hard token

hard token

A physical authentication device such as a smart card. See authentication token. See also hard tag.
Mentioned in ?
References in periodicals archive ?
Account registration is not required; users can authenticate with a Common Access Card (CAC) or Public Key Infrastructure (PKI) hard token.
AT&T said it has also adopted several security steps that aim to strengthen the platform's readiness for government use; for example, users are allocated RSA hard token for multi-factor authentication.
All government agency customers and their authorized users are assigned RSA hard token for 2-Factor Authentication.
This research covers hard token, USB key, biometrics, and soft token/device-as-a-token solutions.
They also contain a number of security features including 2-factor authentication with an optional Hard Token in case of loss or theft and a Session Lock which prevents hackers taking control of the laptop and using the VPN tunnel to access the company's network.
Since all these users have their own laptops, we didn't require the mobility of a hard token.
Storage towers that are physically separated from other users towers in the data center; Separate logical cloud for Government data; government customer data will not co-exist with commercial data; A separate cloud portal partition for government agencies; All government agency customers and their authorized users are assigned RSA hard token for 2-Factor Authentication.
The revised rule (June 1, 2010) allows the use of a biometric as a substitute for a hard token or a password.
a world leader in securing digital identities and information, announces the launch of an industry-leading hard token replacement program.
We also liked the fact that the smart card solution required Jess interaction than a hard token.
For enhanced security, Technology Credit Union members will utilize the OBS M-Secure Browser for secure access to reports, data and single sign-on to other secure cash management applications without the need for a hard token.
FrieslandCampina's employees can select their own method of authentication -- soft or hard token, SMS, or voice response -- on the mobile device of their choice.