InvestorsHub Logo
icon url

dounome

05/22/17 7:58 PM

#165541 RE: dounome #165540

With all these infringers how come you don't see anybody trying to sue strikeforce before 2010 or after,They all seem new at this MFA ooba.
icon url

Stargazer1945

05/22/17 8:13 PM

#165542 RE: dounome #165540

I think they also had a booth for PID and GID...
icon url

ZPaul

05/22/17 8:27 PM

#165544 RE: dounome #165540

RSA encryption was hacked in March 2011 and companies started to realize that security tokens while uses two-factor, uses codes that are too easy for hackers to predict and for that reason are highly vulnerable. OOBA on the other hand, uses “OATH compliant" one time passwords which are 100 percent random. 2011 was just the new beginning for '698/OOBA

So, instead of just using a simple, easy to hack username-password combination, OOBA uses a separate channel to authenticate a user. It might dial a call or send a text message or email to a user’s wireless phone and would require an authentic response in order to permit the login to proceed. The same concept could extend to any transaction being conducted after initial authentication; in other words, you may be logged into Twitter, then try to buy something on another site that logs you in based on your Twitter authentication. To complete the purchase and authorize the transaction, OOBA process would be triggered.

OOBA approach became far more popular after RSA encryption was hacked

The beauty of out-of-band authentication, and the reason it is needed, is that it’s very difficult to defeat. Login-password combinations, and now security tokens like RSA, are child’s play for hackers. These linear approaches are relatively easy to defeat; once a hacker breaches the perimeter, there’s virtually no looking back. But while out-of-band uses technology, it’s really more of a philosophy that’s tough to defeat; make sure the user is who the user claims to be. Though no mechanism can be perfect, there is some simple wisdom in an idea that says, “unless you call me on my phone and confirm that I’m the one who is logging in, don’t permit the login.”

Many peeps will argue that there are all sorts of ways to defeat this concept, but the bottom line is that there are many fewer ways to defeat it than there are to defeat passwords, and those ways are complex enough to turn off all but the more, or most, committed perpetrators.

StrikeForce also has keystroke encryption which is a complement to OOBA and would fill “the security gap any authentication product might have” and would “prevent over 90 percent of the data breaches.

Remember , StrikeForce also provides real-time keystroke encryption and anti-keylogging technology.