• About
  • Advertise
  • Contact
Tuesday, April 14, 2026
No Result
View All Result
NEWSLETTER
iotindiana
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotindiana
No Result
View All Result
Home Uncategorized

Serious Mobile Security: We Need Two-Factor Authentication for Handsets

in Uncategorized
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter

I spent some time at Interop discussing what I think is a critical requirement for mobility, hardware-based two-factor authentication. Note that we already have a form of two-factor authentication via certificates, but a software solution isn’t the same as applying hardware here. And I’m not talking here about using the handset itself as the second factor in an authentication scheme, which remains a good idea, but rather about using yet another second factor to gain access to the handset. This is of increasing importance as all manner of sensitive corporate (and personal) information is now regularly stored on handsets, and handsets, as little computers, have all manner of vulnerabilities. Two-factor authentication could secure basic access a lot better than a PIN code, which few use anyway, and could also serve as the basis for data encryption, VPN keys, and more.

Among the possibilities here could be a hardware token along the lines of an RF-based DoD Common Access Card (CAC), or similar based on Bluetooth (particularly Bluetooth Low Energy, and possibly as some form of enhanced headset), Wi-Fi (Direct Connect), RFID, DASH7, ZigBee, ZWave, and even near-field communication (NFC) assuming this catches on for retail and financial/banking purposes, as it just might, even though I personally see it as redundant with the Bluetooth and Wi-Fi capabilities we already have, and a few others. Or we might have another use for the wireless ignition key now standard on so many cars, an interesting limited-range wireless application all by itself. Regardless, building such a token shouldn’t be too difficult, and the need, IMHO, is obvious. Many of the security firms I spoke with at Interop thought this was a good idea, so we might even see products at some point here. I’m surprised we’ve not seen such a solution already, and one can only hope. Perhaps the required culture of security is still immature. That’s probably it.

Oh, and, in case you missed it, the world did in fact end as predicted, last Saturday night at 6 PM. I noticed a very brief interruption in cellular service at that time, and then everything went back to as it was before. Except – I’m pretty sure we were all simply transported, instantaneously, to heaven, and, while I find it a little odd and perhaps a bit disappointing that heaven is just like what came before, I don’t get to make the rules here. So, this blog, and everything else, as far as I can tell, anyway, will continue. OK, I can only speak for the blog, but it’s looking good so far.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2011 IDG Communications, Inc.

Premium WordPress Themes Download
Download Best WordPress Themes Free Download
Premium WordPress Themes Download
Download Nulled WordPress Themes
free online course
download coolpad firmware
Download WordPress Themes
lynda course free download
Tags: Serious Mobile Security: We Need Two-Factor Authentication for Handsets
Next Post

High-tech amusement park keeps special-needs guests connected

Recommended

IoT: A vulnerable asset but also a tool in disaster recovery

12M connected cars gives General Motors a massive IoT fleet

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Indiana USA

© 2024 iotindiana.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotindiana.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In