Today a user gets all information and services on his mobile. Cellular service providers have taken the next step to enable credit card services on mobile devices. In future, users would like to get all information on their mobile and do most of their online work on mobile devices. They will go online using GPRS to do financial transactions, update a contract, access a CRM application to get customer status, etc., etc. It is very clear that single static password based authentication mechanisms have outlived their usefulness. The need for a second authentication factor has become clear and strong now. As users spend more time online via their mobile devices going over an open wireless network to Internet, the probability of password thefts and spoofing, man-in-the-middle attack increases. The two factor solution requires a user to use a hardware token to generate an OTP (one time password) and use that to authenticate. If the user goes online 3 times in a day, and accesses 5 sites that implement OTP based 2 factor authentication, the user will have to generate the OTP on hardware token 15 times, read the OTP from hardware token and enter that on screen and then authenticate. After a couple of month the token needs to be reinitialized or changed. This is not the normal way a user accesses Internet or online services today. We are definitely reducing the risk of password theft but at the cost of user inconvenience. Imagine a user will have to carry bunch of tokens and stick a note on each device to identify which one to use where. Hardware token based two factor authentication solution doesn’t seem to work for a common user. We think the perfect solution must make use of existing infrastructure. Nowadays every user carries a mobile device with him. Mobiles generally have got more computation power than hardware OTP tokens and are expected to become more powerful in coming years. Exploiting the mobile’s computational power to generate OTP is not new. There are solutions available that provide authentication services via mobile. These solutions solve one problem, the cost factor. Also a user need not carry a number of different tokens for different services. But again, the software has its own problems. The mobile device client is specific to a vendor. A user needs to use one client software for one company and a different one for another; Again the client deployment and re-synching are some of issues corporate IT departments need to take care about. A user needs to read the OTP from mobile and enter on website to authenticate. Reading from a small screen sized mobiles is not so convenient. Also the count of digits in OTP has to be limited to a small number, typically 6-8 so that it is not hard for users to read from screen and type on login portal. This limits the strength of the OTP and the time duration for which a seed is valid. Issues related to client software on mobile device can be correlated to issues with having software on a user PC. Corporate IT departments need to take care of software updates, deployment, revocation and other issues. In today’s time, for PC based users, enterprises prefer a solution that doesn’t have such issues. Web-based solutions and smart solutions that don’t have many support issues are preferred. The same trend we are going to see for mobile users. A smart solution that is transparent to users yet secure enough to stand against next generation attacks. The solution needs to build a trust so that users are confident that they are secure when they access online services over un-secure Internet connections. If such a solution is not found, the Internet will soon cease to be used a medium for online transactions.
© Copyright, Vij
Popular Posts
-
RBI has now mandated that every credit card transaction must enforce the user to enter a secure PIN pre-registered with the banks. Of cours...
-
Here is an example perl script to send email from a Linux box. VERY IMPORTAT: @ symbol in this file MUST be escaped as \@. for e.g. if y...
-
Here are the settings that need to be done in Windows 7 for kernel debugging: 1. start cmd with admin rights 2. run bcdedit to see existi...
-
After a long time, I got a chance to setup Visual studio and code few things. I could setup Visual studio express edition smoothly but wh...
-
Scenario: You wanna debug an application but you dont have the code for it? You suspect some functions that are failing, you dont feel like ...
-
I got a small appliance (x86 based desktop appliance) where I was installing our custom fedora 9 distribution. Everything was fine except th...
-
Had some success today hooking APIs on linux. Don't think that this is going to be a techy blog-site. Just pasting here for later refere...
-
Just writing some quick notes. Its is compulsary to sign your driver with a digital certificate on Windows 7 64bit edition. In fact it is ...
-
I attended the seminar organized by SEAP on legal issues in InfoTech organized at PSPL, Pune. It was a good event to attend and was very inf...
-
After working as part of sales team I have become more result oriented. I weigh every second in terms of how much I have progressed towards ...
Labels
- activities (1)
- AIT (1)
- ajax (1)
- API hooking (3)
- application virtualization (1)
- attacks (2)
- College (1)
- debugging (2)
- driver development (1)
- e1000 (1)
- e1000e (1)
- express edition 2013 (1)
- Hacking (1)
- Hooking (1)
- I18N (1)
- ideas (3)
- internationalization (1)
- ipsec (1)
- L10N (1)
- LD_PRELOAD (2)
- legal (1)
- Linux (5)
- localization (1)
- MBCS (1)
- missing library (1)
- networking (1)
- NIC drivers (1)
- port forwarding (1)
- propalms network (1)
- pune (1)
- punetech (1)
- remote access (1)
- router (1)
- Security (3)
- SSL (1)
- ssl vpn (1)
- ssl vpn vs ipsec (1)
- startup (2)
- Students (1)
- TCP/IP (1)
- TDI (1)
- Two Factor Authentication (2)
- Unicode (2)
- VC (1)
- vihaan (1)
- vijender (1)
- Vista (1)
- Visual studio (1)
- vmware (2)
- web 2.0 (2)
- windows (2)
- www.vijinc.com (1)
0 comments:
Post a Comment