QRP: An improved secure authentication method using QR codes
|
|
|
- Sheryl Ferguson
- 10 years ago
- Views:
Transcription
1 QRP: An improved secure authentication method using QR codes David Pintor Maestre Universitat Oberta de Catalunya 08018, Barcelona, Spain June 8, 2012 Abstract It seems quite obvious that any online service that aims to be secure nowadays should seriously consider implementing a strong authentication method. This paper presents the design and implementation of QRP, an open source, proof-of-concept authentication system that uses a two-factor authentication by combining a password and a camera-equipped mobile phone, acting as an authentication token. QRP is extremely secure as all the sensitive information stored and transmitted is encrypted, but it is also an easy to use and cost-efficient solution. QRP is portable and can be used securely in untrusted computers. Finally, QRP is able to successfully authenticate even when the phone is offline. Keywords: QR code, two-factor authentication, pincode, open source. 1 Introduction In a modern world where we are able to do almost everything on-line (banking, shopping, communicating, storing and sharing personal information...), it is nowadays a critical matter to be able to access these services in the most secured manner. Indeed, as viruses and cracking methods become more complex and powerful by the day, the available security techniques must improve as well, allowing users to protect their data and communications with the maximum confidence. Some research has been undertaken on the subject of secure authentication: Rif-Pous [5], Young Sil [6], Kuan-Chieh [7], Mukhopadhyay [8] and Starnberger [9] present multiple approaches to this issue, the last four using QR codes and One-Time Passwords as an advisable manner to authenticate. Also, various authors have raised the issue of securely paying online, which is absolutely relevant 1
2 for our work as well, as this is achieved in a very similar way than for securely authenticating. Lee et al. [3] and Maritz [4] describe in their papers different methods to securely effectuate payments. All these approaches consider security as an extremely important point, and for this reason, most of them ([4],[5],[6],[7],[8] and [9]) use a two-factor authentication method in the design of their solution. A two-factor authentication method is composed by two of the three authentication verification methods below: Something the user knows, such a password or a pincode. Something the user has, such a token or a smart card. Something the user is, such a fingerprint or a retinal scan. It seems obvious that the higher the factor, the most secure will be the authentication method. Even though single-factor authentication is still widely used, even for critical services such as electronic banking, this doesn t seem to be a good approach as per the obvious dangers involved. Using multiple authentication methods from the same verification method is not a good approach either: using a password plus the ID number or date of birth (or even the three of them) is still a single-factor authentication method and thus, not secure enough for critical transactions. The aim of this paper is to develop an authentication method using a twofactor authentication: a trusted device (a mobile phone) that will read a QR code and that will act as a token, and a password known by the user. This paper is structured as follows: first, I will give a brief introduction about what are QR codes. Then, I will detail the requirements of the proposed system. Then, I will describe in detail how the system works. In the following section I will explain the computational costs and security considerations and finally, I will describe my conclusions about the system. 2 QR codes In 2002, Clarke et al. were probably one of the first to suggest the usage of camera-based devices as an alternative, more secured authentication method for critical transactions, such as banking operations, and most particularly when connecting from untrusted computers [1]. While QR codes are not explicitly mentioned in that paper, their authors were somehow visionaries: the amount of camera-quipped smartphones around us is increasing so rapidly that mobilebased authentication might become a popular method to authenticate in a short time. 2
3 QR codes (Quick Response codes) were introduced in 1994 by Denso-Wave [2], a Japanese company subsidiary of Toyota. Initially, these codes where conceived as a quick way to keep track of vehicle parts, being nowadays extremely popular in Asian countries like Japan, South Korea, China or Taiwan and becoming more and more popular in western countries by the day. QR codes are two-dimensional bar codes, so they can be read from any direction in 360; can store up to 4,296 alphanumeric characters (or up to 1,817 Japanese kanjis), which is much more than the 20 digits that a traditional bar code can store; have a great deal of resistance to damage, being readable even if they are partially damaged; and they are easy and quick to read with a camera-based device. Its versatility has made them quite popular among some industries, particularly in the advertisement world, where these are today widely used as a way to quickly store an URL by scanning it with a camera-equipped mobile device. On the other hand, QR codes are unfortunately only understood by machines and not by human beings. This means that scanning QR codes may entail some security issues: the user doesn t really know what is behind the QR code, so she might be scanning malicious code without being aware. 3 System requirements A prototype called QRP has been implemented as a proof of concept, meeting the following requirements: (a) Security: On the server side, our application is hosted in an Apache web server. As the communications with the web server need to be secure, a bit secure key and a self-signed SSL certificate have been generated to encrypt all communications, using https and therefore, ensuring that all data sent and received between client and server passes through a secure channel (SSL/TLS). The application is developed in PHP5 and a Postgres9 database is used in the back-end to store some user and transaction information. The database has been configured to be only accessible internally. At a OS level, a Fedora 14 distribution has been chosen as it is a reliable and secure operating system. The iptables firewall has been configured in order to accept only connexions on ports 80/tcp and 443/tcp. The Apache web server has been also configured to automatically redirect any http connexion requests to https, so there is no chance of unsecured communication. On the mobile side, an Android application called QRP Scanner has been developed to authenticate on the server after reading and processing a QR code. 3
4 In order to access the application, a correct password needs to be entered by the user. The password is stored encrypted in the internal storage of the phone, which is not accessible directly by the user or another application (unless if the device has been previously rooted). The application is compatible with Android 2.2 onwards and uses an external application (ZXing) to read the QR codes, so installing this is a requirement before using QRP Scanner. (b) Cost efficiency: Only non proprietary software is used to implement this prototype (Linux, Apache, PHP, Postgres, ZXing, Java) and no other non-free services, such as SMS and similar, are used for this project. (c) Ease of use: Some attention has been put as well in the design of both web/phone applications, implementing a neat, user-friendly and consistent interface in both ends. A one-step authentication method can be achieved when the user s phone is online, improving the system presented by Mukhopadhyay [8], which uses a two-step authentication. In our system, the user is automatically recognised when the communication between the server and the mobile device is taking place. (d) Phone online/offline: A registered user will be able to authenticate using her phone, even when this is not connected to the network, and so, unable to reach the server. To achieve this, the phone will generate a pincode that will be shown to the user and that will need to be input, along with her username, in the website. A more detailed explanation of this process will be given in the next section. Our system improves the work presented by Kuan-Chieh and Wei- Hsun [7], offering to the user the ability to authenticate even when the phone is not web-enabled. (e) Portability: The schema is secure even when authenticating from an untrusted computer, thus improving the system presented by Lee [6]. The user does not need to keep a certificate nor do they need to type anything in the computer, even when entering a pincode if authenticating offline, as a randomlyordered numeric keyboard will be presented to the user in the screen. 4 Authentication system Once the requirements to implement this prototype have been described, we need to explain how the actual authentication will take place. For this, we need to understand first how the registration process would work. Then, the authentication method will be described. (a) Registration: This part is not implemented as the paper is only intended to present an authentication method. The following steps are a suggestion on how to complete the registration process: 4
5 The user would go into the registration section in the QRP web application and would submit her username, password and IMEI number 1 of the phone she intends to use to authenticate. After validating the data entered (correct IMEI, password complex enough, etc.), the server would store this information on the database. Next, the server would generate a private and public pair of keys unique to the user, that would be stored on the server. After this, the user would proceed to download and install the application on her phone. The first time the mobile application is run, the user will need to enter her username and password (the IMEI can be verified by the mobile application) and the credentials (user/password) would be validated against the database through a https request to the application server. If successful, three files would be imported and stored in the user s phone internal storage: the server s public key, the user s private key and a user data file, containing the user s encrypted credentials. The server s public key will be used to decrypt the credentials file. The user s private key will be used to authenticate in the server. (b) Authentication: Due to the need to store transactions and users information, we will have the following two tables in the database: Table transactions Table users Column Type Modifiers imei bigint User s IMEI rn integer not null Random number ts integer not null Timestamp Table 1: Table Transactions Column Type Modifiers username character varying(20) not null Username password character varying(20) Password imei bigint not null User s IMEI Table 2: Table Users 1 The International Mobile Equipment Identity or IMEI is a number, usually unique, to identify GSM, WCDMA, and iden mobile phones, as well as some satellite phones. It is usually found printed inside the battery compartment of the phone. It can also be displayed on the screen of the phone by entering *#06# into the keypad on most phones. Source: Mobile Equipment Identity 5
6 When the authentication page in the web application is opened, a QR code containing a random number rn between 1 and is shown. In the background, a row is created in the transactions table, containing the current timestamp ts and the random number rn. When the user opens the mobile application, she will need to input the password first. It will be verified against the user s encrypted file containing the credentials and if successful, the scanning application will run. The user can now proceed to scan the code from the web application screen. The contents of the QR code will be captured and sent back to our mobile application. Our mobile application will then generate a string containing the captured random number and the IMEI of the phone, that will be encrypted using our private key. Next, the mobile application will check the state of the phone and decide whether we are going to authenticate in online or offline mode. Case 1: Online mode authentication: If the phone detects an active Internet connexion, the steps below are followed (refer to Fig.1): The encrypted string plus the username are sent to the web server via POST through a secured channel (https). This means that the IMEI and random number are encrypted twice, and the username once. The server decrypts the string using the user public key and verifies that a row exists in the transactions table with our random number, updating the row with the IMEI of the user. The server checks then that the IMEI is correct and assigned to an user as per the users table. In case of success, the transaction row will be deleted and the user authenticated. A PHP session is created for the user, being destroyed when the user logs off or when the browser is closed. 6
7 Figure 1: Online authentication diagram Case 2: Offline mode authentication: If the phone detects that the Internet cannot be accessed, the steps below are followed (refer to Fig. 2): Using an internal algorithm, a unique six-digit number is derived from the encrypted string. This number is the pincode that the user will need to input in the authentication screen within the web application, along with her username. The pincode is entered through a screen keyboard, in order to avoid keyloggers. The server receives the username and pincode, recreates the pincode using the user s private key, the random number shown and the user s IMEI, the last stored in the users table. The timestamp is also checked, rejecting the authentication if the random number was generated more than 5 minutes ago. 7
8 If the pincode matches, the transaction row is deleted and the user authenticated. Once again, a PHP session is created for the user. Figure 2: Offline authentication diagram 5 Computational costs and security considerations In terms of performance, the web application has been tested in an average performance laptop (Intel Pentium T Ghz processor, 4MB RAM) and the mobile application in a average-high performance mobile phone (1.2GHz Dual Core processor, 837MB RAM). No performance issues have been detected with this configuration. The client configuration is not relevant and just requires 8
9 Javascript enabled. In terms of security, and following the described strategy to achieve authentication, the system would be robust and secure, and very hard for a malicious user to get illegitimate access: A man-in-the-middle attack would never succeed as all the communications between the phone and server are always encrypted. Repeating or copying a username s pincode would be of no use as it expires as soon as the user authenticates. Getting access to a phone with malicious intentions would mean that the person would need to know the password to access the mobile application, as the credentials file is not easily accessible and it is encrypted. Only in the eventuality that the thief would know how to access the phone internal storage and how to decrypt the credentials file with the server s public key, she would then be able to open the application and unlawfully authenticate. This set of conditions is obviously very unlikely and the owner would probably have had time by then to deactivate her account or to generate another personal key pair, becoming the one in the misplaced phone automatically invalid. A phishing attack on the mobile phone, by replacing the application by another with the same usage, would mean that the password could be recovered. However, without the certificates it would still not be possible to authenticate. A phishing attack via web would also be unsuccessful, as the only possible data that a malicious user could collect is the username and pincode (and only authenticating in offline mode). Unless if he s able to reproduce the exact QR code with the same random number and within the same 5 minutes, this could not be reproduced. Although reliable and secure, the system presented could still be improved in some ways: In order to access to the mobile application we need to input a personal password. This might be inconvenient for some people as per the small size of a keyboard in the phone. Some possible solutions would be to use a numeric keyboard or to use pattern authentication1. Additionally, the system could even give the user a choice between different authentication methods to use. When using offline authentication, the pincode is generated using the user s private key. In this system, the server must have a copy of the user s private key in order to generate the same pincode. Ideally, we would like to avoid the server having all user s private keys, as if the server gets 9
10 hijacked, the security of the users could be compromised. However, there is no easy way to generate an identical pincode in both ends without the same private key. Using the server s private key would not be advisable either as a registered user could easily supplant anyone else s identity. A possible solution might be managing two different user keys, but this would increase the complexity of the system and it is not so clear if it would be worth it. Another eventual drawback that we might might want to avoid would be having a single point of failure in the server. This should not be really an issue, as in a real-life system the server should be normally configured as a high-availability cluster with a few redundant nodes. 6 Final conclusions Nowadays, a relevant amount of people living in a developed country would have a smart-phone able to take pictures and scan QR codes. The suggested authentication approach is therefore a real possibility in the real world as it makes it more secure than the average authentication method, as it is based in a two-factor authentication method and not in the usual username and password approach. The fact that the user does not need to carry any additional device (as she would carry the phone anyway) makes it even easier and more comfortable, and the risks of misplacing the token will be reduced: seeing the cost of an average smart-phone and the sensitive information stored on them (contacts, pictures...) we can be sure that most users would look after it. At the same time, security has become an extremely important matter in our digital society and therefore, two-factor authentication methods should be seriously considered by services that store sensitive information, as they offer a much higher level of security that is definitely worth a few seconds of the user s authentication time. QR-based authentication offers a very secure and fast authentication method that must be considered to securely and easily authenticate. Indeed, some blue chip companies seem to be testing it already 2. 2 After Charlie Osborne s article in ZDNet: Google s QR code log in experiment concluded, 10
11 References [1] Clarke, Dwaine; Gassend, Blaise; Kotwal, Thomas; Burnside, Matt; van Dijk, Marten: The Untrusted Computer Problem and Camera-Based Authentication. Lecture Notes in Computer Science, 2002, Volume 2414, Pervasive Computing, Pages , Jan [2] Denso-wave: [3] Lee, Jaesik; Cho, Chang-Hyun; Jun, Moon-Seog: Secure quick response-payment(qr- Pay) system using mobile device. Advanced Communication Technology (ICACT), th International Conference, Feb [4] Maritz, Adrian: Secure Payments Using Mobile Device. Proyect ispaza, University of Cape Town (South Africa). [5] Rifà-Pous, Helena : A Secure Mobile-Based Authentication System for e-banking. On the Move to Meaningful Internet Systems: OTM Confederated International Conferences, CoopIS, DOA, IS, and ODBASE, Nov [6] Young Sil Lee; Nack Hyun Kim; Hyotaek Lim; HeungKuk Jo; Hoon Jae Lee: Online Banking Authentication System using Mobile-OTP with QR-code. Computer Sciences and Convergence Information Technology (ICCIT), th International Conference, Nov.-Dec [7] Kuan-Chieh Liao; Wei-Hsun Lee: A Novel User Authentication Scheme Based on QR- Code. Journal of Networks, Vol 5, No 8 (2010), , Aug [8] Mukhopadhyay, Syamantak; Argles, David: An Anti-Phishing mechanism for Single Sign-On based on QR-Code. The First International Workshop on Application of Artificial Intelligence for Management (AAIEM 2011) in London (UK), June [9] Starnberger, G.; Froihofer, L.; Goeschka, K.M.: QR-TAN: Secure Mobile Transaction Authentication. Availability, Reliability and Security, ARES 09. International Conference, Mar [10] Felt, Adrienne Porter; Wagner, David: Phishing on Mobile Devices. Workshop on Web 2.0 Security and Privacy (W2SP), [11] DeFigueiredo, Dimitri: The Case for Mobile Two-Factor Authentication. Security & Privacy, IEEE, Sept.-Oct [12] Shamir, Adi: How to Share a Secret. Magazine Communications of the ACM CACM Homepage archive Volume 22 Issue 11, Nov [13] Jun-Chou Chuang; Yu-Chen Hu; Hsien-Ju Ko: A Novel Secret Sharing Technique Using QR Code. International Journal of Image Processing (IJIP), Dec [14] Rouillard, José: Contextual QR codes. Computing in the Global Information Technology, ICCGI 08. The Third International Multi-Conference, July-Aug
Secure Data Transmission Technique for iphone using Quick Response (QR) Code
Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding MI-BEST-2015, Vol. 1, 53-62 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-10-7 MI-BEST 2015
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM
QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM Jakub Nantl 1 1 Silesian University in Opava, School of Business Administration in Karvina, Univerzitní nám. 1934/3, 733 40 Karviná Email:
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
An Anti-Phishing mechanism for Single Sign-On based on QR-Code
An Anti-Phishing mechanism for Single Sign-On based on QR-Code Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David
CLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
PINsafe Multifactor Authentication Solution. Technical White Paper
PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Electronic Questionnaires for Investigations Processing (e-qip)
January 2016 Electronic Questionnaires for Investigations Processing (e-qip) Login Instructions for first-time users OR users that have had their accounts reset Step 1 Access the e-qip Login screen at
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL. http://www.protonet.co.za/
Proto Balance SSL TLS Off-Loading, Load Balancing http://www.protonet.co.za/ User Manual - SSL Copyright c 2003-2010 Shine The Way 238 CC. All rights reserved. March 13, 2010 Contents 1. Introduction........................................................................
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
Microsoft.NET Passport, a solution of single sign on
Microsoft.NET Passport, a solution of single sign on Zheng Liu Department of Computer Science University of Auckland [email protected] Abstract: As the World Wide Web grows rapidly, accessing web-based
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
DreamFactory Security Whitepaper Customer Information about Privacy and Security
DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
DataTrust Backup Software. Whitepaper Data Security. Version 6.8
Version 6.8 Table of Contents 1 Introduction... 3 2 DataTrust Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...
SecurEnvoy Security Server. SecurMail Solutions Guide
SecurEnvoy Security Server SecurMail Solutions Guide SecurMail Solutions Guide 2009 SecurEnvoy Printed: 2009 in United Kingdom Publisher SecurEnvoy Publishing Managing Editor SecurEnvoy Training Dept Technical
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Two Factor Authentication - USER GUIDE
Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.
Using GhostPorts Multi-Factor Authentication
Using GhostPorts Multi-Factor Authentication With CloudPassage Halo GhostPorts is a powerful multi-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans.
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
STRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
Implementing two-factor authentication: Google s experiences. Cem Paya ([email protected]) Information Security Team Google Inc.
Implementing two-factor authentication: Google s experiences Cem Paya ([email protected]) Information Security Team Google Inc. Google services and personalization Identity management at Google 1. Internal
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones
Design and Analysis of Methods for Signing Electronic Documents Using Mobile Phones Pramote Kuacharoen School of Applied Statistics National Institute of Development Administration 118 Serithai Rd. Bangkapi,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Architecture of Enterprise Applications III Single Sign-On
Architecture of Enterprise Applications III Single Sign-On Haopeng Chen REliable, INtelligent and Scalable Systems Group (REINS) Shanghai Jiao Tong University Shanghai, China e-mail: [email protected]
Two-Factor Authentication: Guide to FEXCO CFX SMS/APP Verification
Guaranteeing you the Highest Levels of Security Online At FEXCO CFX, we are dedicated to ensuring that our clients enjoy the highest standards of security. In order to combat the risk of online fraud and
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
Keystroke Encryption Technology Explained
Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION Kalpesh Adhatrao 1, Aditya Gaykar 2, Rohit Jha 3, Vipul Honrao 4 Department of Computer Engineering, Fr. C.R.I.T., Vashi,
Single Sign-On for the Internet: A Security Story. Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected]
Single Sign-On for the Internet: A Security Story Eugene Tsyrklevich [email protected] Vlad Tsyrklevich [email protected] BlackHat USA, Las Vegas 2007 Introduction With the explosion of Web 2.0 technology,
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
An Innovative Two Factor Authentication Method: The QRLogin System
An Innovative Two Factor Authentication Method: The QRLogin System Soonduck Yoo*, Seung-jung Shin and Dae-hyun Ryu Dept. of IT, University of Hansei, 604-5 Dangjung-dong Gunpo city, Gyeonggi do, Korea,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Multi Factor Authentication API
GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Data Sheet. NCP Secure Enterprise Management. Next Generation Network Access Technology
Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Enables easy rollout and operation of secure remote access infrastructures Central creation of client configuration
AN ANDROID APPLICATION FOR ISSUING AND VERIFYING COMMUTER TRAIN TICKET THROUGH GPS USING CLOUD
BEST: International Journal of Management, Information Technology and Engineering (BEST: IJMITE) ISSN 2348-0513 Vol. 2, Issue 3, Mar 2014, 47-52 BEST Journals AN ANDROID APPLICATION FOR ISSUING AND VERIFYING
Scan to FTP Guide. Version 0 ENG
Scan to FTP Guide To find basic information about network and advanced network features of your Brother machine: See the uu Network User's Guide. To find basic information about network scanning features
Getting Started. Business Link. User Name Rules. Hardware/Software Requirements. Password Rules
Getting Started User Name Rules All user names must: Be unique. Be between six and 40 characters in length. Notes: It is recommended that user names consist only of alphanumeric characters (A-Z, 0-9).
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
Computer Systems Security 2013/2014. Single Sign-On. Bruno Maia [email protected]. Pedro Borges [email protected]
Computer Systems Security 2013/2014 Single Sign-On Bruno Maia [email protected] Pedro Borges [email protected] December 13, 2013 Contents 1 Introduction 2 2 Explanation of SSO systems 2 2.1 OpenID.................................
QR-SSO : Towards a QR-Code based Single Sign-On system
QR-SSO : Towards a QR-Code based Single Sign-On system Syamantak Mukhopadhyay School of Electronics and Computer Science University of Southampton Southampton, UK [email protected] David Argles School
Tips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd
Stop Identity Theft with Transparent Two-Factor Authentication e-lock Corporation Sdn Bhd December 2009 Table Of Content Table Of Content... 2 Executive Summary... 3 1. Introduction... 4 1.1 The Issue
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
Advance Technique for Online Payment Security in E-Commerce : Double Verification
Advance Technique for Online Payment Security in E-Commerce : Double Verification Shilpa Research Scholar Shri Krishan Institute of Engineering & Technology, Kurukshetra University Kurukshetra, India [email protected]
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
Connecting Software Connect Bridge - Mobile CRM Android User Manual
Connect Bridge - Mobile CRM Android User Manual Summary This document describes the Android app Mobile CRM, its functionality and features available. The document is intended for end users as user manual
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
E-Book Security Assessment: NuvoMedia Rocket ebook TM
E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System
Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India [email protected],
GLOBAL PAYMENTS AND CASH MANAGEMENT. HSBCnet Application Guide August 2006
GLOBAL PAYMENTS AND CASH MANAGEMENT HSBCnet Application Guide August 2006 HSBCnet Application Guide TABLE OF CONTENT Page Overview 1 Step 1 Verifying the Minimum System Requirements 2 1.1 Operating System
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Spring Hill State Bank Mobile Banking FAQs
Spring Hill State Bank Mobile Banking FAQs What is Mobile Banking? Mobile Banking enables you to access your account information using the Bank online banking website. You must first be enrolled as an
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Ahsay Online Backup. Whitepaper Data Security
Ahsay Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction...3 2 Server Secure, Robust and Reliable...4 2.1 Secure 128-bit SSL communication...4 2.2 Backup data are securely encrypted...4
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Encryption and Digital Signatures
GreenNet CSIR Toolkit Briefing no.3 How to protect privacy, and your identity, online Written by Paul Mobbs for the GreenNet Civil Society Internet Rights Project, 2002. http://www.internetrights.org.uk/
Web Application Attacks and Countermeasures: Case Studies from Financial Systems
Web Application Attacks and Countermeasures: Case Studies from Financial Systems Dr. Michael Liu, CISSP, Senior Application Security Consultant, HSBC Inc Overview Information Security Briefing Web Applications
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Using GhostPorts Two-Factor Authentication
Using GhostPorts Two-Factor Authentication With CloudPassage Halo GhostPorts is a powerful two-factor authentication feature available with the Halo NetSec and Halo Professional subscription plans. GhostPorts
E-Commerce: Designing And Creating An Online Store
E-Commerce: Designing And Creating An Online Store Introduction About Steve Green Ministries Solo Performance Artist for 19 Years. Released over 26 Records, Several Kids Movies, and Books. My History With
Password Manager with 3-Step Authentication System
Password Manager with 3-Step Authentication System Zhelyazko Petrov, Razvan Ragazan University of Westminster, London [email protected], [email protected] Abstract: A big
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Device-based Secure Data Management Scheme in a Smart Home
Int'l Conf. Security and Management SAM'15 231 Device-based Secure Data Management Scheme in a Smart Home Ho-Seok Ryu 1, and Jin Kwak 2 1 ISAA Lab., Department of Computer Engineering, Ajou University,
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Blaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
