Page 276 - CISSO_Prep_ Guide
P. 276

2.  Challenge sent from server to client.
                   3.  A client enters the challenge on the token
                       device.
                   4.  Client reads response.
                   5.  Client enters response.
                   6.  Response sent to the server.
                   7.  The server verifies response with the user
                       profile database.
               •  Synchronous:
                       •  Careful timing is essential; else the login
                          will fail
                   1.  A user sends a one-time password (pin on
                       synchronous device + time = one time
                       password).
                   2.  Authentication server housing the user
                       profile database knows the symmetric key of
                       the device.  The server opens a one-time
                       password, and if the time is the same, there
                       is a match, and the user is authenticated.
               •  Smart cards:
                   •  Memory chips – storage devices that cannot
                       process information
                   •  Microprocessor chips – like having a
                       miniature computer on a card
            •  Biometric:
                   •  Much more efficient for authentication
                       (verification) than identification (assertion).
                   •  Physiological (e.g., fingerprint) or behavioral
                       (e.g., keystroke).
                   •  Accuracy:
   271   272   273   274   275   276   277   278   279   280   281