





Authenticating a person often consist of verifying their identity. A person needs to be authenticated before a person is authorized to enter into a system.
One familiar use of authentication is access control. Common examples of access control involving authentication include:
Human authentication factors are generally classified into three cases:
Strong authentication is defined as layered authentication approach relying on two or more authenticators to establish the identity of an originator or receiver of information.
Identity Tokens
Smart cards and iKey USB tokens are secure devices that can hold users credentials, such as passwords, keys, certificates, or biometrics. The devices have an open, flexible operating system that can enable other capabilities such as storing personal information or physical access credentials securely to the device. The cards/tokens can be used in both PKI and non-PKI environments. Whether smart card or USB token, both form factors have identical capabilities and organizations can mix and match card/token types as requirements dictate.
Model 330 smart cards and iKey 2000 tokens are validated for FIPS 140-1 and/or 140-2 Level 2, an important U.S. Government certification that demonstrates the card/token's cryptographic strength and security. Our smart card/token technology has always supported PKCS #11 and MS-CAPI interfaces, allowing for seamless integration and interoperability with applications and products from leading authentication and information security companies. Used in conjunction with the robust client software, the smart cards and tokens are trusted by more customers and partners than any other in the industry.
Form Factor
Whether an organization selects the traditional smart card form factor or the USB token depends on the needs of the organization and its users.
Organizations may choose the smart card form factor if they want leverage for both physical and logical access. Smart cards can be integrated with various building access technologies in order to function as both an employee's physical and digital ID. The same smart card that is used for network and computer security can be personalized and printed with ID pictures to function as an employee's ID badge. Fitted with a magnetic stripe or RF proximity technology, the card can also be used for door access systems. Smart ID badges can be issued using the same technology that issues standard ID badges today; existing badge printers would simply need to be upgraded to accept the smart card chip.
The iKey USB token offers an alternative form factor to smart cards, delivering the same advanced information security functionality as the smart cards. The iKey offers flexibility and convenience for users because it plugs directly into a USB port (no smart card reader required). The iKey personal USB authentication token is small enough to fit on a key chain, and its durable shell allows it to be carried at all times.
Flexible Smart Token Platform
Variants of the smart cards and iKeys are easily provided with digitally-signed executable programs resident in EEPROM and controlled by a cryptographic operating system. These secured extensions of the operating system provide the card/token versions that support application-specific requirements, such as those for Identrus, match-on-card biometrics, card unblocking, and GSA compatibility. Additional capabilities can easily be added as customer requirements dictate.
The Model 330 and the iKey 2032 are also provided in a Java card version that is functionally identical to the non-Java version.
Perico AS, Trollåsveien 36, 1414 Trollåsveien, Tlf: +47 22064050, info@perico.no