If you had a fingerprint solution, you needed a fingerprint solution running on your server as well as a fingerprint client – and the same with a smart card and an RSA token. This was specific to that authentication and couldn't be transferred to anything else. It sounds simple, but there were plenty of problems.įor every authentication, you had to implement some sort of software solution for that particular hardware. The client software would send a signal back to the server, which would say, for example: ‘OK, this is a successful authentication by Thorsten'. You’d use an authentication method – be it a password, RSA token, smart card or fingerprint – which would authenticate against this client software. You’d need a client or a piece of software running on your device. ![]() ![]() Other technologies, such as biometrics and smart cards, are more secure but they too have their weaknesses.īefore FIDO, authentication was a mess. And hackers are more active than ever, as evidenced by the recent LinkedIn and Twitter hacks. Lots of people still use the same ones across multiple devices and platforms, meaning that if a hacker compromises one account, they can compromise them all.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |