In connection with the widespread use of computers, the user has to think about the security of the processed information. The first step in securing is to authenticate a legitimate customer. Most often, a password is used as a verification tool. Besides, more than 60% of users, as practice shows, apply the same passwords to different systems. Needless to say, this significantly reduces the level of security. What to do? One way to solve such a problem is to use external authentication keys.
