ISO/IEC 9798-2, FIPS 196 and Microsoft Card Minidriver strong challenge-response authentication
is provided, as well as Global Platform v2.
0 sets a new standard for perimeter security by integrating IPsec interoperable encryption, challenge-response authentication
, and content filtering, all from a new drag-and-drop user interface.
Combined authentication features offered in the A-Key provide multi-functional usage for One-Time Password, PKI or Challenge-Response authentication
reseller of enhanced challenge-response authentication
systems from ActivCard Networks Inc.
2 -- Standards-based RADIUS and TACACS+ Authentication, Authorization, and Accounting using diverse two-factor device options including tokens, soft tokens, USB keys, and smart cards -- Supports synchronous and challenge-response authentication
with patented three-variable algorithm, providing security and lowering or eliminating re-synchs -- Faster performance as well as distributed authentication servers scale to hundreds of thousands of users -- ActivCard Single Sign-On Server v5.
Powerburst is also 100% compatible with all security systems, including traditional login/password schemes, token-based and challenge-response authentication
systems, and dial-back systems.
eToken's Web access control Active-X allows developers to add strong 120-bit DESX challenge-response authentication
Protecting geographically dispersed host computers, mainframes, mini-computers and LANs, SNKs employ the non-proprietary, Data Encryption Standard (DES) algorithm to ensure unique user authentication through a two-factor, challenge-response authentication
Hybrid mode extends IPSec IKE, the emerging standard for VPN communications, to utilize challenge-response authentication
systems, including widely deployed systems like RADIUS, TACACS+ and SecurID.
of Mountain View, CA, today announced a partnership to integrate Secure Computing firewalls and DPI(TM) two-factor, challenge-response authentication
systems into one access security solution for enterprise-wide networks.
system also employs a challenge-response authentication
The authentication protocol which we propose in this section is based on a challenge-response authentication
protocol like CRAMMD5  which uses a cryptographic hash function.