翻訳と辞書
Words near each other
・ Security Storage and Safe Deposit Company Warehouse
・ Security Strategy
・ Security studies
・ Security Studies (journal)
・ Security Studies Group (UIUC)
・ Security Support Provider Interface
・ Security Target
・ Security Task Manager
・ Security Technical Implementation Guide
・ Security tent
・ Security testing
・ Security theater
・ Security thread
・ Security through obscurity
・ Security Through Regularized Immigration and a Vibrant Economy Act of 2007
Security token
・ Security token service
・ Security Treaty Between the United States and Japan
・ Security Trust and Savings
・ Security Trust Company of Rochester
・ Security type system
・ Security Unlimited
・ Security vetting in the United Kingdom
・ Security Vision
・ Security, Territory, Population
・ Security-Enhanced Linux
・ Security-evaluated operating system
・ Security-focused operating system
・ Security-Widefield, Colorado
・ SecurityFocus


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Security token : ウィキペディア英語版
Security token

A security token (or sometimes a ''hardware token'', ''authentication token'', ''USB token'', ''cryptographic token'', ''software token'', ''virtual token'', or ''key fob'') may be a physical device that an authorized user of computer services is given to ease authentication. The term may also refer to software tokens.
Security tokens are used to prove one's identity electronically (as in the case of a customer trying to access their bank account). The token is used in addition to or in place of a password to prove that the customer is who they claim to be. The token acts like an electronic key to access something.
Some may store cryptographic keys, such as a digital signature, or biometric data, such as fingerprint minutiae. Some designs feature tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Special designs include a USB connector, RFID functions or Bluetooth wireless interface to enable transfer of a generated key number sequence to a client system.
== Password types ==

All tokens contain some secret information that are used to prove identity. There are four different ways in which this information can be used:
# Static password token. The device contains a password which is physically hidden (not visible to the possessor), but which is transmitted for each authentication. This type is vulnerable to replay attacks.
# Synchronous dynamic password token. A timer is used to rotate through various combinations produced by a cryptographic algorithm. The token and the authentication server must have synchronized clocks.
# Asynchronous password token. A one-time password is generated without the use of a clock, either from a one-time pad or cryptographic algorithm.
# Challenge response token. Using public key cryptography, it is possible to prove possession of a private key without revealing that key. The authentication server encrypts a challenge (typically a random number, or at least data with some random parts) with a public key; the device proves it possesses a copy of the matching private key by providing the decrypted challenge.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Security token」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.