If I were asked to name the most pervasive piece of computing technology in the modern law firm, I’d be hard pressed to come up with a more commonplace hunk of hardware than the smart card. Our wallets and purses are positively teeming with these pocket-sized slices of microchip-laced plastic. Credit cards, phone cards, company ID cards, supermarket discount cards; nowadays, no one leaves home without one.
In security circles, smart cards are often employed as “tokens,” one component in a two-factor authentication scheme. Think of a two-factor scheme as two keys to a lock. One key is something you know (your password) and the other key is something that you have (the token or the card). Together, they verify your identity to open a lock. Tokens can also exist in software and reside in any small piece of hardware with storage capability, from a USB drive to the flash memory in a cell phone.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
LexisNexis® and Bloomberg Law are third party online distributors of the broad collection of current and archived versions of ALM's legal news publications. LexisNexis® and Bloomberg Law customers are able to access and use ALM's content, including content from the National Law Journal, The American Lawyer, Legaltech News, The New York Law Journal, and Corporate Counsel, as well as other sources of legal information.
For questions call 1-877-256-2472 or contact us at [email protected]