VASCO Digipass Family of Authentication Devices Technical White Paper
|
|
|
- Magdalen Britney Bryant
- 9 years ago
- Views:
Transcription
1 VASCO Digipass Family of Authentication Devices Technical White Paper Overview The Digipass Family is the name VASCO uses to describe the family of handheld security devices that VASCO manufactures and markets. The Digipass are security devices (tokens) that were originally developed as an answer to easily compromised static passwords and PIN codes, because: Incorrect authentication is the single largest threat to any computer system User-managed passwords are the single largest cause of incorrect authentication. In this paper we will provide an overview of what you can do with our Digipass family members. You will also learn more about the concept of an authentication device and the specific algorithms used to protect specific areas within your application or environment. Fig. 1 from left to right the Digipass 300, Digipass 500, Digipass 600, Digipass 700 and Digipass 800 Problem Description An expert opinion by Bruce Schneier in Applied Cryptography, 2nd Edition, 1996 states: The worlds most secure algorithm won t help much if the users habitually choose their spouse s names for keys (passwords) or write their keys on little pieces of paper in their wallets. Cheswick & Bellovin wrote in Firewalls and Internet in 1994: No security expert we know of regards passwords as a strong authentication mechanism. One can achieve a significant increase in security by using one-time passwords. Security experts statements confirm that static passwords are not safe. (See left). They also use the term strong authentication. What is strong authentication? We need to split this term into two parts. Authentication means that you verify that people are who they say they are, before you can trust them with your sensitive data and before they can do harm to that data. Strong means preventing people from simulating other users identities. In a face-to-face conversation, your speaking partners can see who you are by running a visual check on your identity. If they want to identify you strongly (e.g. police) they will ask you for your passport or any other positive ID. 1
2 This scenario can not be imported into the remote telecommunications world, where people are communicating without knowing who their conversation partners really are and what they look like. In the telecommunications world a password, pass phrase or PIN code is still often used as the positive identification for a person. Since passwords are static and managed by their owner, he can change it at free will and can choose any password he wants (usually names of family members, pets, birth dates, ). These passwords are easy to compromise. Hackers have several techniques for quickly detecting static passwords (like dictionary attacks, password readers, etc.) which allow them to access your sensitive information. Another risk in the telecommunication world is making sensitive transactions - like money transfers - over a communication line. If these transactions are not strongly protected against attacks from malicious people, they can be easily changed to the benefit of the hacker and it is very hard to trace (post hoc) the identity and location of this hacker. In a Banking or E-commerce environment, security is imperative to guarantee the integrity of the commands and orders issued through public and, by nature, insecure channels. For authentication and electronic transaction problems, VASCO delivers appropriate solutions by means of the Digipass Family. Concept In the Digipass concept we have implemented cures for the weak areas of authentication and data integrity. To avoid the static nature of passwords, we needed a device that delivers dynamic passwords, is highly portable and flexible to integrate into any environment, and in addition, is not expensive. In other words: we needed to implement strong security with a maximum of flexibility and a minimal total cost of ownership. We considered security to be a trade-off between: security, flexibility, price and ease of use and therefore developed the Digipass. What is a Digipass device? A Digipass device is a handheld device that calculates dynamic passwords, also known as One-Time Passwords (OTP), for the positive authentication of a user on a remote system. Moreover, it is able to calculate digital signatures, known as electronic signatures or Message Authentication Codes (MAC), to protect electronic transactions and guarantee the integrity of the contents of these transactions. The calculation of these OTP s and MAC s is based upon the publicly available Data Encryption Standard (DES) algorithm. The DES algorithm has proven itself to be strong in numerous fields of application by renowned institutions and industry leading companies. To provide an even higher level of security the Triple DES algorithm is supported as well. Security has three factors: 1. What you have (the Digipass device itself) 2. What you know (the PIN code to activate the Digipass) 3. Who you are (biometrics, voice, retina scan, fingerprint, ) Since the biometrics industry today is still not completely developed and products in this area tend to be extremely expensive, we based the Digipass Family on the first two factors of the list. In order to enter a remote system or to digitally sign data you need: The hardware device itself (factor 1): if you do not physically have the device, you will never be able to log on to the system. The PIN code for the device (factor 2), to be able to use the applications stored within it. 2
3 Both these factors help to make sure that a physical person is authenticating or signing instead of a computer or another device. These factors also enable extremely high portability: you can use a Digipass Anytime, Anywhere and Anyhow. Technical description In this technical description, we will elaborate on the three currently most frequently used implementation modes of the DES algorithm in conjunction with the Digipass Family. These modes are the Response Only mode, the Challenge/Response mode and the Digital Signature mode. First we will start with the complete application cycle of the Digipass device usage. Hardware device 12A34F56 Digipass Initialisation File Secrets Encrypted YOU Customer ID CINIT_A.DGP *.DPX Network Server Fig 2. General concept for the Digipass Family hardware device usage The above illustration shows you step-by-step the global flow on device usage. In the first step the devices are initialized with their unique set of secrets and keys per device. These secrets are stored in an encrypted way on a diskette that is sent to the application owner (e.g. the IT manager in a company or the security department of a bank). These floppy disks are a way of safely transporting the Digipass secrets to the host computer. 3
4 The files on the floppy disks will be used to read all the necessary secrets and other data from the delivered Digipass devices into a database. Then the application owner will assign those Digipass secrets to the end-users. This assignment is based on the serial number of the Digipass device and the name of the end-user. The Digipass is then shipped to the end-user together with a manual and the protected PIN-code on a secure PIN-mailer. Once the device is received by the end-user, he can start using it. To use a Digipass, you need a connection to the host (server) computer that knows the secrets of the end-user s Digipass. Every time the user sends a dynamic password or digital signature to the host computer, the computer will retrieve all the necessary information from the database and will check the validity of the password or signature. After the host has checked the validity of the dynamic password or signature, it will notify the end-user of the correctness or incorrectness of the validity check. Since we now know the overall principle of device usage, we can explain the three most frequently used implementation modes of the (Triple) DES algorithm in combination with Digipass hardware security devices. 1. Response Only Mode As the term indicates the Response Only mode on a Digipass delivers a dynamic password (OTP) upon request by the user. The following illustration describes the Digipass 300 usage flow. Digipass user Press the triangle button for activation The device asks the user for the PIN code The user enters the PIN code (X digits) The device calculates the dynamic password (OTP) and displays the result on the display. The user enters the OTP into an application Application Verification Host or Server Fig 3. Usage for Digipass 300 (Response Only Mode) As you can see in the example for the Digipass 300 above, the interface for the device is intuitive. How is a Response Only dynamic password calculated? 4
5 Inside the Digipass device a DES engine takes care of the calculation of the passwords and signatures. DES uses secret keys or seed values (DES keys, offset, initial vectors, etc.) to perform this encryption. All these secrets are thus stored inside the Digipass itself and saved into the Digipass at initialization. By consequence they are never exposed while using a Digipass. Seed values Time and/or event (3-)DES ALGORITHM OTP Fig 4. OTP calculation in Response Only mode, time and/or event based. Upon usage the Digipass will start calculating OTP s on request. This happens as shown in the above illustration: the Digipass uses the preinitialized seed value and the input from time and event to generate the dynamic password. The device itself generates the time or event inputs for the DES algorithm. When a time -based Response Only mode is chosen, the time is internally derived from the Real Time Clock (RTC) which can not be altered from the outside of the device. In the case of an Event Response Only mode, the event (= a number that is incremented at every new calculation of an OTP) is generated by the device itself to prevent untrustworthy third party inputs. These two inputs (time and event) are the key features for the creation of dynamic passwords. Without them the result of the DES calculation would always be the same and therefore unsafe. In the Response Only mode, time and event can be combined or can exist separately but you need at least one of them to calculate a dynamic password. Once a dynamic password is calculated by the Digipass, the password needs to be verified for correctness. This typically happens on a host machine. Since DES by nature is a symmetric algorithm (secret information and DES keys need to be known by the verifying unit as well) the DES keys and other secret information needs to be present on the host machine. The secrets are imported into a database system by an application. Such an application can be tailor-made (e.g. one of the VASCO Partner applications) or can be available off-the-shelf (e.g. Shiva Access Manager). Both these types of verification applications have implemented the verification functions VASCO delivers in the form of the AAT (Advanced Authentication Technology) Libraries. Please refer to the Technical White Paper on the AAT Libraries for more information. 5
6 2. Challenge/Response Mode This mode is also used for authentication purposes but works in a different way. The Challenge/Response mode demands an extra user input for the calculation of a dynamic password. This extra user input is called the challenge. If we put this theory into practice, we see that the challenge is generated at random at every logon trial by the application running on the host computer, and is then sent over the communication line to the user. The user puts the challenge into the Digipass and obtains a dynamic password (a number of x digits) that is based, among other parameters, on the challenge delivered by the application on the host system (server). The result, the dynamic password, is now based on more than the user s input alone. It needs extra information coming from a third party. In the next illustration you will see a representation of the Challenge/Response mode usage on a Digipass 300. Digipass user Press the triangle button for activation The device asks the user for the PIN code The user enters the PIN code (X digits) User enters the challenge into the Digipass The device calculates the dynamic password (OTP) based on the challenge and displays the result on the display. Challenge (x digits) The user enters the response into the application Application Verification Host or Server Fig 5. Usage of the Digipass 300 (Challenge/Response Mode) The difference with the Response Only mode is that there is now an extra user input into the device. 6
7 The final result remains that a dynamic password is generated, but based on a different set of parameters, enabling a two-way communication between the Digipass user and the host application. Seed values Time and/or event (3-)DES ALGORITHM Challenge OTP Fig 6. OTP calculation in Challenge/Response mode, time or event based In the same way as in the Response Only mode the Digipass will calculate dynamic passwords as described in the above illustration. Digipass devices are pre-initialized in the same way as before, but now run an application that needs input (the challenge) coming from outside the device (the application/verification server). If time or event inputs are used they are generated in exactly the same way as they are for Response Only devices. For the verification of the Challenge/Response dynamic passwords the treatment on the server side is a little different. The verification units are the same but the server memorises the challenge that he sent to the individual user and verifies whether the response that is given by the user matches the challenge that was issued for this user. For more information on the implementation and integration of VASCO s AAT Libraries, please refer to the Technical White Paper on the AAT Libraries. 3. Digital Signature Mode The Digital Signature mode also known as Electronic Signature or Message Authentication Code (MAC) is not only an authentication mode (people are who they say they are) but is also as a way to secure the contents of an electronic transaction. The Digipass can calculate a signature based upon a number of data fields created by the end-user and not by the server software. If someone wants to protect or sign a wire money transfer, he could protect data fields like, for example, the bank account number of the originator, the bank account number of the recipient and the amount of money he wants to transfer. The data fields, together with the signature, are then sent to the application/verification server to be checked for the validity of the digital signature. The digital signature is not an authentication mode as such; it protects the contents of the transaction by generating a MAC 7
8 (Message Authentication Code) on it. This me ans that if somebody is eavesdropping on the communication line and detects an electronic transaction, he cannot alter it in his favor. Digital signatures guarantee the integrity of the transaction that is sent. On the application/verification server the signature is checked for the right person. This means that the server can check whether the rightful owner of the Digipass performed the calculation of the signature, and the data integrity of the transaction. In this manner the transaction is highly secured and the bank or financial institution can execute the transaction without worrying about safety issues. In the next illustration you will find a visual representation of the device usage for digital signatures. Press the triangle button for activation The device asks the user for the PIN code The user enters the PIN code (X digits) User enters data field #1 into the Digipass User enters data field #2 into the Digipass More data field entry (up to 8) User enters the final data field into the Digipass The device calculates the dynamic password based on the data fields and displays the result The user enters the data fields and the signature into the application Application Verification Host or Server Fig 7. Usage of the Digipass 300 (Digital Signature Mode) The data fields for the digital signature calculation are user and/or application defined: the user decides what the values for the data fields are going to be and that the application provides the user with the necessary fields to input the values 8
9 and the digital signature. Once the values are known, the signature can be calculated and the transaction can be sent. On the host side, the digital signature will be validated and a message stating the validity of the signature and the execution of the transaction will be sent to the user. System Components All me mbers of the Digipass Family (Digipass 300, 500, 600 and 700). Possible usage of the Advanced Authentication Libraries for integration into applications. (For more information please refer to VASCO s Technical White Paper on AAT Libraries ). Possible PKA library usage for integration into a PKI environment (For more information please refer to VASCO s Technical White Paper on PKA ) System Requirements Digipass security devices (hardware tokens) do not require any specific hardware or software platform since they only interact with human beings. Integration libraries (AAT, PKA) can be used on practically any platform because of the platform independence of these VASCO products. Shiva Access Manager for remote access runs on a Windows NT platform. For more technical information on the above-mentioned products, please refer to the corresponding technical white papers of these products or contact VASCO. For more information VASCO U.S. Headquarters at: or your information requests to [email protected] VASCO Europe Headquarters at: or your information requests to [email protected] VASCO Europe Headquarters at: or your information requests to [email protected] Or visit our corporate web site on: VASCO Data Security, a US corporation, helps organizations rapidly and effectively secure their e-business and e-commerce applications and services. The company s family of Digipass and SnareWorks products offers end-to-end security through PKI, strong user authentication, true Single Sign-On, Web access control, enterprise management, and encryption solutions that also sharply reduce the time and effort required to deploy and manage them. The company has more than 100 employees in headquarters and development centers in the US, Europe, and Asia. A bout VASCO 9
Secure Web Access Solution
Secure Web Access Solution I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. E-CODE SECURE WEB ACCESS SOLUTION... 3 OVERVIEW... 3 PKI SECURE WEB ACCESS... 4 Description...
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
MIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Application for iphone and ipad irietumu HD with integrated Digipass Mobile
Application for iphone and ipad irietumu HD with integrated Digipass Mobile Rietumu Bank launches a new application for mobile devices iphone and ipad irietumu HD, which allows Clients to work with the
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Identikey Server Getting Started Guide 3.1
Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
Cryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics [email protected] DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers
Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have"
Tranform Multi-Factor Authentication from "Something You Have" to "Something You Already Have" DIGIPASS Embedded Solutions White Paper DIGIPASS Embedded Solutions White Paper Page 1 of 14 2009 VASCO Data
Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security
Secure your business DIGIPASS BY VASCO The world s leading software company specializing in Internet Security Secure Your Business A secure and flexible work environment Today s workforce needs to use
Securing corporate assets with two factor authentication
WHITEPAPER Securing corporate assets with two factor authentication Published July 2012 Contents Introduction Why static passwords are insufficient Introducing two-factor authentication Form Factors for
DIGIPASS Authentication for SonicWALL SSL-VPN
DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Multi-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Strong Authentication in details
Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
Enhancing Web Application Security
Enhancing Web Application Security Using Another Authentication Factor Karen Lu and Asad Ali Gemalto, Inc. Technology & Innovations Austin, TX, USA Overview Introduction Current Statet Smart Cards Two-Factor
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
EBA STRONG AUTHENTICATION REQUIREMENTS
EBA STRONG AUTHENTICATION REQUIREMENTS FOR INTERNET PAYMENTS IN EU TO BE IMPLEMENTED BY AUGUST 1 ST 2015 LEGAL WHITEPAPER What are the strong authentication requirements under EBA Guidelines which European
DIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
2 factor + 2. Authentication. way
2 factor + 2 way Authentication Deepnet DualShield is an open, unified authentication platform that enables multi-factor strong authentication across diverse applications, users and security tokens. 5
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Two-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
How Secure is your Authentication Technology?
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
ADVANCE AUTHENTICATION TECHNIQUES
ADVANCE AUTHENTICATION TECHNIQUES Introduction 1. Computer systems and the information they store and process are valuable resources which need to be protected. With the current trend toward networking,
XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
Ken Scudder Senior Director Business Development & Strategic Alliances XYPRO Technology Talbot A. Harty CEO DeviceAuthority XYPRO Technology Brief: Stronger User Security with Device-centric Authentication
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
Guide to Evaluating Multi-Factor Authentication Solutions
Guide to Evaluating Multi-Factor Authentication Solutions PhoneFactor, Inc. 7301 West 129th Street Overland Park, KS 66213 1-877-No-Token / 1-877-668-6536 www.phonefactor.com Guide to Evaluating Multi-Factor
Security Token User Guide
TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 FUNCTIONS OF THE TOKEN... 3 1.2 SECURITY FEATURES OF THE TOKENS... 3 1.3 TOKEN INTERFACE... 3 1.4 VASCO TOKEN REPLACEMENT... 4 1.5 DEFINITIONS AND ACRONYMS...
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of
Securing end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
Why SMS for 2FA? MessageMedia Industry Intelligence
Why SMS for 2FA? MessageMedia Industry Intelligence MessageMedia Industry Intelligence Why SMS for 2FA? ii Contents OTP Authentication Methods...2 Hard Tokens for OTP...3 App-based Tokens for OTP...4 Email
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
Strong Security in Multiple Server Environments
White Paper Strong Security in Multiple Server Environments VeriSign OnSite for Server IDs Contents 1. Introduction 1 2. Security Solutions: The Digital ID System 2 2.1. What Is a Digital ID? 2 2.2 How
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
White Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
CS 392/681 - Computer Security
CS 392/681 - Computer Security Module 3 Key Exchange Algorithms Nasir Memon Polytechnic University Course Issues HW 3 assigned. Any lab or course issues? Midterm in three weeks. 8/30/04 Module 3 - Key
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
A Security Survey of Strong Authentication Technologies
A Security Survey of Strong Authentication Technologies WHITEPAPER Contents Introduction... 1 Authentication Methods... 2 Classes of Attacks on Authentication Mechanisms... 5 Security Analysis of Authentication
DIGIPASS Pack for Citrix on WI 4.5 does not detect a login attempt. Creation date: 28/02/2008 Last Review: 04/03/2008 Revision number: 2
DIGIPASS Pack for Citrix on WI 4.5 does not detect a login attempt. Creation date: 28/02/2008 Last Review: 04/03/2008 Revision number: 2 Document type: How To Security status: EXTERNAL Summary This document
Multifactor authentication systems Jiří Sobotka, Radek Doležel
Multifactor authentication systems Jiří Sobotka, Radek Doležel Fakulta elektrotechniky a komunikačních technologií VUT v Brně Email: [email protected] Fakulta elektrotechniky a komunikačních technologií
CODE SIGNING. Why Developers Need to Digitally Sign Code and Applications. +1-888-690-2424 entrust.com
CODE SIGNING Why Developers Need to Digitally Sign Code and Applications +1-888-690-2424 entrust.com Table of contents Why Code Sign? Page 3 What is Code Signing? Page 4 Verifying Code Authenticity Page
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
INTEGRATION GUIDE. General Radius Config
INTEGRATION GUIDE General Radius Config Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
ViPNet ThinClient 3.3. Quick Start
ViPNet ThinClient 3.3 Quick Start 1991 2014 Infotecs Americas. All rights reserved. Version: 00060-07 34 02 ENU This document is included in the software distribution kit and is subject to the same terms
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06
SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Authentication Levels. White Paper April 23, 2014
Summary White Paper April 23, 2014 This document describes levels of authentication that can be utilized for users known and unknown to gain access to applications and solutions. Summary... 1 Description...
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy
VASCO Data Security International, Inc. DIGIPASS GO-7 FIPS 140-2 Non-Proprietary Cryptographic Module Security Policy Security Level: 2 Version: 1.7 Date: August 12, 2015 Copyright VASCO Data Security
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
Two-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Implementation Guide for protecting
Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
