BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE

Size: px
Start display at page:

Download "BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE"

Transcription

1 BANKING AUTHEMTICATION SYSTEM USING MOBILE-OTP WITH QR-CODE Abhishek B. Iyer G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India Rohit A. Shah G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India Pritamkumar D. Suryawanshi G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India Swapnil Tawade G.H.Raisoni College of Engineering and Management, Wagholi, Pune, Maharashtra, India Abstract As a high-speed internet infrastructure is being developed and people are informationized, the financial tasks are also engaged in internet field. However, the existing internet banking system was exposed to the danger of hacking. Recently, the personal information has been leaked by a high-degree method such as Phishing or Pharming beyond snatching a user s ID and Password. Seeing that most of examples which happened in the domestic financial agencies were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new Online Banking Authentication system. This authentication system used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode. Keyword- 2D Bar Code, Mobile Learning, One Time Password(OTP), Quick Response (QR)Code, URL. 1) INTRODUCTION Online banking is one of the most sensitive tasks performed by general internet user. Most traditional banks new offer online baking with peace of mind. Although the banks heavily advertise a apparent 100% online security guarantee, typically the fine print makes this conditional a user fulfilling certain security requirements [1]. The number of the users of the domestic banking system has-been increased steadily in the first quarter of The average usage of the service per day was 26,410,000 while the amount of dealings went beyond 26 trillion 950 million won. However, recent banks are becoming increasingly reluctant to reimburse user who fall prey to online scams such as phishing or a pharming. The first hacking incident in Korea in 2005spurred the FSS (The Korean Financial Supervisory Service) to announce a comprehensive countermeasure. One of the countermeasures that draw high attention of the financial agencies is OTP (One Time Password), one of the user confirmation methods is introduces, and Joint Confirmation Centre of OTP is established [2]. The Online financial transaction in the present is apply a security card and public key certificate which are the methods confirming a user, and recently OTP was newly introduced. One-Time Password is a password system where passwords can only be used once and the user has to be authenticated with a new password key each time. This guarantee the safety even if an attacker is tapping password in network or a user loses it. Besides, OTP features anonymity, portability, and extensity, and enables to keep the information from being leaked 1

2 [3]. The type of OTP generate device is smart card, USB, fingerprint recognition and so on. Our propose Online Banking Authentication System use Mobile OTP, one of the OTP generate device which has same security as the existing OTP and with the convenience of mobile features, and the used of semi-permanent. This reduction in acquisition costs as well as easy to download the brother deployment, if the introduction of financial. In addition, user does not require a separate cost except for the initial download costs. Meanwhile, the use of electronic banking services is increased gradually in daily life and currently online banking required the use of security card from each banks. However the current service using security card does not suite modern Mobile environment because we do not know when and where online banking and will be used. If there is emergency situation to do online banking, the online baking cannot be done without the security card. In order to overcome such a weaknesses and inconvenient of security card, our propose authentication system use twodimensional barcodes (2DBarcode) instead of security card. Barcode is fast, easy, accurate and automatic data collection method. Barcode enables products to be tracked efficiently and accurately at speeds net possible using manual data entry system. In this paper, we propose authentication system for online banking which can provide greater security and convenience by mobile OTP with the QR-code, one of the 2D barcode adopted by current international and national standards. The bank generates the QR-code using the user s enter transfer information, the user then use mobile phone to read the code. After that use to a mobile phone generates the OTP code with the input of transfer information and hashed user s mobile serial number. Then user enters the generated OTP code, to complete the transfer process. This paper is organized as follows: We introduce OTP (One-Time Password) [4] and QRcode (two-dimensional barcode)[5] in Section 2. In Section 3, we describe our new scheme and analysis of proposed authentication system. And a conclusion section is end the present paper. 2) RELATED WORK A) OTP (ONE-TIME PASSWORD) An OTP is a generated password which only valid once. The user is given a device that can generate an OTP using an algorithm and cryptographic keys. On the server side, an authentication server can check the validity of the password by sharing the same algorithm and keys. Several software or devices can be used to generate the OTP, for example personal digital assistants, mobile phones, dedicated hardware tokens as it the most secure smart cards is devices among all the OTP generator provide tamper-resistant two-factor authentication: a PIN to unlock the OTP generator(something you know), and the OTP smart card itself(something you have). Figure 1 illustrates the three steps that required to generate an OTP: the collection of some external data, such as the time for synchronous OTP or a challenge for an asynchronous OTP, a ciphering algorithm with secret keys shared by the device and the authentication server, and finally a formatting step that sets the size of the OTP to typically six to eight digits. 2

3 Figure 1- Generation of One-Time Password Until recently, OTP solutions were based on proprietary and often patented time-based or event-based algorithms. In 2005, OATH-HOTP [6] was defined as an open standard by major actors in the industry. This open standard allows multi sourcing of the OTP generating devices and authentication servers from different vendors. The HOTP algorithm is based on a secret key and a counter shared by the device and the server, and uses standard algorithms such as SHA-1 and HMAC. OTP has carried more advantages over PKI as it does not require the deployment of smart card readers, drivers and PC software. However in terms of features, OTP only provides identification and authentication, whereas PKI provides addition encryption and signature. OTP being a password based authentication is also vulnerable to man-in-themiddle attacks, such as phishing scams. Since there is no mutual authentication of the PC and the internet service provider server, an attacker can intercept an OTP using a mockup site, and impersonate the user to the real internet web site. B) QR-CODE (2 DIMENSIONAL BARCODE) A QR-code is a two-dimensional barcode introduced by the Japanese company Denso-Wave in This kind of barcode was initially used for tracking inventory in vehicle parts manufacturing and now is widely used in a variety of industries. QR stands for Quick Response as the creator intended the code to allow its contents to be decoded at high speed. Figure 2- Structure of QR-Code 3

4 Each QR-code symbol consists of an encoding region and function patterns. Function patterns include finder, separator, timing patterns and alignment patterns. The finder patterns located at three comers of the symbol intended to assist in easy location of its position, size and inclination. A QR-code is a matrix code developed and released primarily to be a symbol that is easily interpreted by scanner equipment. It contains information in both vertical and horizontal directions, whereas a classical barcode has only one direction of data (usually the vertical one). Compared to a 1Dbarcode, a QR-code can hold a considerably greater volume of information: 7,089 characters for numeric, 4,296 characters for alphanumeric data, 2,953 bytes of binary (8bits) and 1,817 characters of Japanese Kanji/Kana symbols. Besides this, QR-code also has error correction capability. Data can be restored even when substantial parts of the code are distorted or damaged. In the QR-code standard, comers are marked and estimated so that the inside-code can be scanned. The barcode recognition process has 5 steps: (1) edge detection, (2) shape detection, (3) identification of barcode control bar, (4) identification of the barcode orientation, dimensions and bit density using the control bar, and lastly, (5) calculation the value of the barcode. For camera phones and PDAs (Personal Digital Assistant) that are not equipped with QRcode readers, there are some add-on tools that decode QR-codes simply by positioning the device in front of the code. This is done automatically within the streaming flow and the user does not have to take a picture of the QR-code. Quick Mark and 1-nigma readers are good examples of free tools using this technique that are available for many manufactured models and devices. Quick Mark provides extension functionalities to QR-codes, by allowing partial or entire encryption of codes. Another interesting feature is the Magic Jigsaw : this option encodes binary data (a picture for example) as a chain of QR-codes that the user can scan to retrieve the original content. Alternatively, if there is no network connection is available, the code management will have to be done by the mobile device in an autonomous way. If the final user only needs to scan codes and see the result messages, the software mentioned above are sufficient enough. However the developers, who have to manage QR-codes, some SDKs (Software Development kit) are announced and some are already available in the market. 3) PROPOSED AUTHENTICATION SYSTEM Security is one of the most important elements for requirements of the authentication system. Identification through a secure process where only legitimate user should be able to provide services, when they receive authorization from the server using the generated information from the user s mobile device. Also, convenience is very important as well as safety because inconvenience of the authentication system has possible to make renounce the use of the system. Therefore, the authentication system should provide convenience with maximum safety. Therefore an important approach proposed in this paper is currently being used to generate a QR-code instead of use to security card from the bank and use the mobile OTP. The bank 4

5 generates the QR-code using entered by user s transfer information and the user has to recognize as to read the code using their mobile phone and generate the OTP code using transfer information and the hashed user s mobile device serial number in their mobile phone. Finally, execute the transfer by user input the generated OTP code on the screen. In our propose scheme, we assume the secure communication between the user (PC) service providers and service providers certification authority. A) ASSUMPTION The proposed authentication system is the promise of the following assumption. User and the certification authority (CA) has been shared the hashed the serial number (SN) of user s mobile device through a secure process. User can recognize the QR-code by their mobile device and it can decode of the code. Assume the secure communication through SSL/TLS handshaking between the user (PC) and the certification authority (CA) and the service providers (Bank). User to download the mobile OTP program (algorithm) provided by certification authority (CA) or the service providers (Bank) and used it. Generates the OTP algorithm between the user and the certification authority (CA) is synchronized by Time-Event combinations method. B) PROPOSED SYSTEM The proposed authentication system performed the user authentication and digital signatures using authorized certificates in the same way as the existing authentication. To recognize and convert the code, we generate the mobile OTP code into a two-dimensional barcode using user s transfer information (TI), requested transfer time (T) and the hashed serial number (SN) of user s mobile device instead of security card. The authentication process of proposed system is shown below the Figure. 4. User uses his/her own public certificate to login and then transfer information to start the transfer transaction. o Transfer Information (TI) = TB TA TM o TB : Transfer Bank (Bank code) o TA : Transfer Account o TM : Transfer Money Server indicates and then converted the information to a QR-code with random value (RN`) on the screen using user enters the transfer information (TI), the requested time of transfer (T) and random value (RN). At the same time, the server sent it to certification authority (CA) to inputted information of transfer (TI) and the requested time of transfer (T). 5

6 Figure 4- A Proposed Authentication System Certification authority (CA) generated the OTP by received the transfer information (TI), the requested time of transfer (T) and the user s hashed serial number (SN). User will convert the QR-code on the screen using their mobile device and it is divided into two phases. First, user uses their mobile device (phones) to read the random value (RN) which show on the screen to verify the random value (RN`). If the random value is accurate, user will proceed to the next step. And then confirm the converted the information of transfer. If the information is accurate, user will generate OTP code in the mobile device. If the information does not match, the transfer will be cancelled. When user execute the generated OTP, mobile device generate the OTP by reads the transfer information (TI), perceived value of time (T) and hashed serial number (SN) 6

7 of user s mobile device are shared with the certification authority (CA). And output the generated OTP on the screen of mobile devices. User input the generated OTP code from mobile device on the screen. Server (Bank) sent OTP to certification authority (CA) to received OTP from user. Certification authority (CA) compared by received OTP code (OTP1) and generated the OTP code (OTP2), sent to server (Bank) to for OTP code approval. When the server (Bank) received approve of OTP from certification authority (CA), it will verify the entered OTP code with user consistent value and user digital signature. If the approve of OTP value does not receive, the transfer will be cancelled. Authorized user signed his certificate to complete the transfer. Server (Bank) to verify the digital signature and final approve of transfer. 4) SECURITY ANALYSIS Our proposed system use the camera of mobile device to recognize of QR-code, does not separate to communicate between the user s PC and mobile devices. Also the user and certification authority (CA) has been shared the hashed the serial number (SN) of user s mobile device through a secure process in the initial registration phase. If a counterfeit or altered the PIN, the OTP value is change. In our proposed system, the user to prevent Phishing attacks by identifying the value of random number (RN) before to verify the information of transaction when the conversion of QR-code. Meanwhile, our proposed system require a prerequisite input of transaction information using QR-code and authorized authentication by the public certificate for the generation of OTP. Through this process, identified as legitimate users and can block the use of malicious user. Also the time value used to generate the OTP code is not possible to change arbitrarily because we used the user s requested time of transfer. 5) CONCLUSION The use of electronic banking services is increased gradually in daily life and existing online banking required the usage of security card from each bank which does not match modern mobile environment because we do not know when and where online banking will be used. If there is emergency situation to do online banking, the online banking cannot be done without the security card. In order to overcome such discomfort of security card, online banking authentication system using 2D barcode instead of security card is proposed. The bank generates the QR-code using user input transfer information and then user need to recognize as to read the code using their mobile phone, after generate the OTP code using transfer information and the hashed user s mobile device number in their mobile phone. Finally, terminate the transfer by user typing of generated OTP code on the screen. 7

8 So, We propose new authentication system for online banking can provide greater security and convenience by using mobile OTP with the QR-code, one of the 2D barcode adopted by current international and national standards. REFERENCES 1) YoungeSil Lee, Online Banking Authentication System, Dongseo University, South Korea, ) Mohammad Mannan, P. C. Van Oorschot, Security and Usability: TheGap in Real-World Online Banking, North Conway, NH, USA, ) Sang-Il Cho, HoonJae Lee, Hyo-Taek Lim, Sang-Gon Lee, OTPAuthentication Protocol Using Stream Cipher with Clock-Counter,October, ) Jean-Daniel Aussel, Smart Cards and Digital Identity, Telektronikk3/ ISSN ) ISO/IEC 18004:2000(E) IT-Automatic Identification and Data Capture Techniques- QR Code,

An Innovative Two Factor Authentication Method: The QRLogin System

An Innovative Two Factor Authentication Method: The QRLogin System An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,

More information

A Model for Protecting Online Banking Using Transaction Monitoring

A Model for Protecting Online Banking Using Transaction Monitoring International Journal of Computer Networks and Communications Security VOL. 3, NO. 3, MARCH 2015, 78 82 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) A Model for

More information

Paper-based Document Authentication using Digital Signature and QR Code

Paper-based Document Authentication using Digital Signature and QR Code 2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department

More information

Research Article. Research of network payment system based on multi-factor authentication

Research Article. Research of network payment system based on multi-factor authentication Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor

More information

Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones

Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,

More information

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM Jakub Nantl 1 1 Silesian University in Opava, School of Business Administration in Karvina, Univerzitní nám. 1934/3, 733 40 Karviná Email:

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725

Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering

More information

Secure Web Access Solution

Secure Web Access Solution Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Intelligent Database Monitoring System using ARM9 with QR Code

Intelligent Database Monitoring System using ARM9 with QR Code Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India

More information

Economic and Social Council

Economic and Social Council UNITED NATIONS E Economic and Social Council Distr. GENERAL ECE/TRANS/WP.30/AC.2/2008/2 21 November 2007 Original: ENGLISH ECONOMIC COMMISSION FOR EUROPE Administrative Committee for the TIR Convention,

More information

Internet Banking Two-Factor Authentication using Smartphones

Internet Banking Two-Factor Authentication using Smartphones Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania

More information

IDRBT Working Paper No. 11 Authentication factors for Internet banking

IDRBT Working Paper No. 11 Authentication factors for Internet banking IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

Security Levels for Web Authentication using Mobile Phones

Security Levels for Web Authentication using Mobile Phones Security Levels for Web Authentication using Mobile Phones Anna Vapen and Nahid Shahmehri Department of computer and information science Linköpings universitet, SE-58183 Linköping, Sweden {annva,nahsh}@ida.liu.se

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication

White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication White Paper Preventing Man in the Middle Phishing Attacks with Multi-Factor Authentication Page 1 of 8 Introduction As businesses and consumers grow increasingly reliant on the Internet for conducting

More information

Enhancing Web Application Security

Enhancing Web Application Security Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor

More information

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1

QR Code for Digital Signature Online/Offline Payment. James Wu www.jrsys.com.tw 1 QR Code for Digital Signature Online/Offline Payment James Wu www.jrsys.com.tw 1 Big Risk of Online Shopping You may lost Card Number + Expiration Date + CVV Card Not Present Transaction Trojan, Sniffer,

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012 Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal

More information

A Study on User Access Control Method using Multi-Factor Authentication for EDMS

A Study on User Access Control Method using Multi-Factor Authentication for EDMS , pp.327-334 http://dx.doi.org/10.14257/ijsia.2013.7.6.33 A Study on User Access Control Method using Multi-Factor Authentication for EDMS Keunwang Lee 1* 1 Dept.of Multimedia Science, Chungwoon University

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec

2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec 2-FACTOR AUTHENTICATION FOR MOBILE APPLICATIONS: INTRODUCING DoubleSec TECHNOLOGY WHITEPAPER DSWISS LTD INIT INSTITUTE OF APPLIED INFORMATION TECHNOLOGY JUNE 2010 V1.0 1 Motivation With the increasing

More information

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes

AUTHENTIFIERS. Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes AUTHENTIFIERS Authentify Authentication Factors for Constructing Flexible Multi-Factor Authentication Processes Authentify delivers intuitive and consistent authentication technology for use with smartphones,

More information

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc.

Implementing two-factor authentication: Google s experiences. Cem Paya (cemp@google.com) Information Security Team Google Inc. Implementing two-factor authentication: Google s experiences Cem Paya (cemp@google.com) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal

More information

QR Codes and Other Symbols Seen in Mobile Commerce

QR Codes and Other Symbols Seen in Mobile Commerce QR Codes and Other Symbols Seen in Mobile Commerce This section describes bar code symbols frequently encountered in mobile commerce campaigns. and typical applications for each are listed. One symbology,

More information

Strong Authentication in details

Strong Authentication in details Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS

More information

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Authentication Types. Password-based Authentication. Off-Line Password Guessing Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Contributions to Web Authentication for Untrusted Computers

Contributions to Web Authentication for Untrusted Computers Linköping Studies in Science and Technology Thesis No. 1481 Contributions to Web Authentication for Untrusted Computers by Anna Vapen Submitted to Linköping Institute of Technology at Linköping University

More information

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007

Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007 Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes

More information

How Secure is Authentication?

How Secure is Authentication? FIDO UAF Tutorial How Secure is Authentication? How Secure is Authentication? How Secure is Authentication? Cloud Authentication Password Issues Password might be entered into untrusted App / Web-site

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline

More information

Remote Access Securing Your Employees Out of the Office

Remote Access Securing Your Employees Out of the Office Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication

Confidence in Commerce: Enabling e-banking and online services with two-factor authentication Abstract The combination of online banking s rising popularity and the increasing number of online services offered by financial organizations indicates a bright future for e-banking. However, to maximize

More information

Device-Centric Authentication and WebCrypto

Device-Centric Authentication and WebCrypto Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, balfanz@google.com A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the

More information

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application

More information

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

CA ArcotOTP Versatile Authentication Solution for Mobile Phones PRODUCT SHEET CA ArcotOTP CA ArcotOTP Versatile Authentication Solution for Mobile Phones Overview Consumers have embraced their mobile phones as more than just calling or texting devices. They are demanding

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

Demonstration of Barcodes to QR Codes through Text Using Document Software

Demonstration of Barcodes to QR Codes through Text Using Document Software Demonstration of Barcodes to QR Codes through Text Using Document Software Dr. Neeraj Bhargava 1, Anchal kumawat 2, Dr. Ritu Bhargava 3 Associate Professor, Department of Computer Science, School of Engineering

More information

One Time Password Generation for Multifactor Authentication using Graphical Password

One Time Password Generation for Multifactor Authentication using Graphical Password One Time Password Generation for Multifactor Authentication using Graphical Password Nilesh B. Khankari 1, Prof. G.V. Kale 2 1,2 Department of Computer Engineering, Pune Institute of Computer Technology,

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Second Level Authentication Using QR Codes

Second Level Authentication Using QR Codes International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 5, Number 2 (2013), pp. 43-50 International Research Publication House http://www.irphouse.com Second Level Authentication

More information

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Biometric Authentication Platform for a Safe, Secure, and Convenient Society 472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.

More information

Crypho Security Whitepaper

Crypho Security Whitepaper Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption

More information

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.

International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015. Android Based E-Voting. Harshad Velapure, Saurabh Rai, Saransh Sharma, Preetam Naiknavre, Pranali Jadhav, Kalyan Bamane Department of Information Technology, D. Y. Patil College of Engineering, Akurdi,

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

How Secure is Authentication?

How Secure is Authentication? U2F & UAF Tutorial How Secure is Authentication? 2014 1.2bn? 2013 397m Dec. 2013 145m Oct. 2013 130m May 2013 22m April 2013 50m March 2013 50m Cloud Authentication Password Issues Password might be entered

More information

Authentication Levels. White Paper April 23, 2014

Authentication Levels. White Paper April 23, 2014 Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

ViSolve Open Source Solutions

ViSolve Open Source Solutions ViSolve Open Source Solutions Best-In-Class Authentication and Authorization Solutions & Services ViSolve Inc. ViSolve Securing Digital Assets Contents Security Overview Security Concerns Security Needs

More information

An Implementation of a High Capacity 2D Barcode

An Implementation of a High Capacity 2D Barcode An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

An Enhanced Countermeasure Technique for Deceptive Phishing Attack An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science

More information

Cryptography and Key Management Basics

Cryptography and Key Management Basics Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management

More information

Infra-estruturas e dispositivos para a protecção integral segura de dados na Nuvem. Manuel Eduardo Correia CRACS/INESC TEC DCC/FCUP

Infra-estruturas e dispositivos para a protecção integral segura de dados na Nuvem. Manuel Eduardo Correia CRACS/INESC TEC DCC/FCUP Infra-estruturas e dispositivos para a protecção integral segura de dados na Nuvem Manuel Eduardo Correia CRACS/INESC TEC DCC/FCUP Virtualization Risks How secure is my data in a virtualized world? APP

More information

SENSE Security overview 2014

SENSE Security overview 2014 SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2

More information

Browser Enhancements to Support SSL/TLS Session-Aware User Authentication

Browser Enhancements to Support SSL/TLS Session-Aware User Authentication Browser Enhancements to Support SSL/TLS Session-Aware User Authentication Rolf Oppliger 1, Ralf Hauser 2, and David Basin 3 1 esecurity Technologies Rolf Oppliger Beethovenstrasse 10, CH-3073 Gümligen,

More information

OCRA Validation Server Profile

OCRA Validation Server Profile OCRA Validation Server Profile Version 1.0 Feb. 22, 2013 Page 1 of 18 1 Overview This document defines the technical requirements for compliance with an OCRA Validation Server profile for OATH Certification.

More information

How Secure is your Authentication Technology?

How Secure is your Authentication Technology? How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any

More information

TABLE OF CONTENTS. Vendor Registration... 2. Usage of Digital Signature Certificate... 3

TABLE OF CONTENTS. Vendor Registration... 2. Usage of Digital Signature Certificate... 3 TABLE OF CONTENTS Frequently Asked Questions (FAQ) on Vendor Registration... 2 Usage of Digital Signature Certificate... 3 What is an etoken?. 4 What is stored in etoken? How to install the etoken drivers?

More information

Securing corporate assets with two factor authentication

Securing corporate assets with two factor authentication WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for

More information

Strong Authentication for Secure VPN Access

Strong Authentication for Secure VPN Access Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Copyright 2005-2007 MyPW LLC.

Copyright 2005-2007 MyPW LLC. Simple & Secure Authentication It's common knowledge that most people use the same or similar passwords wherever they have an online account. Because of this, it can only take one security breach for Identity

More information

YubiKey Integration for Full Disk Encryption

YubiKey Integration for Full Disk Encryption YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns

Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide

RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

How CA Arcot Solutions Protect Against Internet Threats

How CA Arcot Solutions Protect Against Internet Threats TECHNOLOGY BRIEF How CA Arcot Solutions Protect Against Internet Threats How CA Arcot Solutions Protect Against Internet Threats we can table of contents executive summary 3 SECTION 1: CA ArcotID Security

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic

More information

FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II

FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA. Year 2015 Issued on December 11, 2015 Part II 1 of 11 FEDERAL LAW GAZETTE FOR THE REPUBLIC OF AUSTRIA Year 2015 Issued on December 11, 2015 Part II 410th Regulation: Cash Register Security Regulation, [RKSV] 410th Regulation by the Federal Minister

More information

E-Book Security Assessment: NuvoMedia Rocket ebook TM

E-Book Security Assessment: NuvoMedia Rocket ebook TM E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La

More information

TrustKey Tool User Manual

TrustKey Tool User Manual TrustKey Tool User Manual 1 Table of Contents 1 Introduction... 5 2 TrustKey Product...6 2.1 TrustKey Tool... 6 2.2 TrustKey function modules...7 2.3 TrustKey using environment...7 3 TrustKey Tool Installation...

More information

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1 Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can

More information

Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah

Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Journal of mathematics and computer science 10 (2014), 189-198 Attendance Checking System Using Quick Response Code for Students at the University of Sulaimaniyah Miran Hikmat Mohammed Baban Computer Dept.

More information

Implementing Identity Provider on Mobile Phone

Implementing Identity Provider on Mobile Phone Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,

More information

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies

More information

IBM Tivoli Security using Two-Factor Authentication against PHISHING

IBM Tivoli Security using Two-Factor Authentication against PHISHING IBM Tivoli Security using Two-Factor Authentication against PHISHING IBM Tivoli Security IBM Tivoli Security provides an integrated family of security products that provide a comprehensive and scalable

More information

Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13)

Public Key Cryptography in Practice. c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) Public Key Cryptography in Practice c Eli Biham - May 3, 2005 372 Public Key Cryptography in Practice (13) How Cryptography is Used in Applications The main drawback of public key cryptography is the inherent

More information

Application-Specific Biometric Templates

Application-Specific Biometric Templates Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies

More information

Two-Factor Authentication Making Sense of all the Options

Two-Factor Authentication Making Sense of all the Options Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations

More information

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd Stop Identity Theft with Transparent Two-Factor Authentication e-lock Corporation Sdn Bhd December 2009 Table Of Content Table Of Content... 2 Executive Summary... 3 1. Introduction... 4 1.1 The Issue

More information

Security Levels for Web Authentication Using Mobile Phones

Security Levels for Web Authentication Using Mobile Phones Security Levels for Web Authentication Using Mobile Phones Anna Vapen and Nahid Shahmehri Department of Computer and Information Science, Linköping University, SE-58183 Linköping, Sweden {anna.vapen,nahid.shahmehri}@liu.se

More information