SlideShare a Scribd company logo
1 of 10
Intuitive and Secure, Image-Based
           Authentication
Who We Are
   Image-based authentication technology for websites,
     web and mobile applications, and mobile devices.
• Multifactor, image-based authentication that’s easy to use:
    o One-time passwords
    o Two-factor authentication
    o Authentication for mobile apps, mobile websites & mobile payments

• Hundreds of websites and organizations rely on Confident Technologies:
    o10 customers in the financial services sector, including Charles Schwab
     Retirement Services

•Thousands of individual consumers use our online password manager for single
 sign-on and OpenID login

• 15 independent patent filings for image-based authentication, image-based
  password management, use of authentication images for advertising and more
                                 Company Confidential Information
The Problem with Mobile Authentication
                      Difficult, Not Secure, Slow

• Typing usernames & passwords is too difficult on
  smartphones and tablets
    • Often requires switching among multiple soft
      keyboards
    • 60% of smartphone owners say they wish there
      were a better way to authenticate for mobile apps


• Passwords and PINs are poor security:
    • Too many to remember, people choose weak ones, use the same one on
      multiple accounts and applications
    • Vulnerable to key loggers



                               Company Confidential Information
How to Balance Security & Usability
• Businesses sacrifice security in an effort to create a “frictionless” experience
• This leads to fraud and identity theft ($221 Billion in fraud last year alone!)

• Businesses struggle to enforce strong authentication without burdening
  customers.
     • 84% of smartphone owners have struggled with
       mobile transactions
     • 43% said a negative experience would cause
       them to abandon a mobile transactions



According to experts at the 2011 CTIA Wireless conference:
      “Mobile Authentication Will Be More Revolutionary Than
                 Mobile Commerce Transactions”
                                  Company Confidential Information
Image-Based Authentication
 Confident ImageShield™
 Image-based authentication that creates a one-time password

 1. The first time a user enrolls, they
    select a few categories to remember

 2. When authentication is needed,
    they are presented with a grid of
    random images

 3. They identify the images that fit
    their secret categories and enter the
    corresponding letters as their
    one-time password or PIN

The pictures, their locations and the letters are different every time
               – creating a unique authentication code each time.
                               Company Confidential Information
Image-Based Authentication
Confident Mobile Authentication
Image-based authentication can be used to create
one-time passwords and strong authentication for:
   • Logging in to mobile apps and mobile
     websites
   • Approving mobile payments or
     transactions
   • Device lock/unlock

 Easier on users
 More secure (creates one-time passwords)
 Faster & quicker on mobile devices than typing
  passwords


                              Company Confidential Information
Two Factor, Mobile Authentication
Confident Multifactor Authentication™
1. A one-time password (OTP) is encrypted
   within an ImageShield.

2. ImageShield is displayed on the user’s mobile
   device, they identify the pictures that fit their
   secret categories – thus reassembling the OTP

3. Reassembled OTP is submitted to be verified

4. Only if the user identified the correct images
   will they have the correct OTP

5. Web page proceeds automatically if
   authentication is correct – the entire process
   remains out-of-band from the web session

                               Company Confidential Information
Two Factor, Mobile Authentication
Confident Multifactor Authentication™

   Generates a one-time password, hidden from view
   User applies a “shared secret” on the second factor
         A multilayered, multifactor solution
   Only the legitimate user is able to use the second
    factor
         Secure against Zeus-in-the-mobile,
          SMS-forwarding and keylogging attacks
         Secure if someone else has possession of your
          mobile device (loss or theft)
   Entirely out-of-band




                                  Company Confidential Information
Confident KillSwitchTM
 In addition to choosing their secret categories for authentication, the
   user chooses one or more “No Pass” categories

 Positively identifies hackers in the act
   of trying to break into an account

 Captures behavioral biometrics, IP
   address, geographic information,
   actionable data so business can take
   immediate proactive measures
   against the attacker, lock the account,
   send alerts and more

 Can alert the business to a wide-
  scale, brute-force attack on the
  business in real-time
Intuitive and Secure, Image-Based
                Authentication

                  Thank You!


     www.ConfidentTechnologies.com


Try the Live Demos at: www.ConfidentTechnologies.com/demos
   Watch Our Videos at www.Youtube.com/ConfidentTech

More Related Content

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Mobile Authentication Using Images

  • 1. Intuitive and Secure, Image-Based Authentication
  • 2. Who We Are Image-based authentication technology for websites, web and mobile applications, and mobile devices. • Multifactor, image-based authentication that’s easy to use: o One-time passwords o Two-factor authentication o Authentication for mobile apps, mobile websites & mobile payments • Hundreds of websites and organizations rely on Confident Technologies: o10 customers in the financial services sector, including Charles Schwab Retirement Services •Thousands of individual consumers use our online password manager for single sign-on and OpenID login • 15 independent patent filings for image-based authentication, image-based password management, use of authentication images for advertising and more Company Confidential Information
  • 3. The Problem with Mobile Authentication Difficult, Not Secure, Slow • Typing usernames & passwords is too difficult on smartphones and tablets • Often requires switching among multiple soft keyboards • 60% of smartphone owners say they wish there were a better way to authenticate for mobile apps • Passwords and PINs are poor security: • Too many to remember, people choose weak ones, use the same one on multiple accounts and applications • Vulnerable to key loggers Company Confidential Information
  • 4. How to Balance Security & Usability • Businesses sacrifice security in an effort to create a “frictionless” experience • This leads to fraud and identity theft ($221 Billion in fraud last year alone!) • Businesses struggle to enforce strong authentication without burdening customers. • 84% of smartphone owners have struggled with mobile transactions • 43% said a negative experience would cause them to abandon a mobile transactions According to experts at the 2011 CTIA Wireless conference: “Mobile Authentication Will Be More Revolutionary Than Mobile Commerce Transactions” Company Confidential Information
  • 5. Image-Based Authentication Confident ImageShield™ Image-based authentication that creates a one-time password 1. The first time a user enrolls, they select a few categories to remember 2. When authentication is needed, they are presented with a grid of random images 3. They identify the images that fit their secret categories and enter the corresponding letters as their one-time password or PIN The pictures, their locations and the letters are different every time – creating a unique authentication code each time. Company Confidential Information
  • 6. Image-Based Authentication Confident Mobile Authentication Image-based authentication can be used to create one-time passwords and strong authentication for: • Logging in to mobile apps and mobile websites • Approving mobile payments or transactions • Device lock/unlock  Easier on users  More secure (creates one-time passwords)  Faster & quicker on mobile devices than typing passwords Company Confidential Information
  • 7. Two Factor, Mobile Authentication Confident Multifactor Authentication™ 1. A one-time password (OTP) is encrypted within an ImageShield. 2. ImageShield is displayed on the user’s mobile device, they identify the pictures that fit their secret categories – thus reassembling the OTP 3. Reassembled OTP is submitted to be verified 4. Only if the user identified the correct images will they have the correct OTP 5. Web page proceeds automatically if authentication is correct – the entire process remains out-of-band from the web session Company Confidential Information
  • 8. Two Factor, Mobile Authentication Confident Multifactor Authentication™  Generates a one-time password, hidden from view  User applies a “shared secret” on the second factor  A multilayered, multifactor solution  Only the legitimate user is able to use the second factor  Secure against Zeus-in-the-mobile, SMS-forwarding and keylogging attacks  Secure if someone else has possession of your mobile device (loss or theft)  Entirely out-of-band Company Confidential Information
  • 9. Confident KillSwitchTM  In addition to choosing their secret categories for authentication, the user chooses one or more “No Pass” categories  Positively identifies hackers in the act of trying to break into an account  Captures behavioral biometrics, IP address, geographic information, actionable data so business can take immediate proactive measures against the attacker, lock the account, send alerts and more  Can alert the business to a wide- scale, brute-force attack on the business in real-time
  • 10. Intuitive and Secure, Image-Based Authentication Thank You! www.ConfidentTechnologies.com Try the Live Demos at: www.ConfidentTechnologies.com/demos Watch Our Videos at www.Youtube.com/ConfidentTech

Editor's Notes

  1. Typing usernames and passwords on mobile devices is too cumbersome. Whether logging in to mobile apps and mobile websites, approving mobile transactions, or verifying mobile payments, it’s simply too difficult. “Strong” passwords (consisting of upper and lower case letters, numbers and symbols) are even more difficult to type because they involve switching back and forth between multiple soft keyboards on the touchscreen. Source: Mobile (In)Security Survey 2011, can be downloaded at www.confidenttechnologies.com/survey
  2. The inconvenience and security issues of traditional authentication stunt the growth of mobile commerce, mobile payments and mobile bankingSources:http://mashable.com/2011/01/29/identity-theft-infographic http://www.tealeaf.com/news/news-releases/2011/Ten-Million-UK-Consumers-Using-Mobile-Commerce.phphttp://www.mobilemarketer.com/cms/news/commerce/11217.html
  3. Image-based authentication from Confident Technologies is both highly secure and easy to use. It creates one-time passwords or PINs each time authentication is needed, yet it is easy and intuitive to use. The pictures, their location on the display, and the alphanumeric characters overlaid on the images are different each time. In this way, it creates a unique, one-time password (OTP) every time. However, the user’s categories always remain the same. They simply look for the pictures that fit their secret categories. Each ImageShield has a unique ID and a limited life span so it can only be used once.
  4. Confident Technologies generates a one-time authentication code (a.k.a. a one-time password), splits the code apart and assigns pieces of the code to pictures that match the user’s secret categories. “Dummy” pieces of code are randomly assigned to other random pictures. An ImageShield is displayed on the user’s smartphone or mobile device – this can be done using a web browser (zero-footprint deployment) or using an application/soft token on the smartphone. The user taps the pictures that fit their secret categories, thus reassembling the authentication code. The code assembled by the user is sent back to Confident Technologies to be verified. Only if they identified the correct pictures in the correct order will the code be reassembled correctly and authentication is confirmed. The entire process remains out-of-band from the web session.
  5. Many common two-factor solutions send the user a one-time password or PIN as a text message. If someone else is in possession of the phone, or using SMS-forwarding technology (also known as a Zeus-in-the-mobile attack), they can easily read the text and authenticate their own fraudulent transactions. Confident Multifactor Authentication is more secure because it requires the user to apply a piece of secret knowledge on the second factor device itself. This makes it a multi-layer, multifactor solution. The user simply taps the images that fit their secret categories on the smartphone. The entire authentication process remains completely out-of-band and the one-time password or PIN is essentially “hidden in plain sight.” Even if someone else gained physical or virtual possession of your phone, they would not be able to authenticate because they would not know the correct images to identify. It can provide behavioral biometrics and other data for adaptive, risk-based authentication and decision making.
  6. If a hacker or a bot attempts to access the account by guessing login credentials or using a brute-force attack, and selects an image that fits one of the user’s “no pass” categories, Confident KillSwitch can automatically alert the business or account owner,lock all access to the account, or present increasingly difficult ImageShield challenges while gathering important information including the IP address, geographic location and behavioral biometrics of the would-be attacker. Confident KillSwitch can positively distinguish between a legitimate user who may have mistakenly identified one wrong image and a fraudulent authentication attempt. With each additional authentication attempt, it actually makes it less likely for an attacker to be able to correctly guess the secret and more likely for the attacker to be caught.