SlideShare a Scribd company logo
Two-Factor
Authentication
- Akhil Agrawal
Purdue University
Why is it required?
• Legacy Authentication & Authorization alone
are not enough
• Passwords alone are not enough
• No way to verify the end user is our real
subscriber
• No way to verify the end user is bound to
his/her account services
How does it work?
• During any service/application activation, a
random code (Passcode) will be provided
• Subscriber should call from home line and
provide Passcode
• Subscriber account, home line Passcode will
be verified
• Service/Application will be activated
What applications will use it?
• Any application on voice platform
• Phone2Go will be able to use it
immediately
Different Approaches
• Place a call to Subscriber’s home phone,
collect the Passcode & Verify
• Subscriber will place a call to a dedicated
line from home phone, collect the Passcode
& Verify
• Ask Subscriber to place a call to dedicated
line from home phone with in short duration
Technologies Used
• Java
• MySQL
• Dialogic
Architecture
Implementation - Overview
Database – Physical Model
Column Name Data Type Default Value Description
ID UNSIGNED
BIG INT
NOT NULL
PRIMARY KEY
AUTO INCREMENT
Primary Key.
TN INT NULL User's Landline TN.
ApplicationId VARCHAR(25) NULL Name of the Application.
ActivationKey VARCHAR(25) NULL Special parameters required by
respective external client.
MacAddress VARCHAR(25) NULL Mac Address of device.
Token INT NULL 6 digit code generated for 2FA.
DateAndTime DATETIME NOT NULL
Default now()
Date and Time when the code was
created.
2FAStatus VARCHAR(10) NULL Shows the status of the 2 Factor
Authentication.
Will accept only init and success as
values.
REST Module - Layered Architecture
REST Module Sequence Diagram
SIP Module - Layered Architecture
Use Cases
• User making the call and entering the correct
code with no errors.
• User making the call without initiating the 2
Factor Authentication Request.
• User making the call after the set time limit.
• User entering the incorrect code.
SIP Module Sequence Design
No Initiated 2FA Request
User Called After Time Limit
User Entered Incorrect Auth Code
Mentors
• Mr. Naresh Dhiman – Architect and Design of
the solution.
• Mr. Thirumal Ramachandruni, Mr.
Umashankar Somasundaram – Java
development.
• Mr. Mathivanan Manickam – Integration with
Media Server.
Conclusion
• Completing this project for my internship has
been a learning and enjoyable experience.
• I really hope my project helps add a layer of
security to the existing and upcoming voice
applications.

More Related Content

What's hot

Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
JamRivera1
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
bensonoo
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
Denim Group
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Ishan Girdhar
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
CTM360
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
Nikhil Shaw
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
LearningwithRayYT
 
SSL
SSLSSL
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
saniacorreya
 
10 1 otp all
10 1 otp all10 1 otp all
10 1 otp all
Mohammad Alyan
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
jasonhaddix
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
Sina Manavi
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
Pankaj Dubey
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
Eryk Budi Pratama
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
One-Time Password
One-Time PasswordOne-Time Password
One-Time Password
Ata Ebrahimi
 

What's hot (20)

Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
Two Factor Authentication
Two Factor AuthenticationTwo Factor Authentication
Two Factor Authentication
 
Social engineering
Social engineering Social engineering
Social engineering
 
Threat Intelligence & Threat research Sources
Threat Intelligence & Threat research SourcesThreat Intelligence & Threat research Sources
Threat Intelligence & Threat research Sources
 
SSL
SSLSSL
SSL
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
10 1 otp all
10 1 otp all10 1 otp all
10 1 otp all
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Pentesting iOS Applications
Pentesting iOS ApplicationsPentesting iOS Applications
Pentesting iOS Applications
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Cybersecurity - Mobile Application Security
Cybersecurity - Mobile Application SecurityCybersecurity - Mobile Application Security
Cybersecurity - Mobile Application Security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
One-Time Password
One-Time PasswordOne-Time Password
One-Time Password
 

Viewers also liked

9 password security
9   password security9   password security
9 password security
drewz lin
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
Lookout
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and You
Chris Stone
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google Authenticator
Allan Denot
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
Lookout
 

Viewers also liked (6)

9 password security
9   password security9   password security
9 password security
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and You
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google Authenticator
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 

Similar to 2FA Protocol Presentation

CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application Logic
Sam Bowne
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
Chong-Kuan Chen
 
Flexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handlingFlexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handling
DMC, Inc.
 
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Databricks
 
GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02
Albert Escala
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
saly salikka
 
Samarendra Singha New
Samarendra Singha New Samarendra Singha New
Samarendra Singha New
Samarendra Singha
 
PROJECT.ppt (6).pptx
PROJECT.ppt (6).pptxPROJECT.ppt (6).pptx
PROJECT.ppt (6).pptx
PraveenaModinipally
 
Mt s2 sdlc
Mt s2 sdlcMt s2 sdlc
Mt s2 sdlc
TestingGeeks
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ System
Robert Parker
 
Troubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptxTroubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptx
Diwakar435317
 
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Digital Transformation EXPO Event Series
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
Rohit Kapoor
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
saurabhshertukde
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
Robert Parker
 
Resume
ResumeResume
Resume
Sagar Mhetre
 
Intro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ LabIntro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ Lab
Lizzy Guido (she/her)
 
Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)
Isita Pal
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
Rohit Kapoor
 
OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)
Bjorn Hjelm
 

Similar to 2FA Protocol Presentation (20)

CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application Logic
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 
Flexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handlingFlexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handling
 
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
 
GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Samarendra Singha New
Samarendra Singha New Samarendra Singha New
Samarendra Singha New
 
PROJECT.ppt (6).pptx
PROJECT.ppt (6).pptxPROJECT.ppt (6).pptx
PROJECT.ppt (6).pptx
 
Mt s2 sdlc
Mt s2 sdlcMt s2 sdlc
Mt s2 sdlc
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ System
 
Troubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptxTroubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptx
 
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
Resume
ResumeResume
Resume
 
Intro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ LabIntro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ Lab
 
Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)
 

2FA Protocol Presentation

  • 2. Why is it required? • Legacy Authentication & Authorization alone are not enough • Passwords alone are not enough • No way to verify the end user is our real subscriber • No way to verify the end user is bound to his/her account services
  • 3.
  • 4. How does it work? • During any service/application activation, a random code (Passcode) will be provided • Subscriber should call from home line and provide Passcode • Subscriber account, home line Passcode will be verified • Service/Application will be activated
  • 5. What applications will use it? • Any application on voice platform • Phone2Go will be able to use it immediately
  • 6. Different Approaches • Place a call to Subscriber’s home phone, collect the Passcode & Verify • Subscriber will place a call to a dedicated line from home phone, collect the Passcode & Verify • Ask Subscriber to place a call to dedicated line from home phone with in short duration
  • 7. Technologies Used • Java • MySQL • Dialogic
  • 10. Database – Physical Model Column Name Data Type Default Value Description ID UNSIGNED BIG INT NOT NULL PRIMARY KEY AUTO INCREMENT Primary Key. TN INT NULL User's Landline TN. ApplicationId VARCHAR(25) NULL Name of the Application. ActivationKey VARCHAR(25) NULL Special parameters required by respective external client. MacAddress VARCHAR(25) NULL Mac Address of device. Token INT NULL 6 digit code generated for 2FA. DateAndTime DATETIME NOT NULL Default now() Date and Time when the code was created. 2FAStatus VARCHAR(10) NULL Shows the status of the 2 Factor Authentication. Will accept only init and success as values.
  • 11. REST Module - Layered Architecture
  • 13. SIP Module - Layered Architecture
  • 14. Use Cases • User making the call and entering the correct code with no errors. • User making the call without initiating the 2 Factor Authentication Request. • User making the call after the set time limit. • User entering the incorrect code.
  • 16. No Initiated 2FA Request
  • 17. User Called After Time Limit
  • 19. Mentors • Mr. Naresh Dhiman – Architect and Design of the solution. • Mr. Thirumal Ramachandruni, Mr. Umashankar Somasundaram – Java development. • Mr. Mathivanan Manickam – Integration with Media Server.
  • 20. Conclusion • Completing this project for my internship has been a learning and enjoyable experience. • I really hope my project helps add a layer of security to the existing and upcoming voice applications.