SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
CIDWAY – Mobile USPs


Discover the future of security on www.cidway.com
FAQ on Mobile Authentication                                 Sesami Mobile is the answer


•     What are the risks if I loose my phone ?
•     What are the risks to download a fake application from a mobile public store ?
•  How easy is it to activate the application and what are the risks during the process ?
OK


•     Do I need connectivity to Authenticate ?
•     What are the risks of brute force, man in the middle and other sophisticated attacks ?
•     Did the application pass penetration tests ?
•     What are the coding techniques to guarantee top security ?
•     Are they credentials transmitted over the air ? What are the risks ?
•     Is it time based ? Challenge response ?
•     What happens when the user change the time zone or the phone clock changes ?
•     Does it work on all Mobile platforms ?
•     Is it possible to customize the application ?
•     Can we use the Authentication application within another Mobile solution for example for
      Mobile Banking ?
•     Is the solution already deployed and used for Mobile authentication and Mobile
      Transactions ?
•     Does the solution considered supports real time-based OTP, mutual-authentication &
      transaction signature ?

© 2011 CIDWAY Security SA. All rights reserved – www.cidway.com                                  2
CIDWAY USPs (1/4)


  1. User Experience
  ²    Competitors’ mobile applications (when time based) have a countdown (30s
        & 40s) when the OTP displayed is automatically changed. That potentially
        creates:
           ü    User’s stress at input (only X seconds left to input my OTP!), therefore increases
                 the potential input error rate
           ü    Waiting time: User prefers to wait until next OTP to have the “full” time-span to
                 input the OTP (that simply can generate 9’000 hours of client’s waiting time per
                 year for a deployment of 100’000 users)

  ²    Competitors don’t support automatic resynchronization when User change
        the time of the phone (travelling, etc…), beyond 10min… With Cidway “time
        management”, input another OTP is enough instead of a complex re-synch
        process (including potentially a call to the Bank’s Call Center).
  ²    No waiting time for resending an OTP also in Mobile Banking, as with Cidway
        technology, the next OTP can be generated just 1 second after!


© 2011 CIDWAY Security SA. All rights reserved – www.cidway.com                                       3
CIDWAY USPs (2/4)


   2. Security
 ²    Only Cidway has this unique & patented PIN protection, that is NOT stored on
       the phone at all (not even encrypted), never transmitted over the network,
       neither stored on the Server! Vasco hash the PIN on the phone for example !
 ²    The PIN code is selected by the User at registration… no additional security
       breach by sending an initial PIN code to the User
 ²    Higher security level of the provisioning process, in which the key is generated
       by the mobile application itself
 ²    Secure download process from Mobile Store (patent filed) to avoid a fake
       application, unique to Cidway
 ²    Time stamping of the OTPs, not supported by Competitors
 ²    No possible brute-force attack on the PIN, as not store on the mobile
 ²    Unique mutual-authentication (with time-based OTP), enabled for eBanking &
       mBanking
 ²    No need for connected-mode for Transaction signature, reducing interception
       risks
© 2011 CIDWAY Security SA. All rights reserved – www.cidway.com                           4
CIDWAY USPs (3/4)


  3. Functionalities
  ²    Supports all common functionalities: OTP, Challenge-Response, Transaction
        Signature, plus mutual-authentication (not supported by competitors)
  ²    ALL functionalities available also on the mobileSDK
  ²    Unique Mobile-Launcher: launch a Web-based mobile application (directly from
        the mobile) performing a 2-factor authentication, fully transparent for the user.
  ²    Embedding of several “functionalities” with menus in the “same” mobile
        application (e.g. eBanking, mBankingWeb, CallCenter…)
  ²    Already exists on all platforms (iPhone, iPad, iPod, WinMob, Android, RIM,
        Symbian & others (Java), Brew)




© 2011 CIDWAY Security SA. All rights reserved – www.cidway.com                             5
CIDWAY USPs (4/4)

  4. Support & Deployment
  ²    A fully integrated self-service deployment platform (with automatic detection
        of phone types & stores) reduces significantly the deployment & support
        costs
  ²    A fully integrated RENEW service (when a User changes or looses his
        phone) also reduces significantly the support costs: 200’000 phones at an
        average change rate every 18 months, will generate on average 200
        changes per day!
  ²    Automatic time resynchronization reduces immensely the support costs:
        only 5% of desynchronized users (on 200’000 users), once a year, would
        generate about 30 calls per day, just for resynch, if not using Cidway
        technology!




© 2011 CIDWAY Security SA. All rights reserved – www.cidway.com                         6

Más contenido relacionado

Destacado

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destacado (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Cidway Mobile Usp 03 2012 V1

  • 1. CIDWAY – Mobile USPs Discover the future of security on www.cidway.com
  • 2. FAQ on Mobile Authentication Sesami Mobile is the answer •  What are the risks if I loose my phone ? •  What are the risks to download a fake application from a mobile public store ? •  How easy is it to activate the application and what are the risks during the process ? OK •  Do I need connectivity to Authenticate ? •  What are the risks of brute force, man in the middle and other sophisticated attacks ? •  Did the application pass penetration tests ? •  What are the coding techniques to guarantee top security ? •  Are they credentials transmitted over the air ? What are the risks ? •  Is it time based ? Challenge response ? •  What happens when the user change the time zone or the phone clock changes ? •  Does it work on all Mobile platforms ? •  Is it possible to customize the application ? •  Can we use the Authentication application within another Mobile solution for example for Mobile Banking ? •  Is the solution already deployed and used for Mobile authentication and Mobile Transactions ? •  Does the solution considered supports real time-based OTP, mutual-authentication & transaction signature ? © 2011 CIDWAY Security SA. All rights reserved – www.cidway.com 2
  • 3. CIDWAY USPs (1/4) 1. User Experience ²  Competitors’ mobile applications (when time based) have a countdown (30s & 40s) when the OTP displayed is automatically changed. That potentially creates: ü  User’s stress at input (only X seconds left to input my OTP!), therefore increases the potential input error rate ü  Waiting time: User prefers to wait until next OTP to have the “full” time-span to input the OTP (that simply can generate 9’000 hours of client’s waiting time per year for a deployment of 100’000 users) ²  Competitors don’t support automatic resynchronization when User change the time of the phone (travelling, etc…), beyond 10min… With Cidway “time management”, input another OTP is enough instead of a complex re-synch process (including potentially a call to the Bank’s Call Center). ²  No waiting time for resending an OTP also in Mobile Banking, as with Cidway technology, the next OTP can be generated just 1 second after! © 2011 CIDWAY Security SA. All rights reserved – www.cidway.com 3
  • 4. CIDWAY USPs (2/4) 2. Security ²  Only Cidway has this unique & patented PIN protection, that is NOT stored on the phone at all (not even encrypted), never transmitted over the network, neither stored on the Server! Vasco hash the PIN on the phone for example ! ²  The PIN code is selected by the User at registration… no additional security breach by sending an initial PIN code to the User ²  Higher security level of the provisioning process, in which the key is generated by the mobile application itself ²  Secure download process from Mobile Store (patent filed) to avoid a fake application, unique to Cidway ²  Time stamping of the OTPs, not supported by Competitors ²  No possible brute-force attack on the PIN, as not store on the mobile ²  Unique mutual-authentication (with time-based OTP), enabled for eBanking & mBanking ²  No need for connected-mode for Transaction signature, reducing interception risks © 2011 CIDWAY Security SA. All rights reserved – www.cidway.com 4
  • 5. CIDWAY USPs (3/4) 3. Functionalities ²  Supports all common functionalities: OTP, Challenge-Response, Transaction Signature, plus mutual-authentication (not supported by competitors) ²  ALL functionalities available also on the mobileSDK ²  Unique Mobile-Launcher: launch a Web-based mobile application (directly from the mobile) performing a 2-factor authentication, fully transparent for the user. ²  Embedding of several “functionalities” with menus in the “same” mobile application (e.g. eBanking, mBankingWeb, CallCenter…) ²  Already exists on all platforms (iPhone, iPad, iPod, WinMob, Android, RIM, Symbian & others (Java), Brew) © 2011 CIDWAY Security SA. All rights reserved – www.cidway.com 5
  • 6. CIDWAY USPs (4/4) 4. Support & Deployment ²  A fully integrated self-service deployment platform (with automatic detection of phone types & stores) reduces significantly the deployment & support costs ²  A fully integrated RENEW service (when a User changes or looses his phone) also reduces significantly the support costs: 200’000 phones at an average change rate every 18 months, will generate on average 200 changes per day! ²  Automatic time resynchronization reduces immensely the support costs: only 5% of desynchronized users (on 200’000 users), once a year, would generate about 30 calls per day, just for resynch, if not using Cidway technology! © 2011 CIDWAY Security SA. All rights reserved – www.cidway.com 6