© 1998-2006 RF IDeas, Inc.
One-Factor
In a one-factor system, the user simply waves the
proximity token. Therefore the reader may be configured
to add TAB keystrokes ahead of the data as well as a
TAB or ENTER keystroke behind the data.
Two-Factor
In a one-factor system, the user may enter the PIN either
before or after the proximity token data is inserted into the
field. If the user adds the PIN before the token data, the
reader may be configured to append the ENTER
keystroke.
The two-factor approach is especially useful when using a
policy that insists on password construction rules or
periodic changing of passwords
Security of the Card Data
If there is a concern about individuals being able to read
the contents of the proximity token, and thereby
reproduce the password, there are some additional
measures that can be taken.
During the configuration process you may add additional
keystroke characters to the card information that are
difficult to re-produce. These additional characters are
labeled special1, special2, and special3.
As an example, here is a screen shot that configures the
reader to insert non-printable keystroke characters at the
beginning, in the middle, and at the end of the card’s
unique data.