November 30, 2017

Become a member to view the rest of the video:

Hard Token Implementation

Look Up Secret Token

  • Consists of a claimant and a verifier 

  • Uses grid-cards which consists of rows and columns

  • Both the claimant and the verifier have the same grid-card

  • How it works: 

    • Claimant wants to access a remot...

Please reload

© 2013 Study Notes and Theory
Terms and Conditions/Privacy Policy

Proudly created to make you

a better security professional.