How to control and manage persons accessing your data in a virtual world?
Everything happens online within a virtual space of your office, shop, bank, extranet, game, intranet, and so on. But how build trust in this space? Authentication means verifying the integrity of a user in a particular space and is a constantly changing process, as inventive hackers continue to circumvent the established safeguards of today. The most used authentication method is still based on an username
ID Control offers two-factor authentication
based on time, counter and challenge response security mechanisms with the HandyID
and OTP Key
. The ID Control USB Token
support and HandyID both enable the digital signing of transactions or documents. On top of those two-factor ID Control offers with HandyID two-way or mutual authentication by which the server also identifies to the user with an One-Time-Password. Organizations which would like to reduce the identity related risks and threats with zero user interference can use KeystrokeID
to identify the user by his or her typing behaviour on the keyboard.Because current password-based online authentication is cumbersome, insecure and unsafe, companies and organizations are looking at other authentication technology methods.
The authentication technology is classified into three basic categories:
Something You Know
Is basically username and password authentication (single-factor authentication).
Something You Have
Is essentially token-based authentication in which users need to possess an authentication token in order to gain access to the system (two-factor authentication). USB Tokens and Mobile Authentication solutions can be reasonably included in the “Something You Have” category.
Something You Are
Is biometric authentication in which access is granted to users based on biological signatures such as a fingerprint, iris scan or analysis of keystroke behaviour.