• About
  • Advertise
  • Careers
  • Contact
Sunday, November 9, 2025
No Result
View All Result
NEWSLETTER
iotlasvegas
  • Home
  • Internet of Things
  • Security
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise
  • Home
  • Internet of Things
  • Security
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise
No Result
View All Result
iotlasvegas
No Result
View All Result
Home Uncategorized

Serious Mobile Security: We Need Two-Factor Authentication for Handsets

in Uncategorized
0
SHARES
12
VIEWS
Share on FacebookShare on Twitter

I spent some time at Interop discussing what I think is a critical requirement for mobility, hardware-based two-factor authentication. Note that we already have a form of two-factor authentication via certificates, but a software solution isn’t the same as applying hardware here. And I’m not talking here about using the handset itself as the second factor in an authentication scheme, which remains a good idea, but rather about using yet another second factor to gain access to the handset. This is of increasing importance as all manner of sensitive corporate (and personal) information is now regularly stored on handsets, and handsets, as little computers, have all manner of vulnerabilities. Two-factor authentication could secure basic access a lot better than a PIN code, which few use anyway, and could also serve as the basis for data encryption, VPN keys, and more.

Among the possibilities here could be a hardware token along the lines of an RF-based DoD Common Access Card (CAC), or similar based on Bluetooth (particularly Bluetooth Low Energy, and possibly as some form of enhanced headset), Wi-Fi (Direct Connect), RFID, DASH7, ZigBee, ZWave, and even near-field communication (NFC) assuming this catches on for retail and financial/banking purposes, as it just might, even though I personally see it as redundant with the Bluetooth and Wi-Fi capabilities we already have, and a few others. Or we might have another use for the wireless ignition key now standard on so many cars, an interesting limited-range wireless application all by itself. Regardless, building such a token shouldn’t be too difficult, and the need, IMHO, is obvious. Many of the security firms I spoke with at Interop thought this was a good idea, so we might even see products at some point here. I’m surprised we’ve not seen such a solution already, and one can only hope. Perhaps the required culture of security is still immature. That’s probably it.

Oh, and, in case you missed it, the world did in fact end as predicted, last Saturday night at 6 PM. I noticed a very brief interruption in cellular service at that time, and then everything went back to as it was before. Except – I’m pretty sure we were all simply transported, instantaneously, to heaven, and, while I find it a little odd and perhaps a bit disappointing that heaven is just like what came before, I don’t get to make the rules here. So, this blog, and everything else, as far as I can tell, anyway, will continue. OK, I can only speak for the blog, but it’s looking good so far.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2011 IDG Communications, Inc.

Free Download WordPress Themes
Download Premium WordPress Themes Free
Download Best WordPress Themes Free Download
Download Premium WordPress Themes Free
download udemy paid course for free
download huawei firmware
Download WordPress Themes Free
lynda course free download
Tags: Serious Mobile Security: We Need Two-Factor Authentication for Handsets
Next Post

Health care system tests integrated RTLS

Recommended

Imagination adds safety, resilience to processor for IoT

Imagination adds safety, resilience to processor for IoT

Why IoT-enabled predictive maintenance hasn’t taken off

Why IoT-enabled predictive maintenance hasn’t taken off

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for our latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Las Vegas USA

© 2024 https://iotlasvegas.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • IoT
  • Mobile
  • Networking
  • Smart Cities
  • Development
  • Data & Analytics
  • Enterprise

© 2024 https://iotlasvegas.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In