Congratulations!
You just entered a web site secured by the VASCO AccessKey(tm) II extended
user authentication token. Your entry was unique because:
- Your password worked only for you, only for that request. (If you try again, you get a new password. Try it!)
- You can use the same AccessKey from any computer . . . on any system . . . on any network . . . anywhere in the world.
The AccessKey II token is a light weight, hand-held device. Its patented, proprietary algorithm
optically reads the screen-displayed challenge and generates a
one-time response for user authentication. The AccessKey II has
several advantages over typical "credit card/calculator"
style devices including:
- Challenge/response methodology for two-factor authorization
security.
- Easily integrated with any application.
- Scalable, distributed authentication capability.
- Optional PIN to secure individual Access Keys.
- Resilient materials and rugged design for increased durability.
With the AccessKey II technology, a web surfer would be able
to register a personal AccessKey II with all web sites which require
a user login. This eliminates the need for a unique login/password
combination on each site, and prevents the user from using the
same password on each site. The AccessKey II also allows a web
site to prevent multiple people from using the same login/password
combination.
Representative AccessKey Applications
A wide variety of new computing applications can benefit from the added security provided by VDSI's AccessKey II technology.
- Financial institutions requiring accurate user authorization for secure online transactions.
- Mobile computing, field sales/service forces, and telecommuters accessing and manipulating corporate data from remote sites.
- Individual users gaining entry to bank records and information to perform home banking and account management tasks.
- Universal access to the Internet, corporate Intranets, and virtual private networks for widespread dissemination of information, electronic commerce, instantaneous communication, and online research.
Enhance System Security
In addition to providing state-of-the-art access control for new installations, AccessKey II can increase the integrity of currently installed security measures. These products create a two-factor authentication capability, eliminating the weak link of password-only user authorization. Some of the areas already incorporating VDSI's security technology include:
- Third party firewall security systems.
- Single sign-on solutions.
- LAN/WAN log-in procedures.
- A variety of internally-developed and proprietary network applications.
The Key to Data Security
The VASCO Data Security AccessKey II is the key to real data
security and access control for computers. The key
can be used with a software login and password for greater security
or in place of the password for greater ease of use:
- Updating passwords becomes a lost art
- Passwords cannot be forgotten, lost or stolen
- Complicated multiple passwords are not needed, so they can't be forgotten
- Simplistic passwords will never exist, so they can't be broken
- Time spent tracking and monitoring password use can be better spent
- Passwords don't need to be written out (and then stored in insecure locations)
Team Members: