challenge-response

(redirected from Challenge-response authentication)
Also found in: Wikipedia.

challenge-response

[′chal·ənj ri′späns]
(computer science)
A method of identifying and authenticating persons seeking access to a computing system; each user is issued a device resembling a pocket calculator and is given a different problem to solve (the challenge), to which the calculator provides part of the answer, each time the person seeks authentication.
References in periodicals archive ?
ISO/IEC 9798-2, FIPS 196 and Microsoft Card Minidriver strong challenge-response authentication is provided, as well as Global Platform v2.
0 sets a new standard for perimeter security by integrating IPsec interoperable encryption, challenge-response authentication, and content filtering, all from a new drag-and-drop user interface.
reseller of enhanced challenge-response authentication systems from ActivCard Networks Inc.
2 -- Standards-based RADIUS and TACACS+ Authentication, Authorization, and Accounting using diverse two-factor device options including tokens, soft tokens, USB keys, and smart cards -- Supports synchronous and challenge-response authentication with patented three-variable algorithm, providing security and lowering or eliminating re-synchs -- Faster performance as well as distributed authentication servers scale to hundreds of thousands of users -- ActivCard Single Sign-On Server v5.
Powerburst is also 100% compatible with all security systems, including traditional login/password schemes, token-based and challenge-response authentication systems, and dial-back systems.
eToken's Web access control Active-X allows developers to add strong 120-bit DESX challenge-response authentication to applications.
Protecting geographically dispersed host computers, mainframes, mini-computers and LANs, SNKs employ the non-proprietary, Data Encryption Standard (DES) algorithm to ensure unique user authentication through a two-factor, challenge-response authentication process.
Hybrid mode extends IPSec IKE, the emerging standard for VPN communications, to utilize challenge-response authentication systems, including widely deployed systems like RADIUS, TACACS+ and SecurID.
of Mountain View, CA, today announced a partnership to integrate Secure Computing firewalls and DPI(TM) two-factor, challenge-response authentication systems into one access security solution for enterprise-wide networks.
system also employs a challenge-response authentication feature that
The authentication protocol which we propose in this section is based on a challenge-response authentication protocol like CRAMMD5 [2] which uses a cryptographic hash function.