General discussion


Internet Security and eAuthentication Service

By arnnei ·
Tags: Off Topic
blog root

This conversation is currently closed to new comments.

2 total posts (Page 1 of 1)  
| Thread display: Collapse - | Expand +

All Comments

Collapse -

free !! Internet Sceurity solution to phishing

by arnnei In reply to Internet Security and eAu ...

<p>Mega AS Ltd (<a href=""></a>=) is now starting a marketing campaign for our CAT Internet Security solution. As part of the campaign, <strong>we are providing the tool for free</strong> (conditions apply) to selected Internet services.</p>
<p>The CAT (Cellular Authentication Token) is TFA (Two Factors Authentication) OTP (One Time Password) Internet security tool. </p>
<p>The CAT has 2 modules. One for the end users - a software token that runs on Java enabled Cellulars and is downloaded from the Internet. And a Server side Authentication software that is linked to the Login page to verify the incoming ID and One Time Password.</p>
<p>Our solution is specially made for Internet based services, for all end users and any number of them, easy to deploy and don?t have any additional costs to the end user. The security level is like the old proprietary hardware tokens technology each costing between 10 to 100 dollars a person.</p>
<p>Phone: +64 9 5759580<br />Skype: arnneisp<br />Email: <a href=""></a><br /><a href=""></a></p>

Collapse -

What is a CAT (Cellular Authentication Token) for Internet Security

by arnnei In reply to Internet Security and eAu ...

<p dir="ltr"><span>A CAT (Cellular Authentication Token) is <strong>a free software token</strong> that can be downloaded to your Cellular like a game. It runs locally on the Cellular and does not require communication with the server (like SMS or other).<?xml:namespace prefix =" o" ns =" "urn:schemas-microsoft-com:office:office"" /></span></p>
<p dir="ltr"><span>The CAT is used to produce TFA (Two Factor Authentication) OTPs (One Time Passwords). The TFA OTP is a proven methodology for protecting against Identity Stealing (phishing) over the Internet. The idea is simple. A stand alone token generates for the holder a unique password for each Login or every 60 seconds. The end user is required to enter his ID and OTP when he logs to his Internet service. If the OTP is captured by malicious programs it either already changed or it has been used already.</span></p>
<p dir="ltr"><span>The current solutions implementing the TFA OTP are usually proprietary hardware tokens that cost between 10 to 100 dollars a token. Each token is for one account. If you have more then one account you carry a number of these hardware gadgets with you.</span></p>
<p dir="ltr"><span>The thinking behind the hardware token belongs to an age where only some VIPs where carrying a token to enter a secured remote service. The problem became apparent when everybody started using Internet and Internet based Services. Now, the services were required to protect masses of clients. A small bank has about 200,000 Internet users some with more then one account. The costs of covering them are enormous. These are not just the costs of the software/hardware. A major cost is the management and deployment of the tokens ? buying them, delivering to the customers, instructing, helping, handling lost and broken tokens etc. In short, the current old proprietary hardware token are no suited to the new era.</span></p>
<p dir="ltr"><span>The Internet is not a place where you have to identify the person. This is a mistake to treat it like real world. <b>In the virtual world, people have multiple virtual identities</b>. In that environment, the people want to be verified. Not identified. This is another setback to the old tokens that have to be handed over to a real person.</span></p>
<p dir="ltr"><span>When a Mr. X registers to an eCommerce or an eForum he does not expect to provide all his details. But he does expect to be protected by the site. He does not want somebody else to find his password as Mr. X and use his credentials for what ever it is he is doing at the site.</span></p>
<p dir="ltr"><span>The CAT is the answer. It was developed specially to cover that environment. Every body can download the CAT when they want it, and<strong> every Internet Service can afford to provide the CAT</strong> Authentication Server side. They can either purchase it for in-house installation or use an eAuthentication service.</span></p>
<p dir="ltr"><span>The web site can provide side by side a regular database oriented Register/Login pages and an OTP based Register/Login page. The end user can decide which one to use. If he chooses OTP he gets instructions how to download the application to his Cellular ? but the Telecom Company can provide the download support.</span></p>
<p dir="ltr"><span>Using the Cellular is no burden. The CAT can manage any number of accounts/web sites. Again, this is the Internet age. We anticipate that all sites will provide TFA OTP secured login, so the end user needs a token that can manage all his passwords ? including those who are still fixed passwords.</span></p>
<p dir="ltr"><span>In short, <strong>the CAT is the future of secured Internet and Authentication</strong></span></p>
<p dir="ltr"><span></span></p>
<p dir="ltr"><span>(eAuthentication is a free service for SMBs&nbsp</span></p>
<p dir="ltr"><span> </span></p>
<p dir="ltr"><span> </span></p>
<p dir="ltr"><span> </span></p>
<p dir="ltr"><span><font size="3"> </font></span></p>
<p> </p>

Back to After Hours Forum
2 total posts (Page 1 of 1)  

Related Discussions

Related Forums