HP ProtectTools: Authentication technologies and suitability to task
HP ProtectTools:
Authentication technologies and suitability to task
Introduction......................................................................................................................................... 2
Authentication technologies in HP ProtectTools ........................................................................................ 2
Password authentication ....................................................................................................................... 3
TPM embedded security chip authentication............................................................................................ 4
Smart card authentication ..................................................................................................................... 4
USB token authentication ...................................................................................................................... 5
Biometric fingerprint authentication ........................................................................................................ 6
Virtual token authentication................................................................................................................... 7
Feature Comparison and suitability to task.............................................................................................. 7
Suitability to Task................................................................................................................................. 8
Conclusion.......................................................................................................................................... 9
For more information............................................................................................................................ 9