PIN Validation
There are several main methods of validating PINs. The operations discussed below are usually performed within a hardware security module (HSM).
Read more about this topic: Personal Identification Number
Famous quotes containing the word pin:
“A man is a beggar who only lives to the useful, and, however he may serve as a pin or rivet in the social machine, cannot be said to have arrived at self-possession.”
—Ralph Waldo Emerson (18031882)