the limits of crypto and authentication

James A. Donald jamesd at echeque.com
Sat Jul 9 21:56:22 EDT 2005


    --
Ian Grigg <iang at systemics.com>
> In the payments world we've known how to solve all 
> this for some time, since the early 90s to my
> knowledge. The only question really is, have you got a
> business model that will pay for it, because any form
> of token is very expensive, and the form of token that
> is needed - a trusted device to put the application,
> display, keypad and net connection on - is even more
> expensive than the stop-gap two-factor authentication
> units commonly sold.

Such a device sounds like a cell phone.


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     5nMEZ3YWGEUKZWzEprv/E7vI+8j9jzBNX8GWiJiO
     4nb4BSDrVGLfq42fHktPRSAfFO3N0uGBnezGRNWrS


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list