SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
Entrust IdentityGuard Mobile
Software Development Kit
                                                                                         Product Benefits
                                                                                         • Provides financial institutions with a
Mobile devices are now the centerpiece to consumer lifestyles. From email                  simple approach to deploying two-factor
communication, social networking, banking, commerce, shopping and                          authentication to the mobile session
personal entertainment, mobile devices have enabled a radical shift in the                 without impacting the user experience
manner in which organizations can now service their customers.                           • Leverages the mobile device to provide
                                                                                           strong two-factor authentication and
                                                                                           stops advanced malware attacks, such
Financial institutions are certainly no exception to this transformation. In fact,         as man-in-the-browser
regulatory compliance, industry mandates and brand integrity typically place
                                                                                         • Enhances the security of transactions
financial institutions in one of the most difficult positions. These organizations           on mobile devices in a manner that
strive to provide mobile services while ensuring customer identities and data              is simple, quick and un-obtrusive for
are protected.                                                                             the user
                                                                                         • Provides a single mobile application to
But the growth in mobile devices and the drive to move more services to the                meet mobile and online security needs
mobile channel has also increased incidences of fraud targeting these devices.           • Support for leading mobile platforms
Whether simple rogue text messages, fictitious billing scams, or more malicious            including Apple iOS, RIM BlackBerry,
                                                                                           Google Android and Microsoft Windows
attacks using malware installed on the device, the number of attacks are                   Mobile (6.0-6.5)
increasing at an alarming rate.                                                          • Customizable to include organization-
                                                                                           specific branding for increased user
Building Confidence                                                                        acceptance
For many, the lack of security on these devices is a major inhibitor to their adoption
of mobile banking. As banks look to address these issues and capitalize on the
opportunities of the mobile environment, they are also challenged by the need
to bolster customer confidence in online banking.

Organizations seek methods to properly enhance the security of transactions
on these devices in a manner that is simple, quick and un-obtrusive for the user.
Yet the proliferation of mobile devices offers financial institutions an opportunity
to leverage the device itself to strengthen both online and mobile security, while
addressing customer demand for extended mobile banking services.

Simple & Strong Mobile Authentication
With Entrust’s easy-to-use software toolkit, it’s simple to leverage the
Entrust IdentityGuard versatile authentication platform into mobile banking
applications — bringing advanced identity-based security to mobile and
online channels.

The Entrust Software Development Kit (SDK) enables banks to seamlessly embed
strong authentication into an application’s mobile session without requiring the
user to input a one-time passcode (OTP). This provides a simple and secure approach
to protect a user when their password has been compromised.
It also enables financial institutions to incorporate additional              This transparent approach increases end-user value and helps
security features into mobile banking applications to enhance                 build a consistent brand between the mobile application
security for the online channel, including soft tokens and                    and the bank’s online presence. The net result is a mobile
out-of-band transaction verification capabilities.                            application platform that gives financial institutions an edge
                                                                              over competitors with progressive, cross-channel security
Integrating strong authentication and transaction verification                features that are simple to use and effective against today’s
into a mobile application is one of the most effective forms                   most advanced online fraud threats.
of out-of-band transaction verification approaches. While
out-of-band transaction verification using SMS or voice                       Designed for Developers
dial-out transaction provides some protection against fraud                   For software developers creating mobile applications,
attacks, these approaches rely on baseline telecommunication                  security is often a secondary concern. But because of its
technology that has already been compromised.                                 straightforward APIs, the Entrust IdentityGuard Mobile
                                                                              SDK allows developers to easily design and implement
Entrust employs a highly secure, encrypted protocol between                   uniquely branded mobile applications without sacrificing
the server and the mobile device, to provide the most secure                  usability or transparency for end-user adoption.
protection against malicious online threats.
                                                                              The SDK provides a number of capabilities that are invoked
Lead the Market, Enhance the Brand                                            through a simple native platform API. With support for
A branded mobile application provides a simple, easy-to-use                   Apple, Google Android, RIM BlackBerry and Java platforms,
experience for customers. And embedding OTP technology                        the toolkit delivers a common API framework that allows
in a mobile device is more cost-effective than purchasing,                     developers to leverage integration efforts across multiple
issuing and deploying hardware tokens because it leverages                    development environments.
devices that are already widely deployed — increasing
user acceptance.

                                                                                                                  Customer
                                                                                                                  Deployment


     Mobile User                               Customer Mobile App
                     Interaction with          User            Networking
                     Mobile Application        Interface                                                          Authentication
                     (e.g., mobile banking)                                                                       Server




                                               Storage

                                                               Mobile SDK                                         User Self
                                                                                                                  Service Module



                                                               Notification
                                                               Handling




                                               Persistent
                                               On-Device
     Entrust IdentityGuard Mobile Supports:    Storage
     • Transparent soft-token generation                                                                          Notification
     • Visible soft-token display
     • Transaction verification capabilities                                                                      Service
                                                                                                                  (Optional)




Figure 1: Entrust IdentityGuard Mobile SDK architecture overview
Entrust IdentityGuard Mobile — Advantages                         Broad Platform Support. Supports the leading mobile
Secure. Proven mobile authentication that helps defeat            smartphone platforms on the market today, including
advanced malware, including man-in-the-browser attacks.           Apple iOS, RIM BlackBerry, Google Android, and Microsoft
Key to interoperability, it leverages time-based, OATH-           Windows Mobile (6.0-6.5).
compliant OTP authentication and out-of-band transaction
verification on leading mobile devices.                           Standards-Compliant. Uses the OATH standard for
                                                                  time-based, one-time passcode and transaction
Easy to Use. The most convenient, easy-to-use strong              signature generation.
mobile authentication method available today,
Entrust IdentityGuard Mobile enables out-of-band                  Customizable. Includes the ability to add organization-
transaction verification, OATH-compliant signatures               specific branding to each identity, improving usability and
and even a method to immediately report suspicions                reinforcing brand image.
account behavior.

The end-user isn't forced to enter any data within the
smartphone application, only a straightforward Web
confirmation code to complete the transaction online.

Portable. Enables use of leading smartphones to boost
authentication strength by not requiring the user to carry an
extra hardware device or have access to a specific computer.

Cost-Effective. Unlike physical options, Entrust IdentityGuard
Mobile leverages the user’s existing phone; there’s no
extra physical hardware to buy and deploy. In addition,
Entrust IdentityGuard Mobile delivers transaction notifications
directly to the phone without the use of SMS.

Flexible. Supports the use of both simple time-based OTP
as well as out-of-band transaction signatures. Also supports
multiple identities within the same application, enabling
organizations to fully leverage the deployed application
(e.g., a banking ID as well as a corporate remote access ID).
Entrust & You                                                                                      Company Facts
More than ever, Entrust understands your organization’s                                            Website: www.entrust.com
security pain points. Whether it’s the protection of                                               Employees: 359
information, securing online customers, regulatory                                                 Customers: 5,000
compliance or large-scale government projects, Entrust                                             Offices: 10 globally
provides identity-based security solutions that are not
only proven in real-world environments, but cost-effective                                          Headquarters
in today’s uncertain economic climate.                                                             One Lincoln Centre
                                                                                                   5400 LBJ Freeway, Suite 1340
The smart choice for properly securing digital identities                                          Dallas, Texas 75240 USA
and information, Entrust solutions represent the right
balance between affordability, expertise and service.                                               Sales
For more information on Entrust IdentityGuard Mobile                                               North America: 1-888-690-2424
and the platform’s SDK, contact the Entrust representative                                         EMEA: +44 (0) 118 953 3000
in your area at 888-690-2424 or visit entrust.com/mobile.                                          Email: entrust@entrust.com




About Entrust
A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations
spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain
points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust
products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com.




Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product
names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks
or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved.
                                                                                                                                                                                    24281/4-11

Más contenido relacionado

Más de Entrust Datacard

Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionEntrust Datacard
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEntrust Datacard
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Datacard
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Datacard
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Datacard
 

Más de Entrust Datacard (7)

Advanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure ProtectionAdvanced Solutions for Critical Infrastructure Protection
Advanced Solutions for Critical Infrastructure Protection
 
Easing the Pains of Certificate Management
Easing the Pains of Certificate ManagementEasing the Pains of Certificate Management
Easing the Pains of Certificate Management
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Entrust Mobile Security Solutions
Entrust Mobile Security SolutionsEntrust Mobile Security Solutions
Entrust Mobile Security Solutions
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Entrust IdentityGuard Mobile Software Developlment Kit (SDK)

  • 1. Entrust IdentityGuard Mobile Software Development Kit Product Benefits • Provides financial institutions with a Mobile devices are now the centerpiece to consumer lifestyles. From email simple approach to deploying two-factor communication, social networking, banking, commerce, shopping and authentication to the mobile session personal entertainment, mobile devices have enabled a radical shift in the without impacting the user experience manner in which organizations can now service their customers. • Leverages the mobile device to provide strong two-factor authentication and stops advanced malware attacks, such Financial institutions are certainly no exception to this transformation. In fact, as man-in-the-browser regulatory compliance, industry mandates and brand integrity typically place • Enhances the security of transactions financial institutions in one of the most difficult positions. These organizations on mobile devices in a manner that strive to provide mobile services while ensuring customer identities and data is simple, quick and un-obtrusive for are protected. the user • Provides a single mobile application to But the growth in mobile devices and the drive to move more services to the meet mobile and online security needs mobile channel has also increased incidences of fraud targeting these devices. • Support for leading mobile platforms Whether simple rogue text messages, fictitious billing scams, or more malicious including Apple iOS, RIM BlackBerry, Google Android and Microsoft Windows attacks using malware installed on the device, the number of attacks are Mobile (6.0-6.5) increasing at an alarming rate. • Customizable to include organization- specific branding for increased user Building Confidence acceptance For many, the lack of security on these devices is a major inhibitor to their adoption of mobile banking. As banks look to address these issues and capitalize on the opportunities of the mobile environment, they are also challenged by the need to bolster customer confidence in online banking. Organizations seek methods to properly enhance the security of transactions on these devices in a manner that is simple, quick and un-obtrusive for the user. Yet the proliferation of mobile devices offers financial institutions an opportunity to leverage the device itself to strengthen both online and mobile security, while addressing customer demand for extended mobile banking services. Simple & Strong Mobile Authentication With Entrust’s easy-to-use software toolkit, it’s simple to leverage the Entrust IdentityGuard versatile authentication platform into mobile banking applications — bringing advanced identity-based security to mobile and online channels. The Entrust Software Development Kit (SDK) enables banks to seamlessly embed strong authentication into an application’s mobile session without requiring the user to input a one-time passcode (OTP). This provides a simple and secure approach to protect a user when their password has been compromised.
  • 2. It also enables financial institutions to incorporate additional This transparent approach increases end-user value and helps security features into mobile banking applications to enhance build a consistent brand between the mobile application security for the online channel, including soft tokens and and the bank’s online presence. The net result is a mobile out-of-band transaction verification capabilities. application platform that gives financial institutions an edge over competitors with progressive, cross-channel security Integrating strong authentication and transaction verification features that are simple to use and effective against today’s into a mobile application is one of the most effective forms most advanced online fraud threats. of out-of-band transaction verification approaches. While out-of-band transaction verification using SMS or voice Designed for Developers dial-out transaction provides some protection against fraud For software developers creating mobile applications, attacks, these approaches rely on baseline telecommunication security is often a secondary concern. But because of its technology that has already been compromised. straightforward APIs, the Entrust IdentityGuard Mobile SDK allows developers to easily design and implement Entrust employs a highly secure, encrypted protocol between uniquely branded mobile applications without sacrificing the server and the mobile device, to provide the most secure usability or transparency for end-user adoption. protection against malicious online threats. The SDK provides a number of capabilities that are invoked Lead the Market, Enhance the Brand through a simple native platform API. With support for A branded mobile application provides a simple, easy-to-use Apple, Google Android, RIM BlackBerry and Java platforms, experience for customers. And embedding OTP technology the toolkit delivers a common API framework that allows in a mobile device is more cost-effective than purchasing, developers to leverage integration efforts across multiple issuing and deploying hardware tokens because it leverages development environments. devices that are already widely deployed — increasing user acceptance. Customer Deployment Mobile User Customer Mobile App Interaction with User Networking Mobile Application Interface Authentication (e.g., mobile banking) Server Storage Mobile SDK User Self Service Module Notification Handling Persistent On-Device Entrust IdentityGuard Mobile Supports: Storage • Transparent soft-token generation Notification • Visible soft-token display • Transaction verification capabilities Service (Optional) Figure 1: Entrust IdentityGuard Mobile SDK architecture overview
  • 3. Entrust IdentityGuard Mobile — Advantages Broad Platform Support. Supports the leading mobile Secure. Proven mobile authentication that helps defeat smartphone platforms on the market today, including advanced malware, including man-in-the-browser attacks. Apple iOS, RIM BlackBerry, Google Android, and Microsoft Key to interoperability, it leverages time-based, OATH- Windows Mobile (6.0-6.5). compliant OTP authentication and out-of-band transaction verification on leading mobile devices. Standards-Compliant. Uses the OATH standard for time-based, one-time passcode and transaction Easy to Use. The most convenient, easy-to-use strong signature generation. mobile authentication method available today, Entrust IdentityGuard Mobile enables out-of-band Customizable. Includes the ability to add organization- transaction verification, OATH-compliant signatures specific branding to each identity, improving usability and and even a method to immediately report suspicions reinforcing brand image. account behavior. The end-user isn't forced to enter any data within the smartphone application, only a straightforward Web confirmation code to complete the transaction online. Portable. Enables use of leading smartphones to boost authentication strength by not requiring the user to carry an extra hardware device or have access to a specific computer. Cost-Effective. Unlike physical options, Entrust IdentityGuard Mobile leverages the user’s existing phone; there’s no extra physical hardware to buy and deploy. In addition, Entrust IdentityGuard Mobile delivers transaction notifications directly to the phone without the use of SMS. Flexible. Supports the use of both simple time-based OTP as well as out-of-band transaction signatures. Also supports multiple identities within the same application, enabling organizations to fully leverage the deployed application (e.g., a banking ID as well as a corporate remote access ID).
  • 4. Entrust & You Company Facts More than ever, Entrust understands your organization’s Website: www.entrust.com security pain points. Whether it’s the protection of Employees: 359 information, securing online customers, regulatory Customers: 5,000 compliance or large-scale government projects, Entrust Offices: 10 globally provides identity-based security solutions that are not only proven in real-world environments, but cost-effective Headquarters in today’s uncertain economic climate. One Lincoln Centre 5400 LBJ Freeway, Suite 1340 The smart choice for properly securing digital identities Dallas, Texas 75240 USA and information, Entrust solutions represent the right balance between affordability, expertise and service. Sales For more information on Entrust IdentityGuard Mobile North America: 1-888-690-2424 and the platform’s SDK, contact the Entrust representative EMEA: +44 (0) 118 953 3000 in your area at 888-690-2424 or visit entrust.com/mobile. Email: entrust@entrust.com About Entrust A trusted provider of identity-based security solutions, Entrust empowers governments, enterprises and financial institutions in more than 5,000 organizations spanning 85 countries. Entrust’s award-winning software authentication platforms manage today’s most secure identity credentials, addressing customer pain points for cloud and mobile security, physical and logical access, citizen eID initiatives, certificate management and SSL. For more information about Entrust products and services, call 888-690-2424, email entrust@entrust.com or visit www.entrust.com. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All other Entrust product names and service names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited in certain countries. All other company names, product names and logos are trademarks or registered trademarks of their respective owners. © Copyright 2012 Entrust. All rights reserved. 24281/4-11