Infosec Cloud
Solutions. Services. Training.

The 'chat' from the cloud

Keep up-to-date with the latest trends, hints and tips on cloud-based security

But phones can’t talk…

Date: Sep 16, 2013

Category: Blog

Guest post: SecurEnvoy

It was beyond imagination when Bell invented the phone and later made a call between the UK and USA. Edisson followed with a higher quality version and with a better signal. True to form, as technology creeps on, so we see more and more enhancements and improvements taking place.

Authentication is no different.

In the late 80’s, traditional plastic authentication tokens set the standard that many followed; six digits, a simple to use display and small enough to add to a keyring.

As time moved forward SecurEnvoy brought to market the first ‘tokenless’ alternatives, setting the standard that the industry now follows.

We’ve now combined both of these inventions; the telephone and the authenticator. We’ve added into our authentication system the option to receive a call via a landline or mobile phone when authenticating online, and sending a signal back through the keypad as the ‘out of band’ second factor to prove the identity of the recipient. Simple and yet, in the words of one customer experiencing it for the first time, “this is such a no brainer”.

But when did the phone start talking to us?

Was it when text to speech was supported by the telcos or was it a feature of the phone? Either way it’s accepted as a reliable method to push technology through in order to make the second factor of an authentication convenient.

Apple has just launched their latest variation of the iPhone with fingerprint technology inbuilt, Android have embraced a facial recognition system and near-field-communication is just around the corner, so what’s next for the mobile phone?

Well whatever it is, and on whatever platform or version, SecurEnvoy will be supporting it and embracing these new technologies to make it the best end user experience, allowing the user to ‘Authenticate your way’. So as long as you stay in control of the device and as long as the phone can’t begin image gesturing back at us, then the future looks bright for the next generation of tokenless authentication.

Find out more about tokenless strong authentication here.

Comments are closed.

  • Employee GDPR Awareness Training

  •  Identity-as-a-Service (IDaaS) solution

  • Tokenless Strong Authentication (MFA)

  • Next Gen Endpoint Security

  • Enquiry LinkedIn Spiceworks