At this year’s PasswordsCon, viaForensics Mobile Researcher David Weinsten presented “Stronger Identity Protection via Mobile Devices”. The presentation was made on July 30, 2013. You can download the .pdf or browse the slides below.

The presentation’s abstract:

In this talk we will show how a mobile phone can promote password security by relieving users from the need to type in long and complex passwords.

The need for stronger passwords and multi-factor authentication in today’s digital environment is widely recognized. There are even special hardware devices offered on the market to facilitate stronger authentication: “password typing” tokens, tokens designed to act as a second authentication factor, etc. Such solutions are often limited, e.g., they can “type” only one password, limited to certain systems, or require significant backend integration effort from software developers.

In this talk we will re-visit the idea of using mobile phones in a multi-factor authentication. Unlike previous approaches, we won’t limit ourselves with sending codes over SMS or OTP generation on the device. Instead, we will turn an Android phone into a “password typing” device that acts similarly to YubiKey(R) but is not constrained to a single password. We will also show how on-device password managers can be integrated with this feature to provide a very convenient and familiar UX.


DOWNLOAD THE PDF

You must be registered and logged in on the website to download.


stronger-identity-protection-via-mobile-devices-1
stronger-identity-protection-via-mobile-devices-2
stronger-identity-protection-via-mobile-devices-3
stronger-identity-protection-via-mobile-devices-4
stronger-identity-protection-via-mobile-devices-5
stronger-identity-protection-via-mobile-devices-6
stronger-identity-protection-via-mobile-devices-7
stronger-identity-protection-via-mobile-devices-8
stronger-identity-protection-via-mobile-devices-9
stronger-identity-protection-via-mobile-devices-10
stronger-identity-protection-via-mobile-devices-11
stronger-identity-protection-via-mobile-devices-12
stronger-identity-protection-via-mobile-devices-13
stronger-identity-protection-via-mobile-devices-14
stronger-identity-protection-via-mobile-devices-15
stronger-identity-protection-via-mobile-devices-16
stronger-identity-protection-via-mobile-devices-17
stronger-identity-protection-via-mobile-devices-18
stronger-identity-protection-via-mobile-devices-19
stronger-identity-protection-via-mobile-devices-20
stronger-identity-protection-via-mobile-devices-21
stronger-identity-protection-via-mobile-devices-22
stronger-identity-protection-via-mobile-devices-23
stronger-identity-protection-via-mobile-devices-24
stronger-identity-protection-via-mobile-devices-25
stronger-identity-protection-via-mobile-devices-26
stronger-identity-protection-via-mobile-devices-27
stronger-identity-protection-via-mobile-devices-28
stronger-identity-protection-via-mobile-devices-29
stronger-identity-protection-via-mobile-devices-30
stronger-identity-protection-via-mobile-devices-31
stronger-identity-protection-via-mobile-devices-32
stronger-identity-protection-via-mobile-devices-33
stronger-identity-protection-via-mobile-devices-34
stronger-identity-protection-via-mobile-devices-35
stronger-identity-protection-via-mobile-devices-36
stronger-identity-protection-via-mobile-devices-37

stronger-identity-protection-via-mobile-devices-1

stronger-identity-protection-via-mobile-devices-2

stronger-identity-protection-via-mobile-devices-3

stronger-identity-protection-via-mobile-devices-4

stronger-identity-protection-via-mobile-devices-5

stronger-identity-protection-via-mobile-devices-6

stronger-identity-protection-via-mobile-devices-7

stronger-identity-protection-via-mobile-devices-8

stronger-identity-protection-via-mobile-devices-9

stronger-identity-protection-via-mobile-devices-10

stronger-identity-protection-via-mobile-devices-11

stronger-identity-protection-via-mobile-devices-12

stronger-identity-protection-via-mobile-devices-13

stronger-identity-protection-via-mobile-devices-14

stronger-identity-protection-via-mobile-devices-15

stronger-identity-protection-via-mobile-devices-16

stronger-identity-protection-via-mobile-devices-17

stronger-identity-protection-via-mobile-devices-18

stronger-identity-protection-via-mobile-devices-19

stronger-identity-protection-via-mobile-devices-20

stronger-identity-protection-via-mobile-devices-21

stronger-identity-protection-via-mobile-devices-22

stronger-identity-protection-via-mobile-devices-23

stronger-identity-protection-via-mobile-devices-24

stronger-identity-protection-via-mobile-devices-25

stronger-identity-protection-via-mobile-devices-26

stronger-identity-protection-via-mobile-devices-27

stronger-identity-protection-via-mobile-devices-28

stronger-identity-protection-via-mobile-devices-29

stronger-identity-protection-via-mobile-devices-30

stronger-identity-protection-via-mobile-devices-31

stronger-identity-protection-via-mobile-devices-32

stronger-identity-protection-via-mobile-devices-33

stronger-identity-protection-via-mobile-devices-34

stronger-identity-protection-via-mobile-devices-35

stronger-identity-protection-via-mobile-devices-36

stronger-identity-protection-via-mobile-devices-37