enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Smart card - Wikipedia

    en.wikipedia.org/wiki/Smart_card

    Smart cards can provide personal identification, authentication, data storage, and application processing. [2] Applications include identification, financial, public transit, computer security, schools, and healthcare. Smart cards may provide strong security authentication for single sign-on (SSO) within organizations.

  3. Secure access module - Wikipedia

    en.wikipedia.org/wiki/Secure_access_module

    A Secure Access Module (SAM), also known as a Secure Application Module, is a piece of cryptographic hardware typically used by smart card card readers to perform mutual key authentication. [1] [2] [3] SAMs can be used to manage access in a variety of contexts, such as public transport fare collection and point of sale devices.

  4. Security token - Wikipedia

    en.wikipedia.org/wiki/Security_token

    However, computational performance of smart cards is often rather limited because of extreme low power consumption and ultra-thin form-factor requirements. Smart-card-based USB tokens which contain a smart card chip inside provide the functionality of both USB tokens and smart cards.

  5. Single sign-on - Wikipedia

    en.wikipedia.org/wiki/Single_sign-on

    Initial sign-on prompts the user for the smart card. Additional software applications also use the smart card, without prompting the user to re-enter credentials. Smart-card-based single sign-on can either use certificates or passwords stored on the smart card.

  6. Smart card management system - Wikipedia

    en.wikipedia.org/wiki/Smart_card_management_system

    During the smart card lifecycle, the smart card is changing state (examples of such states include issued, blocked and revoked), the process of taking a smart card from one state to another, is the main responsibility of a smart card management system. Different smart card management systems call these processes by different names.

  7. Public key infrastructure - Wikipedia

    en.wikipedia.org/wiki/Public_key_infrastructure

    Encryption and/or authentication of documents (e.g., the XML Signature or XML Encryption standards if documents are encoded as XML); Authentication of users to applications (e.g., smart card logon, client authentication with SSL/TLS). There's experimental usage for digitally signed HTTP authentication in the Enigform and mod_openpgp projects;

  8. Common Access Card - Wikipedia

    en.wikipedia.org/wiki/Common_Access_Card

    The Geneva Conventions Identification Card is the most common CAC and is given to active duty/reserve armed forces and uniformed service members. The Geneva Convention Accompany Forces Card is issued to emergency-essential civilian personnel. The ID and Privilege Common Access Card is for civilians residing on military installations.

  9. Electronic identification - Wikipedia

    en.wikipedia.org/wiki/Electronic_identification

    One form of eID is an electronic identification card (eIC), which is a physical identity card that can be used for online and offline personal identification or authentication. The eIC is a smart card in ID-1 format of a regular bank card , with identity information printed on the surface (such as personal details and a photograph) and in an ...