Читать книгу The Internet of Medical Things (IoMT) - Группа авторов - Страница 47

2.2.1.8 Knowledge-Based Authentication

Оглавление

In order to gain additional confidence in the identity of those users, keep in mind that the challenge attacker [2] is unlikely to be able to provide. On the basis of “shared secret”, the organization questions the user, when appropriate, to allow user information that has been through the registration process, or how to go on related to the confirmation of the previous transaction wants to do.

The Internet of Medical Things (IoMT)

Подняться наверх