Modern Solution for Modern Living
Developments in mobile communication technology have revolutionized the way that people interact and access information. Mobile devices are constantly evolving to serve a host of complex functions and services which are increasingly focused on sensitive matters such as commerce, business and personal information. Mobile OTP is a convenient and easy to use application that enables users to harness the power of two-factor authentication (2FA) for secure network log-in and key based challenge response protocol from their favorite mobile devices.
Powerful Access Restrictions Manage Risk from Loss or Theft
The strong authentication capabilities of Mobile Token are secured by the user’s ability to change the access password as well as the number of acceptable trials and the time period that a password maintains it validity. Secured in a password protected application the powerful token features are limited exclusively to the rightful token proprietor.
Compatible with Time (TOTP), Event (HOTP) One Time Password (OTP) Protocols
HOTP utilizes a dynamic event based algorithm, creating a unique password in the form of a number sequence, regenerated for each new log-in. Once the user has confirmed themselves in the application, access is granted to the one time password which is retrieved on demand- with the push of a button.
TOTP requires no user input to facilitate the change of log-in credentials, it is based on an algorithm that generates a new password to correspond to the passing of time and eliminates the possibility of passwords which can stagnate without user input for an indeterminate period of time.
Use in conjunction with OATH Challenge Response Algorithm (OCRA)
This enables the user to access the broad base of functions available with challenge and response technology. These features include the secure digital signing of transactions and sensitive data; once the digital signature is affixed to a file, its content can not be altered by so much as one character without causing a revocation of the secure sign. The unique response sequence generated by a specific user challenge (as well as the reverse process) can be utilized to cross validate servers and websites making certain that the intended destination is not being misrepresented; a user can validate the system before logging in and entering sensitive data and likewise the system can validate the user to be assured that they are who they claim to be.
FOAS and Mobile Token: Working Together
The Mobile Token solution can be delivered as part of a more complete package whereby when used in tandem with the OATH Authentication Server (FOAS) back end token management system. Adopting Mobile Token in conjunction with FOAS helps institutions mitigate the scope of their IT infrastructure from overhead expenses to administration.