The YubiKey -- COMPARISON OF VERSIONS
COMPARISON OF YUBIKEY VERSIONS
| BASIC STANDARD & NANO |
BASIC EDGE & EDGE-N |
PREMIUM NEO & NEO-N |
FIDO U2F SPECIAL SECURITY KEY |
||||
|---|---|---|---|---|---|---|---|
| PRICE – SINGLE QUANTITY | $25 | $30 | $50 | $18 | |||
| Description | Our most basic YubiKeys deliver a one-time password with a simple touch of a button. No SMS-like passcodes to retype, no client software or drivers. |
YubiKey Edge supports one-time password and FIDO U2F, for plug-n-play use with a broad range of applications. |
Our premium YubiKeys support one-time password, smart card, and FIDO U2F. The YubiKey NEO offers both contact (USB) and contactless (NFC, MIFARE) communications. |
Designed to only support the emerging authentication standard FIDO U2F. |
|||
| Size | |||||||
| Form Factor & Dimensions | USB KEY: 18mm x 45mm x 3mm, 3g Mini USB KEY: 12mm x 13mm x 3mm, 1g |
USB KEY: 18mm x 45mm x 3mm, 3g Mini USB KEY: 12mm x 13mm x 3mm, 1g |
USB KEY: 18mm x 45mm x 3mm, 3g Mini USB KEY: 12mm x 13mm x 3mm, 1g |
USB KEY: 18mm x 45mm x 3mm, 3g |
|||
| Security Protocols/Specifications | |||||||
| SECURE STATIC PASSWORDS | ![]() |
![]() |
![]() |
![]() |
|||
| YUBIKEY OTP | ![]() |
![]() |
![]() |
![]() |
|||
| OATH – HOTP (EVENT) | ![]() |
![]() |
![]() |
![]() |
|||
| OATH – TOTP (TIME) | ![]() |
||||||
| PIV-Compliant Smart Card | ![]() |
![]() |
![]() |
![]() |
|||
| OpenPGP | ![]() |
![]() |
![]() |
![]() |
|||
| FIDO U2F (Universal Second Factor) | ![]() |
![]() |
![]() |
![]() |
|||
| Secure Element | ![]() |
![]() |
![]() |
![]() |
|||
| Top Applications | |||||||
| Everywhere I type a standard password? | ![]() |
![]() |
![]() |
![]() |
|||
| Google Accounts Compatible (U2F) | ![]() |
![]() |
![]() |
![]() |
|||
| SalesForce.com Compatible (OTP) | ![]() |
![]() |
![]() |
![]() |
|||
| LastPass | ![]() |
![]() |
![]() |
![]() |
|||
| Communications Support | |||||||
| USB | ![]() |
![]() |
![]() |
![]() |
|||
| NFC (Near Field Communication) | ![]() |
![]() |
![]() |
||||
| Device Type | |||||||
| HID Keyboard | ![]() |
![]() |
![]() |
![]() |
|||
| CCID Smart Card | ![]() |
![]() |
![]() |
![]() |
|||
| FIDO U2F (Universal Second Factor) HID device | ![]() |
![]() |
![]() |
![]() |
|||
OATH-TOTP requires a helper app, YubiTOTP; NFC is included on the larger, keychain form factor of the YubiKey NEO, however NFC is NOT included on the smaller form factor, the YubiKey NEO-n.
Also see bundled products such as LastPass subscriptions with YubiKeys and Password Safe subscriptions with YubiKeys, and special products such as YubiKey VIP for Symantec and YubiHSM.
The YubiKey -- COMPARISON OF VERSIONS的更多相关文章
- [转]Mac OS X local privilege escalation (IOBluetoothFamily)
Source: http://joystick.artificialstudios.org/2014/10/mac-os-x-local-privilege-escalation.html Nowad ...
- hadoop发行版本
Azure HDInsight Azure HDInsight is Microsoft's distribution of Hadoop. The Azure HDInsight ecosystem ...
- HDU5099——Comparison of Android versions(简单题)(2014上海邀请赛重现)
Comparison of Android versionsProblem DescriptionAs an Android developer, itˇs really not easy to fi ...
- Comparison of Android versions(strcmp的应用)
Description As an Android developer, itˇs really not easy to figure out a newer version of two kerne ...
- 模拟 HDOJ 5099 Comparison of Android versions
题目传送门 /* 题意:比较型号的大小 模拟:坑点在长度可能为5,此时设为'A' */ #include <cstdio> #include <algorithm> #incl ...
- HDOJ 5099 Comparison of Android versions 坑题
现场赛的时候错了十四次. . ... Comparison of Android versions Time Limit: 2000/1000 MS (Java/Others) Memory L ...
- 转 Comparison of Red Hat and Oracle Linux kernel versions and release strings
Originally derived from Red Hat Enterprise Linux (RHEL), Oracle Linux (OL) contains minor difference ...
- The YubiKey NEO -- Smartcard features
Smartcard features on the YubiKey NEO YubiKeys are a line of small and low-cost hardware security to ...
- Shape comparison language
形状比较语言, 九交模型 In this topic About shape comparison language Dimensionality Extensions to the CBM SC ...
随机推荐
- ActiveMQ:初见&安装试运行
官网:http://activemq.apache.org/ ActiveMQ是一个消息中间件,在大型互联网应用中有广泛的使用. 当前最新版本:5.15.4,发布于2018-05-22,开源.Apac ...
- 正则表达式之你不知道的replace
我们都知道js内置类String提供了一个replace方法,可以把指定字符串替换为另一个字符串,他的基础用法如下: var str="hello world"; var str= ...
- 洛谷P2661信息传递
传送门啦 一个人要想知道自己的生日,就意味着信息的传递是成环的,因为每轮信息只能传递一个人,传递的轮数就等于环的大小 环的大小就等于环中的两个点到第三个点的距离之和加一,我们就可以在使用并查集时,维护 ...
- Java @SuppressWarnings
@SuppressWarnings() 注解以@开头可以接受参数 @SuppressWarnings("unchecked") 不受检查的警告信息应该被抑制 //: holding ...
- $()与document.getElementById
$('#a')是返回一个jquery对象 $('#a')[0]是一个element对象 document.getElementById('a') return 一个element对象
- .NETCore分布式微服务站点设计(1)-概念图
自己画了一个简略结构图,准备按照这个搭建一套微服务型的站点 利用Identityserver4+Redis+Sqlserver+Swagger+阿里云OSS+RabbitMQ+Nginx来实现,按照自 ...
- JavaScript闭包与变量的经典问题
许多人第一次接触闭包大概都是从高程里这段代码开始的: function createFunctions() { var result = new Array(); for(var i=0; i< ...
- python日常总结
1. post请求中是否可以在url中携带请求体信息? 可以.Get请求时,请求体放在URL中; POST请求,请求体既可以是Form表单中的数据 也可以在请求的URL地址中放请求体信息. 如: &l ...
- JAVAEE——SpringMVC第二天:高级参数绑定、@RequestMapping、方法返回值、异常处理、图片上传、Json交互、实现RESTful、拦截器
1. 课前回顾 https://www.cnblogs.com/xieyupeng/p/9093661.html 2. 课程计划 1.高级参数绑定 a) 数组类型的参数绑定 b) List类型的绑定 ...
- JDK源码分析(五)——HashSet
目录 HashSet概述 内部字段及构造方法 存储元素 删除元素 包含元素 总结 HashSet概述 从前面开始,已经分析过集合中的List和Map,今天来介绍另一种集合元素:Set.这是JDK对 ...





