SlideShare a Scribd company logo
Intuitive and Secure, Image-Based Authentication
Poor Authentication on the WebWebsite security is the most vulnerable area of IT security96%of all breached records were accessed from outside, often by using stolen login credentials or keyloggers that capture passwords
Passwords are poor security:
People have too many to remember, choose weak passwords, use the same password on multiple sites
Vulnerable to key loggers, brute force attacks, dictionary attacks, etc.
Login credentials leaked from one site are used to access other sites
Challenge Questions are poor security
Tokens, Smart Cards, Biometrics are expensive, not practical for public-facing websitesCompany Confidential Information
How to Balance Security & UsabilityThe need for strong security that is easy-to-useBusinesses sacrifice security in an effort to create a “frictionless” experience for online customers.
This leads to online fraud and identity theft ($221 Billion in fraud last year alone!),  data breaches and other security compromises.

More Related Content

What's hot (20)

PDF
Android Based Total Security for System Authentication
IJERA Editor
 
PDF
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
PDF
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
 
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
PDF
Security issues in grid computing
ijcsa
 
PDF
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
PDF
Ijsrdv8 i10355
aissmsblogs
 
PDF
Securing Cloud Using Fog: A Review
IRJET Journal
 
PDF
A cryptographic mutual authentication scheme for web applications
IJNSA Journal
 
PDF
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
 
PDF
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
International Journal of Technical Research & Application
 
PDF
Ijcnc050205
IJCNCJournal
 
PDF
Ld3420072014
IJERA Editor
 
PPTX
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
 
PDF
Network security projects
tcpipguru
 
PDF
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
PDF
Kx3518741881
IJERA Editor
 
PDF
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IJCSIS Research Publications
 
PDF
M-Pass: Web Authentication Protocol
IJERD Editor
 
DOCX
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 
Android Based Total Security for System Authentication
IJERA Editor
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
IJNSA Journal
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
IRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET Journal
 
Security issues in grid computing
ijcsa
 
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
Ijsrdv8 i10355
aissmsblogs
 
Securing Cloud Using Fog: A Review
IRJET Journal
 
A cryptographic mutual authentication scheme for web applications
IJNSA Journal
 
Behavioural biometrics and cognitive security authentication comparison study
acijjournal
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
International Journal of Technical Research & Application
 
Ijcnc050205
IJCNCJournal
 
Ld3420072014
IJERA Editor
 
Cloud assisted mobile-access of health data with privacy and auditability
IGEEKS TECHNOLOGIES
 
Network security projects
tcpipguru
 
A Review Study on Secure Authentication in Mobile System
Editor IJCATR
 
Kx3518741881
IJERA Editor
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
IJCSIS Research Publications
 
M-Pass: Web Authentication Protocol
IJERD Editor
 
Cloud assisted mobile-access of health data with privacy and auditability
Adz91 Digital Ads Pvt Ltd
 

Viewers also liked (10)

PDF
Multiple grid based graphical text password authentication
eSAT Publishing House
 
PPTX
Graphical password authentication system ppts
Nimisha_Goel
 
PDF
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
 
PPTX
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
Arathi Jayaprakash
 
PPTX
Authentication scheme for session password using Images and color
Nitesh Kumar
 
PPT
Graphical password authentication
anilaja
 
PPTX
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Deepak Yadav
 
PPTX
Image based authentication
أحلام انصارى
 
PPTX
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
PPTX
Graphical password authentication
Asim Kumar Pathak
 
Multiple grid based graphical text password authentication
eSAT Publishing House
 
Graphical password authentication system ppts
Nimisha_Goel
 
Authentication Scheme for Session Password using matrix Colour and Text
IOSR Journals
 
IMAGE FEATURE BASED AUTHENTICATION AND DIGITAL SIGNATURE FOR WIRELESS DATA TR...
Arathi Jayaprakash
 
Authentication scheme for session password using Images and color
Nitesh Kumar
 
Graphical password authentication
anilaja
 
Image Based Password Authentication for Illiterate using Touch screen by Deep...
Deepak Yadav
 
Image based authentication
أحلام انصارى
 
Ppt for graphical password authentication using cued click points
Hari Krishnan
 
Graphical password authentication
Asim Kumar Pathak
 
Ad

Similar to Image-Based Authentication from Confident Technologies (20)

PPTX
How To Make Mobile Apps Secure - Mobile login multifactor authentication.
CCS Global Tech
 
PPTX
Confident Technologies Presentation for Fiserv
Confident Technologies
 
PDF
A secure communication in smart phones using two factor authentication
eSAT Journals
 
PDF
A secure communication in smart phones using two factor authentications
eSAT Publishing House
 
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
PDF
SmartCard Forum 2011 - Evolution of authentication market
OKsystem
 
PDF
Class paper final
Anusha Manchala
 
PDF
Sms passcode
TechMeetups
 
PDF
ConfidentID_broc
Wendy Wheeler
 
PDF
Two aspect authentication system using secure
Uvaraj Shan
 
PDF
Two aspect authentication system using secure
Uvaraj Shan
 
DOC
status
pixeldemo
 
DOC
ffv
pixeldemo
 
DOC
status
pixeldemo
 
PDF
Zsun
Hai Nguyen
 
PPTX
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
PPT
Eds user authenticationuser authentication methods
lapao2014
 
PDF
Strong Authentication in Cyberspace 8 key principles for policymakers
Mark Gibson
 
PDF
UNIT 2 Information Security Sharad Institute
SatishPise4
 
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus
 
How To Make Mobile Apps Secure - Mobile login multifactor authentication.
CCS Global Tech
 
Confident Technologies Presentation for Fiserv
Confident Technologies
 
A secure communication in smart phones using two factor authentication
eSAT Journals
 
A secure communication in smart phones using two factor authentications
eSAT Publishing House
 
Multi Factor Authentication Whitepaper Arx - Intellect Design
Rajat Jain
 
SmartCard Forum 2011 - Evolution of authentication market
OKsystem
 
Class paper final
Anusha Manchala
 
Sms passcode
TechMeetups
 
ConfidentID_broc
Wendy Wheeler
 
Two aspect authentication system using secure
Uvaraj Shan
 
Two aspect authentication system using secure
Uvaraj Shan
 
status
pixeldemo
 
status
pixeldemo
 
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
Eds user authenticationuser authentication methods
lapao2014
 
Strong Authentication in Cyberspace 8 key principles for policymakers
Mark Gibson
 
UNIT 2 Information Security Sharad Institute
SatishPise4
 
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Micro Focus
 
Ad

Recently uploaded (20)

PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
July Patch Tuesday
Ivanti
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 

Image-Based Authentication from Confident Technologies

  • 1. Intuitive and Secure, Image-Based Authentication
  • 2. Poor Authentication on the WebWebsite security is the most vulnerable area of IT security96%of all breached records were accessed from outside, often by using stolen login credentials or keyloggers that capture passwords
  • 3. Passwords are poor security:
  • 4. People have too many to remember, choose weak passwords, use the same password on multiple sites
  • 5. Vulnerable to key loggers, brute force attacks, dictionary attacks, etc.
  • 6. Login credentials leaked from one site are used to access other sites
  • 7. Challenge Questions are poor security
  • 8. Tokens, Smart Cards, Biometrics are expensive, not practical for public-facing websitesCompany Confidential Information
  • 9. How to Balance Security & UsabilityThe need for strong security that is easy-to-useBusinesses sacrifice security in an effort to create a “frictionless” experience for online customers.
  • 10. This leads to online fraud and identity theft ($221 Billion in fraud last year alone!), data breaches and other security compromises.
  • 11. Businesses struggle to enforce strong authentication without burdening customers. These issues are compounding as people do more online interactions using mobile devices. Company Confidential Information
  • 12. Image-Based AuthenticationConfident ImageShield™ Image-based authentication that creates a one-time passwordThe first time a user enrolls, they select a few categories to rememberWhen authentication is needed, they are presented with a grid of random imagesThey identify the images that fit their secret categories and enter the corresponding letters as their one-time password or PIN The pictures, their locations and the letters are different every time – creating a unique authentication code each time. Company Confidential Information
  • 13. Two Factor, Mobile AuthenticationConfident Multifactor Authentication™ A one-time password (OTP) is encrypted within an ImageShield. ImageShield is displayed on the user’s mobile device, they identify the pictures that fit their secret categories – thus reassembling the OTPReassembled OTP is submitted to be verifiedOnly if the user identified the correct images will they have the correct OTP Web page proceeds automatically if authentication is correct – the entire process remains out-of-band from the web sessionCompany Confidential Information
  • 14. Two Factor, Mobile AuthenticationConfident Multifactor Authentication™ Generates a one-time password, hidden from view
  • 15. User applies a “shared secret” on the second factor
  • 17. Only the legitimate user is able to use the second factor
  • 19. Secure if someone else has possession of your mobile device (loss or theft)
  • 21. Two-Factor AuthenticationApplication on the SmartphonePush technology triggers an app on the phone to display the ImageShieldUser taps the images that fit their secret categoriesAuthentication remains entirely out-of-bandCompany Confidential Information
  • 22. Two-Factor AuthenticationZero-Footprint DeploymentAn SMS message is sent to the user’s phoneThe ImageShield is opened in the mobile browserThe user taps the pictures that fit their secret categories The authentication is confirmed. The entire process remains out-of-band.Company Confidential Information
  • 23. Confident KillSwitchTMIn addition to choosing their secret categories for authentication, the user chooses one or more “No Pass” categories
  • 24. Positively identifies hackers in the act of trying to break into an accountXCaptures behavioral biometrics, IP address, geographic information, actionable data so business can take immediate proactive measures against the attacker, lock the account, send alerts and moreXCan alert the business to a wide-scale, brute-force attack on the business in real-time Intuitive and Secure, Image-Based AuthenticationThank You!www.ConfidentTechnologies.comTry the Live Demos at: www.ConfidentTechnologies.com/demosWatch Our Videos at www.Youtube.com/ConfidentTech

Editor's Notes

  • #3: Source: 2010 Data Breach Report by Verizon and US Secret Service
  • #4: Source:http://mashable.com/2011/01/29/identity-theft-infographic
  • #5: Image-based authentication from Confident Technologies is both highly secure and easy to use. It creates one-time passwords or PINs each time authentication is needed, yet it is easy and intuitive to use. The pictures, their location on the display, and the alphanumeric characters overlaid on the images are different each time. In this way, it creates a unique, one-time password (OTP) every time. However, the user’s categories always remain the same. They simply look for the pictures that fit their secret categories. Each ImageShield has a unique ID and a limited life span so it can only be used once.
  • #6: Confident Technologies generates a one-time authentication code (a.k.a. a one-time password), splits the code apart and assigns pieces of the code to pictures that match the user’s secret categories. “Dummy” pieces of code are randomly assigned to other random pictures. An ImageShield is displayed on the user’s smartphone or mobile device – this can be done using a web browser (zero-footprint deployment) or using an application/soft token on the smartphone. The user taps the pictures that fit their secret categories, thus reassembling the authentication code. The code assembled by the user is sent back to Confident Technologies to be verified. Only if they identified the correct pictures in the correct order will the code be reassembled correctly and authentication is confirmed. The entire process remains out-of-band from the web session.
  • #7: Many common two-factor solutions send the user a one-time password or PIN as a text message. If someone else is in possession of the phone, or using SMS-forwarding technology (also known as a Zeus-in-the-mobile attack), they can easily read the text and authenticate their own fraudulent transactions. Confident Multifactor Authentication is more secure because it requires the user to apply a piece of secret knowledge on the second factor device itself. This makes it a multi-layer, multifactor solution. The user simply taps the images that fit their secret categories on the smartphone. The entire authentication process remains completely out-of-band and the one-time password or PIN is essentially “hidden in plain sight.” Even if someone else gained physical or virtual possession of your phone, they would not be able to authenticate because they would not know the correct images to identify. It can provide behavioral biometrics and other data for adaptive, risk-based authentication and decision making.
  • #8: During out-of-band authentication, a one-time authentication code or single use transaction authentication number (mTAN) is generated. Pieces of the code are “hidden behind” the pictures that are associated with the user’s secret categories. “Dummy” pieces of code are randomly associated with the other random pictures on the ImageShield. When the user identifies the pictures that fit their secret categories, they are essentially reassembling the one-time authentication code. The application on the phone communicates with the Confident Technologies server and we check to see if the user reassembled the one-time code correctly. Only if the user knows their secret categories will they be able to reassemble the correct code and authenticate.
  • #9: Using the zero-footprint deployment model, the user is sent a text message with a secure link. They open the link in the mobile phone’s web browser to see the ImageShield and simply tap the pictures that fit their secret categories to authenticate. Because it uses a mobile browser, Confident Technologies can compare the IP address of the computer used for the web session with the IP address of the mobile browser to make sure that they are geographically close – this helps ensures that the text message was not re-routed to a different phone.
  • #10: If a hacker or a bot attempts to access the account by guessing login credentials or using a brute-force attack, and selects an image that fits one of the user’s “no pass” categories, Confident KillSwitch can automatically alert the business or account owner,lock all access to the account, or present increasingly difficult ImageShield challenges while gathering important information including the IP address, geographic location and behavioral biometrics of the would-be attacker. Confident KillSwitch can positively distinguish between a legitimate user who may have mistakenly identified one wrong image and a fraudulent authentication attempt. With each additional authentication attempt, it actually makes it less likely for an attacker to be able to correctly guess the secret and more likely for the attacker to be caught.