Two-factor authentication using a hardware token

Friday, October 23, 2009

RSA-SecurID-hardware-token

We ran into a friend a while back who was logging into her employer’s Virtual Private Network on the weekend. She caught our attention by whipping out her keys and typing in some information from a key-fob. It turns out that her work uses an additional layer of protection for logging into the network. They have implemented a username, pin number, as well as a hardware token system called SecurID.

The hardware consists of a key-fob with an LCD screen on it. A code is displayed on the screen and changes frequently, usually every 60 seconds. The device is generating keys based on a 128-bit encryption seed. When this number is fed to a server that has a copy of that seed, it is used as an additional verification to the other login data.

This seems like a tech trickle-down of the code generating device from GoldenEye. It does get us thinking: with the problems free email services have been having with account theft, why aren’t they offering a fee-based service that includes a security fob? With the right pricing structure this could be a nice stream of income for the provider. We’re also wondering if this can be implemented with a microcontroller and used in our home network. As always, leave comments below and let us know if you’ve already built your own system using these principles.

Update: Thanks to Andre for his comment that tells us this type of security is available for Apache servers. The distribution includes a server side authentication system and a Java based token generator that can run on any handheld that supports Java.

4 komentar:

asia October 25, 2009 at 9:01 PM  

This seems like a tech trickle-down

gomu October 27, 2009 at 7:20 PM  

techno life is techno down

neo29 October 29, 2009 at 6:46 PM  

A password-protected web-based application that stores user passwords encrypted with a one-way hash function; even if the user database is stolen, it is still computationally infeasible to recover original passwords from their hash values.

Post a Comment

  © Blogger template Brownium by Ourblogtemplates.com 2009

Back to TOP