{"id":764,"date":"2015-11-05T19:43:33","date_gmt":"2015-11-05T16:43:33","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=764"},"modified":"2019-06-12T18:19:14","modified_gmt":"2019-06-12T15:19:14","slug":"two-factor-authentication-2015","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-2015\/","title":{"rendered":"Two-Factor Authentication 2015: Opportunities and Prospects"},"content":{"rendered":"<p>Modern technologies have brought a lot of conveniences and opportunities into our lives, but also sharply reduced the chances of complete privacy. Photos that are not intended for prying eyes, credit card numbers, passwords for accounts in social networks and e-mail services, business documents stored in cloud services, the hand of a hacker is able to reach all this with little to no effort.<\/p>\n<p>Traditionally one of the most vulnerable aspects of computer security is strong authentication. Therefore, multifactor authentication methods are constantly being improved and developed. The usual two-factor authentication, when temporary passwords are delivered by a text message, is far from being the only option. Let&#8217;s see what means of security authentication exist nowadays and what means are being developed?<\/p>\n<h2>1. Applications for smartphones.<\/h2>\n<p>According to recent studies, smartphones are used by about 50% of inhabitants of the Earth. If we take into account only the developed countries, where the problem of data protection is most acute, the numbers are even more impressive.<\/p>\n<p>That is why applications that can turn the smartphones of the users into an OTP token are increasingly distributed. In \u2018Google Play\u2019 and \u2018App Store\u2019 you can download <a href=\"https:\/\/www.protectimus.com\/\">Protectimus<\/a>&#8216; mobile authentication application for Android and iOS smartphones and for Android Smart Watch.<\/p>\n<p>The Protectimus SMART application allows you:<\/p>\n<ul>\n<li>to select OTP (one-time password) generation algorithm, (HOTP, TOTP, OCRA);<\/li>\n<li>to set the length of the 2 step verification code (6 or 8 characters);<\/li>\n<li>to use the data signing function (CWYS), which protects from banking trojans and data modification;<\/li>\n<li>to create multiple tokens on a single device.<\/li>\n<\/ul>\n<p>The system of data protection with the help of a software application, however, has one drawback. If the signing in the account takes place from another device (PC, laptop), the software token properly fulfills its functions. But if you go to a site with the same device on which the mobile authentication app is installed, the effectiveness of the protection will be reduced.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-765\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart.jpg\" alt=\"One-time password token Protectimus SMART\" width=\"250\" height=\"444\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart.jpg 288w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-169x300.jpg 169w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-766\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-1.jpg\" alt=\"OTP token Protectimus SMART\" width=\"250\" height=\"444\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-1.jpg 288w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-1-169x300.jpg 169w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-767\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-2.jpg\" alt=\"Protectimus SMART OTP token\" width=\"250\" height=\"444\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-2.jpg 288w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/protectimus-smart-2-169x300.jpg 169w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/center><\/p>\n<h2>2. Hardware tokens.<\/h2>\n<p>Hardware OTP tokens can provide a higher level of information security. These devices operate autonomously; they don\u2019t require an internet connection. In addition, one-time password token can be protected by a PIN-code to avoid unauthorized use in the case of loss or theft. Hardware tokens may look different, but they are always quite compact and small in size. For example, the \u2018Protectimus Slim\u2019 has a stylish design in the form of a credit card and TOTP token \u2018Protectimus One\u2019 is designed as a convenient key fob that can be worn together with the keys.<\/p>\n<p>The \u2018Protectimus Ultra\u2019 token stands out for its reliability. Its main feature is that the secret key is generated only during the activation of the token, which means that even the developers of the OTP token don&#8217;t know the secret key in advance. \u2018Protectimus Ultra\u2019 uses the OCRA algorithm (OATH Challenge-Response Algorithm), which is currently the most reliable one-time passwords generation algorithm.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-4878 size-full\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/hardware-otp-tokens-1.jpg\" alt=\"Hardware two-factor authentication OTP tokens\" width=\"688\" height=\"222\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/hardware-otp-tokens-1.jpg 688w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/hardware-otp-tokens-1-300x97.jpg 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2015\/11\/hardware-otp-tokens-1-610x197.jpg 610w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/><\/p>\n<h2>3. Biometric methods.<\/h2>\n<p>The previously described two-factor authentication methods are based on the one-time passwords generation while biometric techniques use different biometric parameters of the person instead of OTP passwords. Identification happens by the unique, peculiar to the only person\u2019s individual parameters: voice, fingerprints, retina, or even selfie can act as identifiers. However, such &#8216;tools&#8217;, although very attractive in terms of ease of use, are not as reliable as usual and \u2018boring\u2019 one-time passwords.<\/p>\n<h2>4. Implementation of the implants.<\/h2>\n<p>Instead of the standard hardware token, which can be lost or stolen, the chip, embedded under the skin, is impossible to lose. Smartphone acts as a device for detecting a \u2018key\u2019. So far this method is still not thoroughly worked out and remains experimental. Although it is possible that it will someday become the leading method in the authentication of the users &#8211; who knows?<br \/>\n<center><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/QpdVSeLA3qk\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"\"><\/iframe><\/center><\/p>\n<h2>5. The method of comparing background noises.<\/h2>\n<p>Not so long ago, the Swiss developers have come up with an original idea to authenticate users using the background noise. Its essence is that when you try to log into your account, the device from which it is mad, and the smartphone simultaneously record the background noise, which surrounds the user. The records are matched on the server, and if the noises from both devices are similar, the user gets access to his account. Although the method is quite interesting, it raises some questions about the degree of its reliability.<\/p>\n<p>Among them are:<\/p>\n<ul>\n<li>the high load on the server in the case of simultaneous processing of large amounts of data;<\/li>\n<li>the opportunity for the hacker to be in the same sound environment as the victim;<\/li>\n<li>the differences between the quality of microphones on different devices, and, as a result, differences in noise records.<\/li>\n<\/ul>\n<p>It\u2019s important to note that not two-factor, but multifactor authentication is already becoming the standard. In this case, the authentication process involves not only the OPT password check-up but also the analysis of typical user behavioral characteristics: the model and version of the browser, the place of entering the network, etc. If these and other parameters do not differ from usual, the access is possible without the entry of the one-time password. This model, which supplements traditional 2FA, is used in <a href=\"https:\/\/www.protectimus.com\/\">Protectimus<\/a> two-factor authentication solution. Thus, the user can achieve both the desirable convenience and reliable data protection.<\/p>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Modern technologies have brought a lot of conveniences and opportunities into our lives, but also sharply reduced the chances of complete privacy. Photos that are not intended for prying eyes, credit card numbers, passwords for accounts in social networks and e-mail services, business documents stored in cloud services, the hand of a hacker is able [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4541,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[3,9],"tags":[16,101,10,139,99],"class_list":["post-764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-engineering","category-protectimus-products","tag-2fa","tag-biometric-authentication","tag-otp","tag-tokens","tag-two-factor-authentication"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=764"}],"version-history":[{"count":9,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/764\/revisions"}],"predecessor-version":[{"id":5071,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/764\/revisions\/5071"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4541"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}