PINsafe - How it works
Upcoming SlideShare
Loading in...5
×
 

PINsafe - How it works

on

  • 1,340 views

 

Statistics

Views

Total Views
1,340
Views on SlideShare
1,339
Embed Views
1

Actions

Likes
1
Downloads
2
Comments
0

1 Embed 1

http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    PINsafe - How it works PINsafe - How it works Document Transcript

    • PINsafe: How it Works Overview of Swivel’s PINsafe Product www.PCN-inc.com I info@PCN-inc.com PCN’s Multi-Factor Authentication Solution utilizes Swivel’s PINsafe product to enable simple, secure, and reliable access to IT systems, at any time and from any place. How It Was Then Mobility creates the need for strong security. In particular, user authentication processes - such as passwords - are often the weakest links in many secure access systems. Mobile access can create a trail of vulnerabilities, at worst opening the door to core systems. Traditional token-based solutions often are associated with hidden and rising costs resulting from the need to provide users with a device. In addition to the costs, the requirement to provision tokens can create a wasteful distraction for administrators and the solutions are often frustratingly complicated for users. How It Is Now PCN chose PINsafe because Swivel is setting a new benchmark for authentication solutions, utilizing technology based on 22 global granted patents. It gives organizations of every size the control and freedom to focus on their core activities and future growth, rather than daily security concerns. How It Works Swivel’s PINsafe solutions are reliable and resilient, delivering cost-effective authentication that is simple to deploy and to use. The unique system combines the use of a registered PIN and a randomly generated security string. A one-time code (OTC) is extracted from the security string delivered to the user simply by “reading off” the digits that correspond to the position in the string of the numbers in the registered PIN. For example if the PIN is 2-4-6-8 and the security string is 5173920648 the OTC would be the 2nd, 4th, 6th and 8th digits: 1-3-2-6. See below for illustration. User is assigned a PIN which is User’s PIN 2 4 6 8 never entered electronically.     A unique security is sent Security String 5173920648 electronically for each authentication.     One-Time Code (OTC) 1 3 2 6 User combines pin and security string to create a One-Time Code. Point of Contact: Shaun Antram Shaun.Antram@PCN-inc.com Technical Expertise. Tangible Results. Direct: 267.236.0136