SlideShare a Scribd company logo
Identity Cues Two Factor™ & Two Way Authentication
Maximum Security with Maximum Convenience
“Sometimes the easiest answers are the best.”
John Dix, Editor-in-Chief of Network World, describing Identity Cues
Green Armor Solutions Inc. ◊ +1 (201) 801-0383 ◊ www.greenarmor.com ◊ info@greenarmor.com
© 2006 Green Armor Solutions, Inc. Green Armor Solutions, Green Armor, Identity Cues, Identity Cues Two Factor, the Green Armor Solutions logo, and the slogan “Maximum Security with Maximum
Convenience” are trademarks of Green Armor Solutions, Inc. All Rights Reserved.
TM
Maximum Security
True Two-Factor Authentication - Identity
Cues Two Factor delivers true two-factor
authentication. It never relies on users answering
questions (whose answers can often be obtained
by criminals) in lieu of a two-factor sign on.
Protection against Man-In-the-Middle Attacks
Unlike other two-factor authentication systems,
Identity Cues Two Factor protects against man-in-
the-middle attacks – using dual defenses.
Two-Way (Mutual) Authentication - A unique
combination of technology and psychology
proactively informs users whether or not a website
is legitimate. Visual cues are optimized per the
human recognition process in order to ensure
maximum effectiveness.
Maximum Convenience
Easiest two-factor authentication for users -
Identity Cues Two Factor requires no user
enrollment, no software downloads, no secrets to
be remembered, no devices to be carried, and no
extra steps to be endured during login.
Support for Numerous Web Environments
Identity Cues Two Factor runs on numerous
platforms, easily scales to meet the needs of
organizations of all sizes, and requires little
ongoing maintenance.
Identity Cues Two Factor is a unique, user-friendly authentication system that both strongly authenticates
users to an online system as well as informs users whether they are interacting with a legitimate web site or
with a criminal’s clone site. As the most user-friendly two-factor (and two-way) authentication system
available today, Identity Cues Two Factor typically requires no user enrollment, no extra steps during the login
process, no devices to be carried, no user training, and little ongoing maintenance.
Authentication using passwords or “secret” answers to questions poses serious risks — if an unauthorized party obtains a
password or answer he can gain inappropriate access to sensitive resources. Two-factor authentication – in which users
must possess a physical device in addition to knowing a password – is a far more secure. In fact, the Federal Financial
Institutions Examination Council (FFIEC) has instructed US-based financial institutions to implement two-factor
authentication for all online account access.
But, two-factor authentication can be inconvenient for users. It also does not adequately address the issue of phishing, and
is usually vulnerable to man-in-the-middle attacks (such as those recently leveraged by criminals to successfully breach
financial institutions that use two-factor authentication). With phishing costing
American businesses over $1-billion annually, and with targeted corporate phishing
(also known as spear phishing) causing significant breaches of sensitive corporate
information, two-way authentication – in which systems prove their identity to
users – is crucial.
Identity Cues Two Factor exceeds FFIEC guidelines and delivers both two-
way and two-factor authentication in the most user-friendly fashion.
Simple: Identity Cues
Two Factor is delivered as
software that easily
integrates with existing
web sites. True two factor
authentication takes place behind the scenes, and obvious cues
enable all users to instinctively recognize whether or not they are
interacting with an intended legitimate business.
Effective: Identity Cues Two Factor delivers true two-factor and
two-way security without requiring users to make a conscious
decision as to whether they are accessing a legitimate website.
Psychology leveraged in the design helps ensure effectiveness
even when users do not pay attention to visual cues.
Secure: Patent-pending technology authenticates users as well as
the computers they use for access. Users type their login names &
passwords as they always have – with no added steps. When a
user accesses from an unknown machine a one-time password is
required for access; the one-time password can be sent to the user
via an email message, an SMS to his cellphone, or generated by a
third-party product such as a hardware token.
Identity Cues Two Factor generates visual cues to prove the
veracity of websites; cues are generated by applying one-way
cryptographic functions to user-entered text and a series of secret
keys. Only the genuine site can generate the proper cue for any
particular user; if no cue or an incorrect cue is displayed, it will be
obvious to even an untrained user – and even to users not paying
attention – that something is wrong with the site.
Identity Cues Two Factor also offers double protection against
man-in-the-middle attacks, cueing users when a site is legitimate,
and warning them when it is not.

More Related Content

PDF
Multi Factor Authentication
PDF
An Overview on Authentication Approaches and Their Usability in Conjunction w...
PDF
Sms based otp
PDF
M-Pass: Web Authentication Protocol
PDF
The Immune System of Internet
PDF
Strong authentication implementation guide
 
PDF
Iaetsd fpga implementation of rf technology and biometric authentication
PDF
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
Multi Factor Authentication
An Overview on Authentication Approaches and Their Usability in Conjunction w...
Sms based otp
M-Pass: Web Authentication Protocol
The Immune System of Internet
Strong authentication implementation guide
 
Iaetsd fpga implementation of rf technology and biometric authentication
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...

What's hot (20)

PDF
Banking and Modern Payments System Security Analysis
PDF
Two factor authentication
PPTX
PPTX
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
PDF
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
PDF
Graphical Password Authentication using Images Sequence
PDF
Mobile Banking Security Risks and Consequences iovation2015
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PPT
E-Banking Web Security
PDF
Visitor management system
PDF
Multi factor authentication issa0415-x9
PPTX
Privacy and Security Issues in E-Commerce
PDF
04-1 E-commerce Security slides
PPTX
Cyber Security: User Access Pitfalls, A Case Study Approach
PDF
Balancing Security and Customer Experience
PDF
1208 wp-two-factor-and-swivel-whitepaper
PPTX
Identity theft pp presentation
PDF
Paper id 35201568
PPTX
SSO - single sign on solution for banks and financial organizations
Banking and Modern Payments System Security Analysis
Two factor authentication
The Cybercriminal Approach to Mobile Fraud: Now They’re Getting Serious
A Multidimensional View of Critical Web Application Security Risks: A Novel '...
Graphical Password Authentication using Images Sequence
Mobile Banking Security Risks and Consequences iovation2015
Multi Factor Authentication Whitepaper Arx - Intellect Design
E-Banking Web Security
Visitor management system
Multi factor authentication issa0415-x9
Privacy and Security Issues in E-Commerce
04-1 E-commerce Security slides
Cyber Security: User Access Pitfalls, A Case Study Approach
Balancing Security and Customer Experience
1208 wp-two-factor-and-swivel-whitepaper
Identity theft pp presentation
Paper id 35201568
SSO - single sign on solution for banks and financial organizations
Ad

Viewers also liked (8)

PPTX
PDF
Dane osobowe w data center
PDF
PDF
Sugammadeks wskazania do_stosowania
PPT
Ochrona środowiska
 
PDF
Procesos tecnicos que se realizan en la creacion de un hardware
PDF
Rewalidacja 1 & (2)
PPTX
Metodologia nauk cz1 15_16
Dane osobowe w data center
Sugammadeks wskazania do_stosowania
Ochrona środowiska
 
Procesos tecnicos que se realizan en la creacion de un hardware
Rewalidacja 1 & (2)
Metodologia nauk cz1 15_16
Ad

Similar to Identity cues two factor data sheet (20)

PDF
information security Lecture by cyber security
PDF
Securing corporate assets_with_2_fa
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PDF
Two factor authentication
PPTX
Image-Based Authentication from Confident Technologies
PPTX
Evolution of MFA.pptx
PDF
Stay safe online- understanding authentication methods
PPTX
Role Of Two Factor Authentication In Safeguarding Online Transactions
PPTX
ITSolutions|Currie Network Security Seminar
DOCX
Biometric Authentication Technology - Report
PDF
UNIT 2 Information Security Sharad Institute
PDF
Two-Factor Authentication_ Enhancing Security in the Digital Age.pdf
PDF
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
PDF
Counter Challenge Authentication Method: A Defeating Solution to Phishing Att...
PDF
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
PDF
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
PDF
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
PPTX
Viruses, Biometrics, Encryption
PDF
120 i143
PDF
The Importance of Multi-Factor Authentication_ Protecting What Matters Most.pdf
information security Lecture by cyber security
Securing corporate assets_with_2_fa
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
Two factor authentication
Image-Based Authentication from Confident Technologies
Evolution of MFA.pptx
Stay safe online- understanding authentication methods
Role Of Two Factor Authentication In Safeguarding Online Transactions
ITSolutions|Currie Network Security Seminar
Biometric Authentication Technology - Report
UNIT 2 Information Security Sharad Institute
Two-Factor Authentication_ Enhancing Security in the Digital Age.pdf
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
Counter Challenge Authentication Method: A Defeating Solution to Phishing Att...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
Viruses, Biometrics, Encryption
120 i143
The Importance of Multi-Factor Authentication_ Protecting What Matters Most.pdf

More from Hai Nguyen (20)

PDF
Sp 29 two_factor_auth_guide
PDF
Session 7 e_raja_kailar
PDF
Scc soft token datasheet
PDF
Rsa two factorauthentication
PDF
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
PDF
Pg 2 fa_tech_brief
PDF
Ouch 201211 en
PDF
N ye c-rfp-two-factor-authentication
PDF
Multiple credentials-in-the-enterprise
PDF
Mobile authentication
PDF
Ijcsi 9-4-2-457-462
PDF
Hotpin datasheet
PDF
Gambling
PDF
Ds netsuite-two-factor-authentication
PDF
Datasheet two factor-authenticationx
PDF
Csd6059
PDF
Cryptomathic white paper 2fa for banking
PDF
Citrix sb 0707-lowres
PDF
Bi guardotp
PDF
Attachment 1 – mitigation measures for two factor authentication compromise
Sp 29 two_factor_auth_guide
Session 7 e_raja_kailar
Scc soft token datasheet
Rsa two factorauthentication
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Pg 2 fa_tech_brief
Ouch 201211 en
N ye c-rfp-two-factor-authentication
Multiple credentials-in-the-enterprise
Mobile authentication
Ijcsi 9-4-2-457-462
Hotpin datasheet
Gambling
Ds netsuite-two-factor-authentication
Datasheet two factor-authenticationx
Csd6059
Cryptomathic white paper 2fa for banking
Citrix sb 0707-lowres
Bi guardotp
Attachment 1 – mitigation measures for two factor authentication compromise

Identity cues two factor data sheet

  • 1. Identity Cues Two Factor™ & Two Way Authentication Maximum Security with Maximum Convenience “Sometimes the easiest answers are the best.” John Dix, Editor-in-Chief of Network World, describing Identity Cues Green Armor Solutions Inc. ◊ +1 (201) 801-0383 ◊ www.greenarmor.com ◊ info@greenarmor.com © 2006 Green Armor Solutions, Inc. Green Armor Solutions, Green Armor, Identity Cues, Identity Cues Two Factor, the Green Armor Solutions logo, and the slogan “Maximum Security with Maximum Convenience” are trademarks of Green Armor Solutions, Inc. All Rights Reserved. TM Maximum Security True Two-Factor Authentication - Identity Cues Two Factor delivers true two-factor authentication. It never relies on users answering questions (whose answers can often be obtained by criminals) in lieu of a two-factor sign on. Protection against Man-In-the-Middle Attacks Unlike other two-factor authentication systems, Identity Cues Two Factor protects against man-in- the-middle attacks – using dual defenses. Two-Way (Mutual) Authentication - A unique combination of technology and psychology proactively informs users whether or not a website is legitimate. Visual cues are optimized per the human recognition process in order to ensure maximum effectiveness. Maximum Convenience Easiest two-factor authentication for users - Identity Cues Two Factor requires no user enrollment, no software downloads, no secrets to be remembered, no devices to be carried, and no extra steps to be endured during login. Support for Numerous Web Environments Identity Cues Two Factor runs on numerous platforms, easily scales to meet the needs of organizations of all sizes, and requires little ongoing maintenance. Identity Cues Two Factor is a unique, user-friendly authentication system that both strongly authenticates users to an online system as well as informs users whether they are interacting with a legitimate web site or with a criminal’s clone site. As the most user-friendly two-factor (and two-way) authentication system available today, Identity Cues Two Factor typically requires no user enrollment, no extra steps during the login process, no devices to be carried, no user training, and little ongoing maintenance. Authentication using passwords or “secret” answers to questions poses serious risks — if an unauthorized party obtains a password or answer he can gain inappropriate access to sensitive resources. Two-factor authentication – in which users must possess a physical device in addition to knowing a password – is a far more secure. In fact, the Federal Financial Institutions Examination Council (FFIEC) has instructed US-based financial institutions to implement two-factor authentication for all online account access. But, two-factor authentication can be inconvenient for users. It also does not adequately address the issue of phishing, and is usually vulnerable to man-in-the-middle attacks (such as those recently leveraged by criminals to successfully breach financial institutions that use two-factor authentication). With phishing costing American businesses over $1-billion annually, and with targeted corporate phishing (also known as spear phishing) causing significant breaches of sensitive corporate information, two-way authentication – in which systems prove their identity to users – is crucial. Identity Cues Two Factor exceeds FFIEC guidelines and delivers both two- way and two-factor authentication in the most user-friendly fashion. Simple: Identity Cues Two Factor is delivered as software that easily integrates with existing web sites. True two factor authentication takes place behind the scenes, and obvious cues enable all users to instinctively recognize whether or not they are interacting with an intended legitimate business. Effective: Identity Cues Two Factor delivers true two-factor and two-way security without requiring users to make a conscious decision as to whether they are accessing a legitimate website. Psychology leveraged in the design helps ensure effectiveness even when users do not pay attention to visual cues. Secure: Patent-pending technology authenticates users as well as the computers they use for access. Users type their login names & passwords as they always have – with no added steps. When a user accesses from an unknown machine a one-time password is required for access; the one-time password can be sent to the user via an email message, an SMS to his cellphone, or generated by a third-party product such as a hardware token. Identity Cues Two Factor generates visual cues to prove the veracity of websites; cues are generated by applying one-way cryptographic functions to user-entered text and a series of secret keys. Only the genuine site can generate the proper cue for any particular user; if no cue or an incorrect cue is displayed, it will be obvious to even an untrained user – and even to users not paying attention – that something is wrong with the site. Identity Cues Two Factor also offers double protection against man-in-the-middle attacks, cueing users when a site is legitimate, and warning them when it is not.