Two-Factor Authentication in the PCI DSS Standard
Oct12

Two-Factor Authentication in the PCI DSS Standard

The use of payment cards for the modern man has long been commonplace. But we do not always think about how extensive and complex is the work that was done by the companies which provide such services, how many diverse requirements they complied in order to give us the possibility simply to insert the card into the slot of the ATM and get our money or book the room in the internet before the vacation trip. Meanwhile, getting the right...

Read More
Selfie Based Authentication in Banking System:  “Latest Fad” or Increased Protection Reliability?
Sep25

Selfie Based Authentication in Banking System: “Latest Fad” or Increased Protection Reliability?

It is no secret that for a long time now MasterCard has been working on solving the problem of authentication in the banking system and testing an application that would use traditional two-factor authentication to authenticate customers and authorize online purchases based on the face recognition technology and not numerical codes. In other words, to be able to pay with a credit card online, the card holder would have to take a...

Read More
Ideal Authentication
Feb07

Ideal Authentication

Creativity is the art of compromise. One gifted artist may never receive recognition during his lifetime and die penniless (Vincent Van Gogh). Another one may mass-produce a painting a day to order and bask in his glory (Boris Kustodiev). Time was the final judge as to the talent and merit of these two artists and their works, but it happened only after they died. The procedure of authenticity verification is a kind of art, too. For a...

Read More
How to Make Authentication Simple and Secure
Jan30

How to Make Authentication Simple and Secure

The Rothschild brothers, who grew rich making profits on the results of the Battle of Waterloo, used to say: “He who owns information owns the world”. The only thing to specify here is who the information belongs to: yourself or somebody else. All throughout its history, mankind has been involved in authentication technique development, from making call signals imitating birds’ sounds and manual ciphering to logging into a system via...

Read More