Talk With an Expert

Proximity Authentication

Proximity Authentication (PDF, 1.62MB)Published: 16 Jul, 2001
Created by:
Ali Merayyan

The author discusses protecting data by denying direct physical access onto a user's computer; that is, protect sensitive data terminals from being used by unauthorized users. The emphasis is on how to identify users - to make sure that they are who they claim to be, to a certain level of certainty - and gives an overview of Users Authentication Methods, both software and physically based. Included is a case study of the Ensure Technologies' XyLoc product. One of the goals for any security policy is to strike a balance between how secure the system is and how convenient it is for the users to use the system. Such a convenience makes it easier to get users to comply with the security policies. This convenience can be accomplished using a proximity device. Proximity devices allow the computer to recognize an authorized user approaching and unlock itself for their use.

Proximity Authentication