StrikeForce Technologies recently rebranded its authentication technology. Previously called COBAS (Centralized Out-of-Band Authentication Software) will now be know as ProtectID, company officials said. The technology can reinforce a password with some other form of identification that uniquely identifies a user, such as forms of biometric identification. The company is also developing additional means of verifying identities, such as keyboard-level encryption.
StrikeForces ProtectID VBVoice scheme adds an additional "out-of-band" layer of security, without undue hassle, the company said. After logging into a ProtectID-secured Web site, the user is asked to enter his or her username. The server then dials a specified phone number—usually an office phone or cell phone—and asks the user to input the password into the phone, and then hang up. Within a second or two, the login proceeds.
According to security researchers, there are several ways a security system can verify that someone is an authorized user. Most systems use a unique code that supposedly only the user knows, such as a password, possibly backed up a unique, hardware security token assigned to each user—something unique. More complex systems can also use some form of biometric identification, such as a fingerprint or retinal scan, to provide additional security.
Taken individually, each form of security is defeatable. Together, the combination becomes more secure. However, one problem is that as security becomes more complex it places more of a burden on a user.
For example, in an April study of 5,000 e-commerce users, analyst Gartner Inc. found that requiring the use of an additional security device, such as a smart card, was the least desirable alternative toward enhancing e-commerce security, said Avivah Litan, the analyst responsible for the survey.
StrikeForce executives argue that a password tied to a somewhat personal device such as an office phone or mobile phone is more secure than a bare password, and less hassle than a dedicated token—although the ProtectID can be used with a token, as well.
"The goal is that it doesnt go out and force people to buy something new," said George Waller, executive vice president of StrikeForce, headquartered in Edison, N.J.
Cloning a mobile phone wont necessarily defeat the system, either, he pointed out. "Are you going to approve a transaction you didnt authorize?" Waller said.
The software can also be configured to ring a second phone, such as a bank manager needed to authorize a large wire transfer.
Typically, the password entered through a phones keypad will be a number, Waller said, a less-secure password than a one with different numbers and characters entered on a keyboard.
The ProtectID systems can also train a user to repeat back a unique password delivered over the phone, Waller said. The software is trained to identify the way in which a user not only repeats a number, but the rising and falling cadences a user uses when beginning and ending a series of numbers. This biometric identification can be used to prevent "shoulder surfing" a password, Waller said.
The "out-of-band" technique tries to ensure that if one means of communicating with the StrikeForce server over the network is compromised, another means—a phone—can be used as well. If responding to a phone becomes too onerous, StrikeForce said it is in the final phases of testing a technique to push a 128-bit SSL channel down to the keyboard level via a second out-of-band server. The keyboard encryption, enabled by a small client application, is designed to defeat keyboard loggers by encrypting the information, Waller said.
The third piece of the puzzle is a technology that StrikeForce calls "VerifyID". Based on a database of information that StrikeForce has acquired from third-party vendors and public records, the software can ask a user a series of multiple-choice questions based on personal history, something that only the user should know the answer to. Sample questions might ask for the color of a car the user previously owned, or the street address of a former home, Waller said.
StrikeForces approach has won over at least one customer, myVirtualCard.com, a Montreal-based e-commerce company with 33,000 electronic transactions to date. It uses Panasonic as an ASP (authentication services provider). Japans KDDI has also signed on as an ASP provider, Waller said.
"We took their technology and developed it further," said Howard Cohen, myVirtualCard.coms chief executive. "They came to us with their verification technology, and we developed the middleware for their e-commerce world. We havent had an easy shot with it; some people like it, some people dont. Its not an easy sell."
That market resistance is partly because U.S. customers havent accepted supplementary security devices such as the smart cards used overseas, Gartners Litan said. "Theyre ahead of the market," she said. "In terms of the market for out-of-band authentication, theres probably more of a market in the U.K. than the U.S."
In addition, U.S. banks are very reluctant to adopt another form of authentication, according to Litan.
Moreover, most confidential information isnt captured in transit to and from the bank, but on the banks servers. "The rest of the market needs it more than banks do," she said.