EasyManua.ls Logo

RFIDeas pcProx - One-Factor; Two-Factor; Security of the Card Data

Default Icon
56 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
40
© 1998-2005 RF IDeas, Inc.
One-Factor
In a one-factor system, the user simply waves
the proximity token. Therefore the reader may
be configured to add TAB keystrokes ahead of
the data as well as a TAB or ENTER keystroke
behind the data.
Two-Factor
In a one-factor system, the user may enter the
PIN either before or after the proximity token
data is inserted into the field. If the user adds the
PIN before the token data, the reader may be
configured to append the ENTER keystroke.
The two-factor approach is especially useful
when using a policy that insists on password
construction rules or periodic changing of
passwords
Security of the Card Data
If there is a concern about individuals being able
to read the contents of the proximity token, and
thereby reproduce the password, there are
some additional measures that can be taken.
During the configuration process you may add
additional keystroke characters to the card
information that are difficult to re-produce.
These additional characters are labeled
special1, special2, and special3.
As an example, here is a screen shot that
configures the reader to insert non-printable
keystroke characters at the beginning, in the
middle, and at the end of the card’s unique data.

Table of Contents