Page 137 - CISSO_Prep_ Guide
P. 137
Time-based Synchronous Tokens
Time-based tokens generate a new random value every few
moments. The user is required to provide the current value on
the token to the authentication server. If the input value is
incorrect, then access will be denied.
RFID
The use of RFID is increasing as more organizations realize the
benefits of using small embedded chips for identification and
authentication. It is simple to track movements of materials,
employees, vehicles, and stock using small chips that respond to
a query from an RFID reader. These chips are buried
(embedded) into shipping containers, product labels, animals,
and ID cards. The use of RFID can make tracking and inventory
management easier and can be used to identify genuine versus
fake products.
Asynchronous Tokens
Asynchronous tokens operate on a challenge-response scheme.
When a user attempts to log in, the authentication server will
send a challenge. The challenge is a random value, and the user
must then input the challenge into the token and respond to the
authentication server. In some cases, the challenge value sent by
the AS is called a nonce - which stands for 'number used once.'
Characteristic - Biometrics
Biometrics is undoubtedly the most controversial form of
authentication. Biometrics can be intrusive and may disclose