HP ProtectTools: Authentication technologies and suitability to task

HP ProtectTools:
Authentication technologies and suitability to task
Introduction......................................................................................................................................... 2
Authentication technologies in HP ProtectTools ........................................................................................ 2
Password authentication ....................................................................................................................... 3
TPM embedded security chip authentication............................................................................................ 4
Smart card authentication ..................................................................................................................... 4
USB token authentication ...................................................................................................................... 5
Biometric fingerprint authentication ........................................................................................................ 6
Virtual token authentication................................................................................................................... 7
Feature Comparison and suitability to task.............................................................................................. 7
Suitability to Task................................................................................................................................. 8
Conclusion.......................................................................................................................................... 9
For more information............................................................................................................................ 9

Summary of content (9 pages)