Each device is in sync with the AuthShield server based on Time i.e. the server uses the same algorithm to validate the passwords entered by the user at that point in time.
visit http://www.auth-shield.com now to get started!
Contact your AuthShield System Administrator on details of how to activate your token.
No extra devices apart from smart phones
Simple deployment model and minimal required infrastructure
One Token can be used for authentication to multiple applications
Tokens can be quickly reassigned among users
Easy administration of tokens for remote users
No user information apart from user names is required for Two Factor Authentication