What does an authentication solution involve?
The first step in designing an authentication solution is to understand the strategic commercial issue that the client seeks to solve, together with any practical constraints that may affect its implementation. Having done so, a program will be designed that may incorporate the overt and or covert, marking or serialization of a product, together with an inspection process to check for authenticity and provenance in the supply chain. This is married to a secure information management tool for effective chain of evidence custody, thereby providing the means of remediation and risk avoidance for clients, whether through the courts or via commercial sanctions.
Related Questions
- Does the project involve new identifiers, re-use of existing identifiers, or intrusive identification, identity authentication or identity management processes?
- What steps does Shared Key Authentication involve for a client to associate with the AP?
- What steps does Open Authentication involve for a client to associate with the AP?