., the user’s device), either by an end-user agreement or an enforceable contract that the user has with the system.

When the user attempts to access the system, the authentication system verifies that the cryptographic token is unique, has the correct digital signature, and that the cryptographic token matches the user’s specified account credentials. If the verification fails, the user must authenticate to the user’s computing system. Upon successful authentication, the authentication system provides access to the user’s account, as well as to their relevant data. This allows the user to perform business or operational activities on the system without providing sensitive information to the computing system.

If the authentication process is unsuccessful, the authentication system blocks the user’s device until the authentication process is completed (you could check here to get all the details).

The authentication system uses the single-factor authentication algorithm in this scheme. If the authentication process does not identify a matching cryptographic token, or if there is a mismatch, the authentication process fails. If the authentication process is successful, access is granted.

Specially adapted hardware may include cryptographic tokens embedded in the user’s device, hardware that stores cryptographic tokens on the user’s device, or a pre-configured hardware that maintains cryptographic tokens on the user’s device.

If the user’s device provides a cryptographic token that is not unique, the authentication system does not require the user’s consent to complete the authentication process. However, the user must have the cryptographic token for the successful authentication. You may lose data if you network is compromised. Fortunately, internet providers like EATEL can help you secure your network.

If the user’s device provides a cryptographic token that is unique, the authentication system requires the user’s consent to complete the authentication process. If the user is not using a software application, the user’s consent must be provided via the user’s device settings or at least on a managed computer (that is, one that has full root access). The user must have an enforceable contract that specifies that their consent is required to obtain access to their account.

The user may be presented with a pre-configured option to accept or decline the single factor authentication feature.

About Rahul Banker

Rahul Banker is a blogger from Baroda, Gujarat, India who loves technology and gadgets. A great supporter for open source and communities. He's also the head of Google Developers' Group, Baroda and he's been an active member of WordPress community in India. You can know more about him on FacebookTwitter or from his Technology Blog
This entry was posted in News. Bookmark the permalink.

Comments are closed.