Loading...
Please wait, while we are loading the content...
Similar Documents
Securing User Transactions Using Two Factor Mobile Authentication
| Content Provider | Semantic Scholar |
|---|---|
| Author | Arathi, M. Naidu, J. M. |
| Copyright Year | 2007 |
| Abstract | Strong Authentication is a fundamental security function. During authentication, credentials presented by an individual are validated and associated with the person's identity. This binding between credentials and identity is typically done for the purpose of granting (or denying) authorization to perform some restricted operation, like accessing secured files or executing sensitive transactions. User authentication is commonly defined as the process of identifying an individual, usually based on a username and passwords. Many organizations still only rely on static ID and password that is been used in the existing authentication system which consist of Single Factor Authentication technique to provide the simplest form of authentication that may not be sufficient to safeguard against unauthorized access. Therefore, the rapid spread of e-Business has necessitated for securing transactions and therefore financial organizations are looking for two-factor authentication technique as a fundamental security function. Now-a-days different strong authentication methods are in use. Some of them can be embedded in security devices such as tokens, smart cards. But such methods are prone to security threats. Twofactor authentication method uses mobile devices as security tokens to receive a single-use password to strengthen the existing ID/password authentication and authorization process. The method is based on well known cryptographic primitives and GSM Short Messaging Service. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.iisthub.com/Proceeding_Archives/PA_EECSNov2013/13-18.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |