[4687] in cryptography@c2.net mail archive
Hardware Authentication
daemon@ATHENA.MIT.EDU (Robert Hettinga)
Wed May 12 19:16:48 1999
Date: Wed, 12 May 1999 13:11:24 -0400
To: cryptography@c2.net
From: Robert Hettinga <rah@shipwright.com>
--- begin forwarded text
From: "Subba Rao" <subb3@ibm.net>
To: "DCSB" <dcsb@ai.mit.edu>
Date: Wed, 12 May 1999 10:25:56 -0400 (EDT)
Priority: Normal
Subject: Hardware Authentication
Sender: bounce-dcsb@ai.mit.edu
Reply-To: "Subba Rao" <subb3@ibm.net>
What are the various hardware authentication technologies that are available?
I am particularly interested in server to server authentication. iButton is
one of them
and I can't find any other hardware technologies that authenticate server
to server.
This is important, and will become important, as many service providers
merge to
provide new services.
Any pointers or info is appreciated.
Thank you in advance.
Subba Rao
subb3@ibm.net
==============================================================
Disclaimer - I question and speak for myself.
______________________________________________________________
For help on using this list (especially unsubscribing), send a message to
"dcsb-request@ai.mit.edu" with one line of text: "help".
--- end forwarded text
-----------------
Robert A. Hettinga <mailto: rah@philodox.com>
Philodox Financial Technology Evangelism <http://www.philodox.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'