Feitian TOTP C200 H27 SHA1 / 60Sec / 6-digits
Ab € 7,75Kurzbeschreibung
With token authentication, you have access to a proven security method that uses the token as proof of identification. This allows you to control access to specific resources. The token is a unique string of characters generated by an authentication server. It authorizes you, the user, to view and use specific digital applications.
Select your token type here
Sie befinden sich hier: PCP GmbH | Shop (EN) | Token authentication | Page 2
SHA256 / 30 Sec. / 6-digit code Seed re-programmable with Feitian Seed burning hardware tool Water resistant with IP65 Zero footprint: No software on end-user PC’s Simple & secure, highly cost-effective 2FA solution 4 year battery life (under normal conditions)
SHA256 / 60 Sec. / 6-digit code Seed re-programmable with Feitian Seed burning hardware tool Water resistant with IP65 Zero footprint: No software on end-user PC’s Simple & secure, highly cost-effective 2FA solution 4 year battery life (under normal conditions)
NFC-enabled / SHA1 / 30 Sec. / 6-digit code User – Reprogrammable Seed via NFC (Android Application) Battery icon to show the remaining battery level Tamper evident & water resistant with IP67 Zero footprint: No software on end-user PC’s 5 year battery life (under normal conditions)
NFC-enabled / SHA1 / 60 Sec. / 6-digit code User – Reprogrammable Seed via NFC (Android Application) Battery icon to show the remaining battery level Tamper evident & water resistant with IP67 Zero footprint: No software on end-user PC’s 5 year battery life (under normal conditions)
HOTP / I34 / SHA1 /Â Event-based one-time-password Battery icon to show the remaining battery level Tamper evident & water resistant with IP67 Zero footprint: No software on end-user PC’s 5 year battery life (under normal conditions)
NFC – SHA1 / 30 Sec / 6 digit code OATH-compliant time-based card with Epaper display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
NFC – SHA1 / 60 Sec / 6 digit code OATH-compliant time-based card with Epaper display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
NFC – SHA256 / 30 Sec / 6 digit code OATH-compliant time-based card with Epaper display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
NFC – SHA256 / 60 Sec / 6 digit code OATH-compliant time-based card with Epaper display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
SHA1 / 30 Sec / 6 digit code OATH-compliant time-based card with LCD display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
SHA1 / 60 Sec / 6 digit code OATH-compliant time-based card with LCD display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
SHA256 / 30 Sec / 6 digit code OATH-compliant time-based card with LCD display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
SHA256 / 60 Sec / 6 digit code OATH-compliant time-based card with LCD display Simple, secure & highly cost effective 2FA solution Available in grey design, colored design and plain white (for printing individiual logos) Card printing (Min. order of 100 cards) – ask us about this service (info@pcp-europe.com)
Token authentication works on the basis of a 2-factor method or a FIDO token. The main difference is that 2-factor token authentication uses static codes or passwords, while FIDO token authentication uses asymmetric cryptography.
The security mechanism of the 2-factor method uses 2 different factors for identity verification. Typically, these are a specially created password and a token PIN. Accordingly, you enter your username and password to log in. The service checks to confirm your identity. If this 1st factor is successfully confirmed, the token verification kicks in. The service verifies your token (e.g. unique PIN code), which is based on a time-based algorithm and is updated regularly. Upon confirmation of the correctly entered Token PIN, you will be granted access to your protected digital content.
In contrast, FIDO token authentication uses different technologies and security mechanisms. While 2-factor token authentication usually relies on OTPs or other static codes, FIDO token authentication relies on asymmetric cryptography and public-private key pairs. Asymmetric cryptography, also known as public key cryptography, is based on a pair of mathematically linked keys: a public key and a private key. Unlike symmetric cryptography (which uses the same key for both encryption and decryption), asymmetric cryptography uses different keys for different tasks.
The first “security token” or “hardware token” authentications were developed as early as the 1980s. In recent decades, government agencies and banks in particular, have taken advantage of the increased security measures in their IT environments. Today, many commercial enterprises and government organizations also secure themselves use token authentication.
The increased security measures are a result of the growing number of hacker attacks on corporate and organizational networks. In 2021 alone, 124,137 cybercrimes will be recorded by the police in Germany (source: Statista). In particular, companies and organizations have problems with ransomware. Ransomware is malicious software, also known as malware, that is designed to block or encrypt data and systems. As a result, ransomware extorts money from affected companies and organizations to restore access. Typically, ransomware enters the system through infected email attachments, malicious links, drive-by downloads, or software vulnerabilities. Once activated, the ransomware begins encrypting files or even the entire IT system. The ransom demand usually appears as a pop-up or text file. The ransom is often demanded in cryptocurrency to avoid detection.
With token authentication, you can provide an effective barrier against crimes such as ransomware at a very reasonable cost and without much additional implementation to the existing IT infrastructure. Several types of tokens are available.
Use 4 types of tokens for authentication: TOTP, HOPT, QR Token, and FIDO Token.
Token authentications has significant advantages and few disadvantages.
Benefits of token authentication
Disadvantages of token authentication
Secure your IT systems with the authentication mechanisms of our tokens. Choose a token type that fits your needs. Have questions about the right token authentication? For increased security against cyber-attacks, please contact us and we will be happy to help you choose the right token type that is easy to implement and applicable to a wide range of applications.