• 10.harddisk.jpg
  • 20.jpg
  • 30.keys.jpg
  • 40.mobile_phone.jpg
  • 50.padlock.jpg

Authentication

How to control and manage persons accessing your data in a virtual world?

Everything happens online within a virtual space of your office, shop, bank, extranet, game, intranet, and so on. But how build trust in this space? Authentication means verifying the integrity of a user in a particular space and is a constantly changing process, as inventive hackers continue to circumvent the established safeguards of today. The most used authentication method is still based on an username and password system.

ID Control offers two-factor authentication based on time, counter and challenge response security mechanisms with the HandyID, MessageID and OTP Key. The ID Control USB Token with PKI support and HandyID both enable the digital signing of transactions or documents. On top of those two-factor ID Control offers with HandyID two-way or mutual authentication by which the server also identifies to the user with an One-Time-Password. Organizations which would like to reduce the identity related risks and threats with zero user interference can use KeystrokeID to identify the user by his or her typing behaviour on the keyboard.

Because current password-based online authentication is cumbersome, insecure and unsafe, companies and organizations are looking at other authentication technology methods.

The authentication technology is classified into three basic categories:

Something You Know
Is basically username and password authentication (single-factor authentication).
Something You Have
Is essentially token-based authentication in which users need to possess an authentication token in order to gain access to the system (two-factor authentication). USB Tokens and Mobile Authentication solutions can be reasonably included in the “Something You Have” category.
Something You Are
Is biometric authentication in which access is granted to users based on biological signatures such as a fingerprint, iris scan or analysis of keystroke behaviour.



In order to make authentication technology affordable for organizations with high security requirements and user-acceptance, ID Control offers high class two-factor authentication based on USB Tokens with integrated PKI supported functionality and/or Mobile (OTP) Authentication and biometrics with KeystrokeID and RiskID.

In case you would like to know more about authentication methods provided by ID Control, please do not hesitate to contact us!

 

 

 

 

 

1 Mobile Authentication
2 Authentication Form Factors
3 Passwords versus 2-Factor Authentication

What's your e-authentication method?

User-name and Password - 56.7%
Keyfob - 0%
Smart Card with Reader - 0%
USB Token - 20%
Biometrics - 3.3%
Soft Token - 3.3%
PKI - 6.7%
A combination - 10%

Total votes: 30
The voting for this poll has ended on: 24 Jun 2013 - 00:00