How two-factor authentication works with image-based authentication from Confident Technologies

9

Click here to load reader

Transcript of How two-factor authentication works with image-based authentication from Confident Technologies

Page 1: How two-factor authentication works with image-based authentication from Confident Technologies

Presents

Completely out-of-band, image-based multifactor authentication

Confident Multifactor AuthenticationTM

Page 2: How two-factor authentication works with image-based authentication from Confident Technologies

The user logs into their online bank on their PC

Page 3: How two-factor authentication works with image-based authentication from Confident Technologies

The bank requests a second form of authentication

Page 4: How two-factor authentication works with image-based authentication from Confident Technologies

So it sends an image-based authentication challenge to the user’s mobile phone

Page 5: How two-factor authentication works with image-based authentication from Confident Technologies

The user authenticates by tapping the pictures that fit her previously chosen, secret

authentication categories.

Page 6: How two-factor authentication works with image-based authentication from Confident Technologies

The user’s selection is sent to Confident Technologies for verification.

Page 7: How two-factor authentication works with image-based authentication from Confident Technologies

If the user correctly authenticated, the web page proceeds automatically

Page 8: How two-factor authentication works with image-based authentication from Confident Technologies

The entire authentication process remains completely out-of-band from the web session.

Page 9: How two-factor authentication works with image-based authentication from Confident Technologies

Confident Multifactor Authentication

• More secure than most mobile authentication techniques, which rely on sending a one-time authentication code to the user via SMS text message and then making the user type the code into the web page

• Easier to use – just tap a few images

• Completely out-of-band from the web session

• Encrypts a one-time authentication code within the image-based challenge

• Provides a Secure Second FactorTM – Even if someone else has possession of the user’s mobile phone, they will not be able to authenticate because they don’t know which pictures to identify.

Visit www.ConfidentTechnologies.com to learn more.