> Confident Technologies > Secure, Two-Factor Authentication Using Images
 

Secure, Two-Factor Authentication Using Images

White Paper Published By: Confident Technologies
Confident Technologies
Published:  Jun 29, 2011
Type:  White Paper
Length:  10 pages

Cybercriminals are increasingly targeting mobile phones and the SMS communication channel used by many businesses for two-factor authentication. They are even intercepting and re-routing the authentication text messages businesses send customers in order to authenticate online transactions. As attacks continue to increase, businesses need a more secure approach to two-factor authentication on mobile phones. One can no longer assume that the phone is a secure second factor device or that it is actually the legitimate user in possession of the phone. For these reasons, businesses need a multi-layered, multifactor approach to authentication. Image-based authentication from Confident Technologies can be used on the second factor device itself in order to verify that it is actually the legitimate user in possession of the second factor. It delivers a type of challenge-response on the user's mobile phone for completely out-of-band, mutual authentication on the second factor. Read the white paper to learn more



Tags : 
authentication, two-factor authentication, multifactor authentication, security, website security