How to Authentication Token Internet Banking

The use of tokens in the form of a small tool to secure the kind of calculator internet banking transactions has now become mandatory. This token is an additional factor in the authentication is to prove that you are truly legitimate users. Maybe there are wondering how to work as a token used Internet banking site? How small tools such as calculators that can produce numbers that are also known by the internet banking server when the device is not connect with the server. In this article I will explain the workings of internet banking token, and in the next article I will create a token-based software and a simple website that will simulate internet banking.

Authentication Method

Authentication aims to prove who you really, if you really who you claim as he (WHO you claim to be). There are many ways to prove who you are. Authentication method can be viewed in three categories of methods:

1. Something You Know
This is the most common authentication method. This method relies on the confidentiality of information, for example, is the password and PIN. This method assumes that no one who knows the secret unless you are an.

2. Something You Have
This usually is an additional factor to create a more secure authentication. This method relies on goods that are unique examples is the magnetic card / smartcard, hardware token, USB token, and so forth. This method assumes that no one who has the goods unless you are one.

3. Something You Are
This is the best method rare diapakai because of technological and human factors as well. This method relies on the uniqueness of your body parts which can not exist in others such as fingerprint, voice or retina prints. This method assumes that part of your body such as fingerprints and retinal prints, maybe not the same as anyone else.

And what about the traditional authentication methods such as the above signature stamp? Where do I get into that category of the three methods above? I do not think there is a match, so I add one more that is "Something You Can". This method assumes that no one else in this world who can do it besides you. Indeed authentication with signatures is built on the assumption that no one can write your signature unless you. Although in reality there are only people who can imitate your signature very well, but although aware of these facts on paper signatures are recognized as an authentic proof of who you are.


Copyright @ Dewapelangi. Best Cell Phones | Best Cell Phones | Cool Gadgets | Fx Trading | Printer