Preview

Nila-2-Factor Authentication for Mobile Applications-Introducing Doublesec.Pdf

Powerful Essays
Open Document
Open Document
2311 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nila-2-Factor Authentication for Mobile Applications-Introducing Doublesec.Pdf
2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

TECHNOLOGY WHITEPAPER
DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0

1

Motivation
With the increasing desire also of private individuals to access their confidential data even from their mobile devices, the need for strong security controls for such application arises – in the same way as it has years ago in the area of web applications. This paper covers one of the most important parts thereof: the login process that allows an application on a mobile device accessing data from a server using two-factor authentication.

Introduction
An increasing number of internet-based end-customer applications require two-factor authentication. Text message (SMS) based one-time code distribution (as second factor) is rapidly becoming the most popular choice when strong authentication is needed, for example in e-banking. Low acquisition, distribution and help-desk cost are the main drivers for these socalled mTAN1 based authentication methods. All of these properties are particularly important for applications that serve large number of users, possibly on a global scale. With multi-factor authentication, each token available for authenticating the user falls into one of the following three categories: • • • Something the user knows (e.g. a password) Something the user has (e.g. a hardware token) Something the user is (e.g. a fingerprint)

mTAN-based strong authentication makes use of the two categories “something the user knows” (password) and “something the user has” (mobile device). During authentication, the user has to provide the password as well as a one-time secret received by SMS on his mobile phone. Proof of possession of the mobile phone (which is done by providing the received SMS code) is used as 2nd login factor. With increased capabilities of mobile devices, there’s been a trend towards accessing web services2 over the mobile channel3 as well. Much

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    • Authentication – the process for “trust” connection establishing between the server and the applier;…

    • 767 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is a hot topic in today 's business world. However, many people may have differing ideas when it comes to what security authentication actually is. This paper will address those perceptions in a straightforward and easy to understand manner.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    Historically and traditionally, MAC has been closely associated with multi-level secure (MLS) systems. The Trusted Computer System Evaluation…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Many services, including has Google, offer two-factor authentication for logging into your account. Instead of simply entering a username and password to log in, the website will prompt you to enter a code sent to your smartphone…

    • 691 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    • Multifactor Authentication – This method of authorization requires the user to provide more than one factor to log in. This is more secure than single factor authorizations, such as only requiring a password. For example, with multifactor authentication a user would need to provide another means of authentication in addition to a password.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    CSEC 630 Lab Assignment 1 – Introduction to Cryptography. (n.d.). University of Maryland University College. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    HIPAA Compliance Report

    • 601 Words
    • 3 Pages

    Another strategy is to use username and a password, which is beneficial because when login into a hospital’s database it will ask the user for password and username, which is unique to their physical being such as a fingerprint. The benefit of utilizing this dual form of authentication is that it will be very difficult for hackers to get access to hospitals private information. 2FA is a very important technology because it is an extra added security, which protects information and keep hackers away, it also shows when a successful logon has occurred and the user will know whether they were the one who logon or if it was an unauthorized user who got access to their database. 2FA also have a mobile app which sends notifications on the user’s smart phone for every authentication request, the notification will include information such as location of the user who have access your device or database, IP address and…

    • 601 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Starbucks/Itunes Partnership

    • 4719 Words
    • 19 Pages

    Mobile Technology is expanding daily. It seems to be one of the fastest growing kinds of technologies in the news today. With the advancements in Personal Area Networks (PAN) and Wireless Access Protocols (WPA) mobile devices of today can be developed that are more secure than ever. They can be more accessible than ever before and provide faster and more accurate data transfer. The uses for the mobile devices have begun to expand into more and more areas of daily life. The iPhone mobile phone developed by Apple, Inc. is one of the most popular and bestselling mobile phones on the market today. In order for the iPhone to be at the head of the industry several of the most important technological features are…

    • 4719 Words
    • 19 Pages
    Best Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    1. In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not? Yes it can be acceptable because you can buff up security elsewhere.…

    • 858 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Mobile computing and social networks are part of the daily lives of millions of Americans. “48% of American adults own a mobile computing device in some form according to the latest Nielsen data.” (Knott, 2012) As far as social networking site usage “over 65% of all internet users in the United States use social networking sites.” (Brenner, 2012) It is obvious that mobile computing and social networking on the web is not a passing fade. There are many uses and applications for mobile computing and social networks. In this paper a few of these aspects will be examined. First an assessment will be made as to the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. Second, an evaluation of the benefits realized by consumers because of the ability to gain access to their own data via mobile applications will be completed. Third, the challenges of developing applications that run on mobile devices because of the small screen size will be examined. Forth, the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android will be described. Fifth, due to mobile applications requiring high availability because end users need to have continuous access to IT and IS systems, a discussion of the ways of providing high availability will be undertaken. Finally, because mobile devices are subjected to hacking at a higher rate than non-mobile devices, methods of making mobile devices more secure will be examined.…

    • 3631 Words
    • 15 Pages
    Better Essays
  • Good Essays

    This academic collection is the evaluation of a survey of mobile users’ perception of security needs. This paper addresses the current security methods and reveals their inadequate nature. Finally, this article proposes a two-level security method for mobile user authentication. Highly relevant for examining users’ lack of knowledge concerning mobile security.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Access Control

    • 648 Words
    • 3 Pages

    The need for stronger authentication methods on line has never been in more demand than at present. There are many services that provide security and authentication while on line or to verify who is the end user. With the rise of identity theft among other cyber crimes, the need for stronger authentication is greatly needed. This written assignment will define, describe and explain OATH (Open Authorization) as a preferred choice for authentication method and the benefits of OATH.…

    • 648 Words
    • 3 Pages
    Good Essays