the limits of crypto and authentication
James A. Donald
jamesd at echeque.com
Sat Jul 9 21:56:22 EDT 2005
--
Ian Grigg <iang at systemics.com>
> In the payments world we've known how to solve all
> this for some time, since the early 90s to my
> knowledge. The only question really is, have you got a
> business model that will pay for it, because any form
> of token is very expensive, and the form of token that
> is needed - a trusted device to put the application,
> display, keypad and net connection on - is even more
> expensive than the stop-gap two-factor authentication
> units commonly sold.
Such a device sounds like a cell phone.
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
5nMEZ3YWGEUKZWzEprv/E7vI+8j9jzBNX8GWiJiO
4nb4BSDrVGLfq42fHktPRSAfFO3N0uGBnezGRNWrS
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list