How two-factor authentication works with image-based authentication from Confident Technologies

468 views

Published on

This quick slideshow gives an overvi

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
468
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

How two-factor authentication works with image-based authentication from Confident Technologies

  1. 1. PresentsConfident Multifactor Authentication TM Completely out-of-band, image-based multifactor authentication
  2. 2. The user logs into their online bank on their PC
  3. 3. The bank requests a second form of authentication
  4. 4. So it sends an image-based authentication challenge to the user’s mobile phone
  5. 5. The user authenticates by tapping the pictures that fit her previously chosen, secret authentication categories.
  6. 6. The user’s selection is sent to Confident Technologies for verification.
  7. 7. If the user correctly authenticated, the web page proceeds automatically
  8. 8. The entire authentication process remains completely out-of-band from the web session.
  9. 9. Confident Multifactor Authentication• More secure than most mobile authentication techniques, which rely on sending a one- time authentication code to the user via SMS text message and then making the user type the code into the web page• Easier to use – just tap a few images• Completely out-of-band from the web session• Encrypts a one-time authentication code within the image-based challenge• Provides a Secure Second FactorTM – Even if someone else has possession of the user’s mobile phone, they will not be able to authenticate because they don’t know which pictures to identify. Visit www.ConfidentTechnologies.com to learn more.

×