First page Back Continue Last page Overview Graphics
Cryptographic Authentication
No password or secret is transferred over the network
Users prove their identity to a service by performing a cryptographic operation,usually on a quantity supplied by the server
Crypto operation based on user’s secret key