{"id":254,"date":"2015-01-30T13:01:27","date_gmt":"2015-01-30T10:01:27","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=254"},"modified":"2019-06-12T17:52:53","modified_gmt":"2019-06-12T14:52:53","slug":"how-to-make-authentication-simple-and-secure","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/how-to-make-authentication-simple-and-secure\/","title":{"rendered":"How to Make Authentication Simple and Secure"},"content":{"rendered":"<p>The Rothschild brothers, who grew rich making profits on the results of the Battle of Waterloo, used to say: \u201cHe who owns information owns the world\u201d. The only thing to specify here is who the information belongs to: yourself or somebody else. All throughout its history, mankind has been involved in authentication technique development, from making call signals imitating birds\u2019 sounds and manual ciphering to logging into a system via GPS.<\/p>\n<p>During this entire period of time, the key focus has been the search for a simpler authentication method (one that does not involve compromising a system\u2019s reliability). The problem is that sooner or later all new protection methods grow outdated and obsolete; besides, enterprising fraudsters are no fools \u2013 they may not want to own the world, but they do want to own at least some nude celebrity photos. And, as we know, what one man built up another man can break down. In modern times, the information battlefield is the Internet \u2014 it is the most convenient platform with the largest audience. Authentication methods are growing more complex and sophisticated, too: digest authentication (HTTPS protocol), OpenID, OpenAuth, etc.<\/p>\n<div id=\"attachment_268\" style=\"width: 943px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-268\" class=\"size-full wp-image-268\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/06\/three-authentication-steps.jpg\" alt=\"Three factors of authentication\" width=\"933\" height=\"257\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/06\/three-authentication-steps.jpg 933w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/06\/three-authentication-steps-300x83.jpg 300w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><p id=\"caption-attachment-268\" class=\"wp-caption-text\">Three factors to verify a user: what he knows; what he owns; and what nature gave him at birth.<\/p><\/div>\n<p>At this stage in the society\u2019s development, we have come to a paradoxical conclusion: to make authentication simple, we need to make it more complicated. That is, more complicated for a manufacturer; for a user, things remain as simple as ever. There are three factors that can be used to verify a user: what he knows (a password); what he owns (a card key); and what nature gave him at birth \u2014 his biometric data. The three parameters combined in one system \u2014 what could be simpler?<\/p>\n<p>But, there is also the aspect of cost-effectiveness to be considered. In and of itself, a biometric detector is nothing new; for example, iPhone has the Touch ID technology. But when used together with Apple\u2019s software, the fingerprint scanner will produce an error, which once even led to a recall of an update to iOS 8.0.1. On a user\u2019s level, too, there are occasional problems with the use of a scanner. Besides, biometric technologies are relatively expensive. In terms of reliability, they leave much to be desired, too: a small cut can alter a fingerprint. Besides, once a criminal has a person\u2019s biometric data in their possession, they can use the data for illegal purposes indefinitely \u2014 until the end of either the criminal\u2019s or the poor discredited person\u2019s natural life. But, the first two factors mentioned above are worth combining, both in terms of cost-effectiveness and protection level.<\/p>\n<div id=\"attachment_270\" style=\"width: 943px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-270\" class=\"size-full wp-image-270\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/06\/two-factor-authentication-steps.jpg\" alt=\"Two factor authentication process\" width=\"933\" height=\"257\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/06\/two-factor-authentication-steps.jpg 933w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/06\/two-factor-authentication-steps-300x83.jpg 300w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><p id=\"caption-attachment-270\" class=\"wp-caption-text\">In two-factor authentication, two passwords are used \u2014 a reusable static password and a one-time password.<\/p><\/div>\n<p>In two-factor authentication, two passwords are used \u2014 a reusable static password and a one-time password. In our case, here is what happens when the \u201cOne Time Password\u201d technology is used. A user wants to get authenticated in the system and first enters his regular static password and then his OTP (One Time Password) shown on the screen of a special gadget called a token. The system transmits the data to the authentication server, which will use the same algorithm to generate a password and compare it to the password entered by the user; if the two passwords are identical, the system welcomes the user. The gadget costs less than ten dollars, and the service is under a dollar per month.<\/p>\n<p>The conclusion is that two-factor authentication with the use of a token is the optimal solution from the point of view of protection, cost, and ease of use. All that a user is required to do is enter another password.<\/p>\n<p>Those who are in search of reliable 2FA solutions, we recommend taking into consideration only products certified according to OATH standards. One of the most interesting and up-to-date companies providing such services is <a title=\"Protectimus\" href=\"https:\/\/www.protectimus.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Protectimus<\/a>. It deserves attention, thanks to an innovative approach to the implementation of already proven technologies, a wide range of services and tokens, and great respect for their customers.<\/p>\n<p>Figuratively speaking, each authentication method used separately is a string that is easy to break. It is a much better idea to combine them and use a high-strength reliable rope.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>At this stage in the society\u2019s development, we have come to a paradoxical conclusion: to make authentication simple, we need to make it more complicated. There are three factors that can be used to verify a user: what he knows (a password); what he owns (a card key); and what nature gave him at birth \u2014 his biometric data. The three parameters combined in one system \u2014 what could be simpler?<\/p>\n","protected":false},"author":4,"featured_media":4602,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[7],"tags":[16,101,118,120,10,99],"class_list":["post-254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news","tag-2fa","tag-biometric-authentication","tag-data-protection","tag-multifactor-authentication","tag-otp","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":14,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/254\/revisions"}],"predecessor-version":[{"id":4603,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/254\/revisions\/4603"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4602"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}