simpleicon

Two-Factor Authentication

SecSign ID Two-Factor Authentication uses the perfect mix of established procedures and new technologies. Two-Factor Authentication beyond standard protocol.

Key-points

  • Two-Factor AuthenticationSecure
  • Simple
  • Two-Factor AuthenticationOverall Protection

  • Operate your own on-premise Two-Factor Authentication server
  • We build your own YourBrand ID App – Two-Factor-Authentication with your look and feel
  • Integrate the Two-Factor-Authentication as SDK into existing apps
  • No Smartphone necessary! Custom specified requirements for login with your own server.
  • Standardized plugins for literally any interface you have.

What is Two-Factor Authentication?

For a secure Two-Factor Authentication Login the user needs two distinct factors:

  • The first factor is possession, this can be an ATM card or in our case, it’s the smart phone.
  • The second factor is either knowledge by providing a PIN or password, or biometric identification with a fingerprint scan.

Only if both factors are presented is the login granted. That way even if attackers gain access to one of the factors either by stealing the first or obtaining the second one, they still can’t login.


1. The user enters a user name (SecSign ID) into a web browser

The diagram shows what the web server will request from the identity server (SecSign ID server).

What Happens During This Step
  • a) User enters the SecSign ID through the Internet service
  • b) Internet service requests authentication from the ID server
  • c) ID server sends push notification to the user’s mobile device
  • d) ID server sends access symbol to the Internet service
  • e) Internet service displays the required access symbol

s1

2. The user selects the SecSign ID using a mobile app and enters a PIN

The diagrams shows the messages which are exchanged between mobile device and SecSign ID server.

What Happens During This Step
  • a) Mobile app confirms that the user is the owner of the SecSign ID
  • b) ID server sends access symbols to the mobile app

s1

3. The user selects the correct access symbol using the mobile app

What Happens During This Step
  • a) User confirms the correct access symbol and the mobile app sends this to the ID server
  • b) Internet service checks the status of the authentication session
  • c) ID server confirms access permission
  • d) Web service grants user access

Authentication is simple for the user and highly secure. See for yourself with a free SecSign ID account!

The SecSign ID app allows the user to generate new key pairs for existing IDs at any time. During this process, the key on the mobile device and the key on the ID server will be replaced.

s1

key

Private Key Generation

Highlights
  • RSA-encryption scheme with 2048-bit private keys
  • User creates an ID on the mobile device
  • Asymmetric key pair is generated for future authentication
  • Private key generated and stored on a mobile device
  • Public key stored on the SecSign ID server

Details

The SecSign ID session authentication is based on an RSA-encryption scheme with 2048-bit private keys. The SecSign ID app contains the private key of the user (encrypted with a PIN), and the SecSign ID server knows the user´s public key. During a session authentication for a login, the SecSign ID server verifies possession of the private key and knowledge of the password. The SecSign ID server evaluates the authentication request and informs the requesting service if access can be granted. If the user creates an ID on the mobile device, an asymmetric key pair (RSA) will be generated for future authentication.

The public key will be transmitted in encrypted form to the remote server and will then be deleted on the mobile device. The private key will be encrypted by a PIN and stored on the smart phone. Neither the PIN nor the private key is ever transmitted. Therefore, they cannot be intercepted by a potential attacker. This procedure protects against phishing attacks and direct attacks against the identity server.

Neither the key nor the password is ever transmitted through a network. This protects SecSign ID, your user accounts, and your critical business assets against phishing attacks, malware, or even direct attacks against the web server.



What makes SecSign ID so secure?

What makes the authentication with SecSign ID so secure? It doesn’t simply secure your data, it protects it. A true Challenge Response Authentication with 2048 Bit Key Pairs makes the transfer of sensitive data completely unnecessary. We’ve been working with PKI structures for more than 18 years we know what we are doing.

The protection of the private keys on the user’s device are the main indicator how secure a challenge response authentication is. At SecSign we offer our customers the choice between the two most secure methods of key protection.


Using the patented SecSign ID SafeKey procedure with the best of the best encryption – times 4.

In contrast to other encryption methods, the SafeKey procedures does not provide any vulnerability to brute force attacks. The key has no detectable structure.

Even if an attacker could guess the PIN or passcode and “decrypt” the key, the attacker cannot detect whether the “decrypted” data represents the real key or not.

Only the result of the challenge-response procedure with the ID server can provide this information. The ID server, however, will lock the SecSign ID after 10 unsuccessful login attempts (or fewer attempts if you specify this on an on-premise SecSign ID server). For a brute force attack, an attacker would need many more than 10 attempts in order to successfully guess the PIN or passcode.

The SafeKey procedure is far superior than any other encryption method. It can be used for new or older, Android, iOS and Windows based devices and it is faster than any other method. And with the SafeKey procedure patented by SecSign it is way less attractive for attackers than other encryption methods used on a big scale.


Using the TEE procedure for iOS and Android devices.

The TEE is separated area in the central processing unit of the device that most newer devices have built in. It is detached from the regular processor by hardware and operates its own firmware. It only offers a few, security-relevant functions to reduce points of attack by simplifying firmware and interface as well as preventing for example direct access to the memory.

The TEE particularly protects the cryptographic keys from being copied, for example if the device is infected with malware. An asymmetric key pair is generated in the TEE and the corresponding app is granted only access to the public key. The private key is accessible solely to the TEE and information can be sent from the app to be signed by the private key via the interface. Even if the device is compromised the private key can not be simply read out.

The TEE can communicated with so-called trusted applications via the internal API. That way a secure authentication is possible without making sensitive information accessible to the rich OS.

For more information about our PKI procedures and secure Authentication please contact us or download our Whitepaper.



Wait, is that still Two-Factor Authentication?


With SecSign you can use your phone to login at any mobile login or app. But is that still Two-Factor Authentication? Where is the second factor?

Two-Factor Authentication is defined by having two distinct channels for communication. With the SecSign ID app you still have two encrypted channels: The browser and the app. Even if you use our SDK to integrate the 2FA into your app, the two channels remain.
So to successfully login an account secured with SecSign ID 2FA the user still needs two factors: Possession of the mobile device and either knowledge of the PIN or biometric identification.
It is not possible to intersect login attempts because the private key is located on the mobile device of the user and can’t simply be transferred to a different device.




CUSTOMIZED AUTHENTICATION EXPERIENCE

Maximum brand recognition with your corporate design. We build your company app for you, offer SDKs for easy integration in existing apps or simply add some design modifications to match your profile.
Our SDK for your app also offers true online signatures for improving your workflow.

More information

Latest Blog Posts, Updates & Features

Do NOT follow this link or you will be banned from the site!