{"id":1047,"date":"2015-12-29T13:17:54","date_gmt":"2015-12-29T10:17:54","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=1047"},"modified":"2019-06-07T13:46:34","modified_gmt":"2019-06-07T10:46:34","slug":"mobile-authentication-pros-and-cons","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/mobile-authentication-pros-and-cons\/","title":{"rendered":"Mobile Authentication Pros and Cons"},"content":{"rendered":"<p>The popularity of mobile devices increases every day. Smartphones, tablet computers, smart watches &#8211; today these lightweight portable \u2018mini-computers\u2019 are sold better than traditional desktops and laptops.<\/p>\n<p>This trend is set by the rhythm of modern life, full of flights and journeys &#8211; often on the other end of the world. Today, a lot of people don\u2019t work in the traditional offices. They can work remotely in comfortable conditions \u2013 either at home or during the journey. A small, lightweight mobile device is convenient to be kept within reach of the hand.<\/p>\n<p>In this situation, there is an urgent need in reliable authentication methods to access personal and especially work-related accounts. Thus, the significance of mobile authentication cannot be overestimated.<\/p>\n<p>It is worth noting that the mobile authentication can denote two different things:<\/p>\n<ol>\n<li>User authentication as the owner of the smartphone or tablet.<\/li>\n<li>User authentication in any service that supports two-factor authentication (2FA), using the smartphone as a token &#8211; mobile authenticator.<\/li>\n<\/ol>\n<p>Let us consider the second option in more detail as the more versatile and interesting one.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-765\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart.jpg\" alt=\"One-time password token Protectimus SMART for mobile authentication\" width=\"270\" height=\"480\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart.jpg 288w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-169x300.jpg 169w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/>   <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-766\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-1.jpg\" alt=\"OTP token Protectimus SMART for mobile authentication\" width=\"270\" height=\"480\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-1.jpg 288w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-1-169x300.jpg 169w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/>   <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-767\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-2.jpg\" alt=\"Protectimus SMART OTP token for mobile authentication\" width=\"270\" height=\"480\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-2.jpg 288w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-2-169x300.jpg 169w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/><\/p>\n<p>Two-factor authentication process generally consists of two stages. At first, you enter a common reusable password assigned to you on a particular website. And the system checks the entered combination of symbols with the one stored in its database.<\/p>\n<p>If the first check is successful, there is the second step of user authentication, which finally confirms the right to enter the account. Usually, the system requires the OTP password (one-time password), which can be delivered to the user in different ways.<\/p>\n<p>And it is this very stage, the second stage of 2-factor authentication, the mobile gadgets can provide invaluable help.<\/p>\n<h2>Mobile authentication in 2FA<\/h2>\n<p><strong>1. Getting one-time password by SMS.<\/strong><\/p>\n<p>When logging into a computer or laptop, the user enters the OTP passwords sent in SMS to confirm his identity. <a href=\"https:\/\/www.protectimus.com\/blog\/what-hides-beneath-sms-authentication\/\">SMS authentication<\/a> is considered very comfortable because the user doesn\u2019t have to do anything to get the password. There is no need to go to the bank or post office for additional user authentication \u2013 hardware token. There is even no need to install any special software: the SMS function is originally installed on every phone. The user shouldn\u2019t have anything else but a cell phone, a thing that almost everyone has today.<\/p>\n<p>But as you know, every coin has two sides &#8211; and this authentication method is not an exception. The fact is that mobile communication channels are protected rather weakly and theoretically fraudsters can connect and intercept the OTP password. Besides, the signal quality may be low. This means SMS can &nbsp;be received too late, and the one-time password, valid only for a short time, becomes of no use.<\/p>\n<p><strong>2. The smartphone as a one-time password generator.<\/strong><\/p>\n<p>There are more modern and reliable ways to get the OTP password. For example, a special program that generates one-time passwords may be installed on the smartphone. This turns the device into a full OTP token or mobile authentication. Developers have created several applications of this type, suitable for a variety of mobile operating systems. <a href=\"https:\/\/www.protectimus.com\/\">Protectimus<\/a> also has one &#8211; it is called <a href=\"https:\/\/www.protectimus.com\/protectimus-smart\">Protectimus Smart<\/a>. It can be installed free on <em>Android<\/em> and <em>iOS<\/em> smartphones, as well as on the smart watches <em>Android Wear<\/em>. The software token has a fairly wide range of settings. You can select the length of the generated OTP password or the algorithm of its generation. Besides, it supports the data signature function <a href=\"https:\/\/www.protectimus.com\/blog\/detailed-information-on-data-signing\/\">CWYS<\/a> (Confirm What You See).<\/p>\n<p>However, the mobile authentication can also have a weak point &#8211; imperfect data protection of its mobile operating systems. Moreover, if earlier iOS was considered almost invulnerable to viruses and hacking, today the hackers have reached even the Steve Jobs\u2019 brainchild: experts confirmed the presence of loopholes in iOS protection. As for Android, its vulnerabilities became known long ago.<\/p>\n<p>Despite some shortcomings, the mobile authentication is convenient for users &#8211; primarily because it does not require any additional devices for authentication. It must be acknowledged that the numerous advantages of mobile authentication method offset its shortcomings.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>The popularity of mobile devices increases every day. Smartphones, tablet computers, smart watches &#8211; today these lightweight portable \u2018mini-computers\u2019 are sold better than traditional desktops and laptops. This trend is set by the rhythm of modern life, full of flights and journeys &#8211; often on the other end of the world. Today, a lot of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4478,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[15],"tags":[16,120,10,130,139,99],"class_list":["post-1047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-rd","tag-2fa","tag-multifactor-authentication","tag-otp","tag-sms-authentication","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=1047"}],"version-history":[{"count":10,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1047\/revisions"}],"predecessor-version":[{"id":4479,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/1047\/revisions\/4479"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4478"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=1047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=1047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=1047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}