Difference between revisions of "Late Binding Token"
|Line 8:||Line 8:|
Revision as of 10:02, 22 July 2019
Full Title or Meme
There are two broad classifications of Late Binding Tokens.
- User held key fobs that have very limited functionality other than to carry a private key (aka user Credential and the ability to sign or decrypt hashes.
- User held mobile devices like Smart Phones that come with a built in Trusted Execution Environment that can perform the same function.
There are a few problems that need to be mitigated with Late Binding Tokens.
- The Relying Party must be assured that the device is legitimate and did create the message that was sent from the user to validate an interchange.
- The user would like to be able to use one token to secure message interchanges with more than one service so they don't get asked to carry multiple tokens.