La versión del navegador que esta usando no es la recomendada para este sitio.
Para actualizar la última versión de su navegador haga clic en alguno de los siguientes enlaces.

Embedded One-Time Password (OTP)

Seamless Web Site User Authentication and Secure VPN Access

Traditionally, two-factor authentication uses a one-time password (OTP), which combines something the user knows (a username and password) and something the user has (typically, a token or key fob that produces a six-digit number, valid only for a short period of time and available on demand).

If your business is already using two-factor authentication, then you are also familiar with the various issues around token usability and logistics. Replacing lost or broken tokens and users mistyping their one-time passwords are just two of the headaches currently affecting help desks and IT departments. Intel® Identity Protection Technology (Intel® IPT)1 with OTP is a built-in hardware token (of your security vendor choice) that negates the need for a separate physical token, thus simplifying the two-factor VPN log-in process for a seamless experience with virtually no delays. Moreover, Intel IPT ensures that the PCs accessing your VPN are those assigned to your employees. This easy-to-use, two-factor authentication solution is available from a variety of OEMs and security independent software venders (ISVs).

Algorithms supported by third-party ISVs and partners of Intel, such as Vasco, Symantec, and McAfee, run in the chipset, performing the operations that link the computer to a validated site and help ensure strong authentication.1

Información sobre productos y desempeño


Ningún sistema puede proporcionar una seguridad absoluta. Requiere un equipo habilitado para la tecnología de protección de identidad de Intel®, lo que incluye un procesador Intel®, chipset, firmware, software y gráficos integrados Intel habilitados (en algunos casos) y un sitio web/servicio participante. Intel no asume responsabilidad alguna por los equipos y/o datos extraviados o robados ni por ningún daño que se produzca en consecuencia. Para obtener más información, visite Consulte al fabricante de su sistema y/o a su proveedor de software para obtener más información.