ALERT

[FREE DEMO] Deploy Your Enterprise Cloud in Minutes

Time Synchronous Authentication

Definition - What does Time Synchronous Authentication mean?

Time synchronous authentication refers to a type of Two Factor Authentication (TF-A) method that uses synchronous or time-synchronized tokens for authentication.

The intended synchronous tokens are time-synchronized with an authentication server in order to create a One-Time Password (OTP). The server and the token have individual clocks that should be synchronized to the exact same timebase.

The generated OTP is valid only for a short time period. If the difference between the authenticator clock and the token clock is too great, then the password authentication will not be accurate.

The other two types of TF-A used in networks are challenge response authentication and event synchronous authentication.

Techopedia explains Time Synchronous Authentication

In time synchronous authentication, both the server and the user have their internal clocks synchronized, thus the name. Also, they contain the exact same seeds. A seed can be described as the starting values applied by the random number generation to generate a pseudo random number.

Time synchronous authentication method uses three steps to execute the authentication:
  1. The user inputs the username and passcode. The passcode includes a 4-to-8 digit random token code as well as PIN of the user.
  2. The token and the server generate the token code by blending the seed record and the present Greenwich Mean Time (GMT).
  3. The server then authenticates the user's passcode with the server's passcode and if found correct, the authentication is validated.
Time Synchronous Authentication features some benefits over the challenge response and event synchronous authentication, they are:
  • Security: The time synchronous authentication is much secured when compared with the other two as it depends on the secret seed of the token. The secret seed is virtually hacker proof. The other two authentication methods are less advanced and are vulnerable to attacks.
  • Portability: Time synchronous hardware tokens are highly portable as they are not tied to the desktop of the user. Also, there is an option to pick from a variety of factors, which can be effortlessly incorporated into the mobile phones and palm devices.
  • Simple Use: The time synchronous authentication includes three steps whereas the challenge response authentication includes five steps.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.