Your SlideShare is downloading. ×
Identity cues two factor data sheet
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Identity cues two factor data sheet


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. Identity Cues Two Factor™ & Two Way AuthenticationMaximum Security with Maximum Convenience“Sometimes the easiest answers are the best.”John Dix, Editor-in-Chief of Network World, describing Identity CuesGreen Armor Solutions Inc. ◊ +1 (201) 801-0383 ◊ ◊© 2006 Green Armor Solutions, Inc. Green Armor Solutions, Green Armor, Identity Cues, Identity Cues Two Factor, the Green Armor Solutions logo, and the slogan “Maximum Security with MaximumConvenience” are trademarks of Green Armor Solutions, Inc. All Rights Reserved.TMMaximum SecurityTrue Two-Factor Authentication - IdentityCues Two Factor delivers true two-factorauthentication. It never relies on users answeringquestions (whose answers can often be obtainedby criminals) in lieu of a two-factor sign on.Protection against Man-In-the-Middle AttacksUnlike other two-factor authentication systems,Identity Cues Two Factor protects against man-in-the-middle attacks – using dual defenses.Two-Way (Mutual) Authentication - A uniquecombination of technology and psychologyproactively informs users whether or not a websiteis legitimate. Visual cues are optimized per thehuman recognition process in order to ensuremaximum effectiveness.Maximum ConvenienceEasiest two-factor authentication for users -Identity Cues Two Factor requires no userenrollment, no software downloads, no secrets tobe remembered, no devices to be carried, and noextra steps to be endured during login.Support for Numerous Web EnvironmentsIdentity Cues Two Factor runs on numerousplatforms, easily scales to meet the needs oforganizations of all sizes, and requires littleongoing maintenance.Identity Cues Two Factor is a unique, user-friendly authentication system that both strongly authenticatesusers to an online system as well as informs users whether they are interacting with a legitimate web site orwith a criminal’s clone site. As the most user-friendly two-factor (and two-way) authentication systemavailable today, Identity Cues Two Factor typically requires no user enrollment, no extra steps during the loginprocess, no devices to be carried, no user training, and little ongoing maintenance.Authentication using passwords or “secret” answers to questions poses serious risks — if an unauthorized party obtains apassword or answer he can gain inappropriate access to sensitive resources. Two-factor authentication – in which usersmust possess a physical device in addition to knowing a password – is a far more secure. In fact, the Federal FinancialInstitutions Examination Council (FFIEC) has instructed US-based financial institutions to implement two-factorauthentication for all online account access.But, two-factor authentication can be inconvenient for users. It also does not adequately address the issue of phishing, andis usually vulnerable to man-in-the-middle attacks (such as those recently leveraged by criminals to successfully breachfinancial institutions that use two-factor authentication). With phishing costingAmerican businesses over $1-billion annually, and with targeted corporate phishing(also known as spear phishing) causing significant breaches of sensitive corporateinformation, two-way authentication – in which systems prove their identity tousers – is crucial.Identity Cues Two Factor exceeds FFIEC guidelines and delivers both two-way and two-factor authentication in the most user-friendly fashion.Simple: Identity CuesTwo Factor is delivered assoftware that easilyintegrates with existingweb sites. True two factorauthentication takes place behind the scenes, and obvious cuesenable all users to instinctively recognize whether or not they areinteracting with an intended legitimate business.Effective: Identity Cues Two Factor delivers true two-factor andtwo-way security without requiring users to make a consciousdecision as to whether they are accessing a legitimate website.Psychology leveraged in the design helps ensure effectivenesseven when users do not pay attention to visual cues.Secure: Patent-pending technology authenticates users as well asthe computers they use for access. Users type their login names &passwords as they always have – with no added steps. When auser accesses from an unknown machine a one-time password isrequired for access; the one-time password can be sent to the uservia an email message, an SMS to his cellphone, or generated by athird-party product such as a hardware token.Identity Cues Two Factor generates visual cues to prove theveracity of websites; cues are generated by applying one-waycryptographic functions to user-entered text and a series of secretkeys. Only the genuine site can generate the proper cue for anyparticular user; if no cue or an incorrect cue is displayed, it will beobvious to even an untrained user – and even to users not payingattention – that something is wrong with the site.Identity Cues Two Factor also offers double protection againstman-in-the-middle attacks, cueing users when a site is legitimate,and warning them when it is not.