Possessed objects often are used together with a personal identification number (PIN), which is a numeric password. Three common types of authentication are memorized information, biometric devices, and possessed objects. With memorized information, the user enters a word or series of characters that match an entry in the computer’s security file.
(
Read more... )