HP Tc4200 HP ProtectTools: Authentication technologies and suitability to task - Page 1

HP Tc4200 - Compaq Tablet PC Manual

Page 1 highlights

HP ProtectTools: Authentication technologies and suitability to task Introduction...2 Authentication technologies in HP ProtectTools 2 Password authentication ...3 TPM embedded security chip authentication 4 Smart card authentication ...4 USB token authentication ...5 Biometric fingerprint authentication ...6 Virtual token authentication ...7 Feature Comparison and suitability to task 7 Suitability to Task...8 Conclusion...9 For more information...9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9

HP ProtectTools:
Authentication technologies and suitability to task
Introduction
.........................................................................................................................................
2
Authentication technologies in HP ProtectTools
........................................................................................
2
Password authentication
.......................................................................................................................
3
TPM embedded security chip authentication
............................................................................................
4
Smart card authentication
.....................................................................................................................
4
USB token authentication
......................................................................................................................
5
Biometric fingerprint authentication
........................................................................................................
6
Virtual token authentication
...................................................................................................................
7
Feature Comparison and suitability to task
..............................................................................................
7
Suitability to Task
.................................................................................................................................
8
Conclusion
..........................................................................................................................................
9
For more information
............................................................................................................................
9