• About
  • Advertise
  • Contact
Sunday, April 19, 2026
No Result
View All Result
NEWSLETTER
iottennessee
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
No Result
View All Result
iottennessee
No Result
View All Result
Home Uncategorized

Serious Mobile Security: We Need Two-Factor Authentication for Handsets

in Uncategorized
0
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

I spent some time at Interop discussing what I think is a critical requirement for mobility, hardware-based two-factor authentication. Note that we already have a form of two-factor authentication via certificates, but a software solution isn’t the same as applying hardware here. And I’m not talking here about using the handset itself as the second factor in an authentication scheme, which remains a good idea, but rather about using yet another second factor to gain access to the handset. This is of increasing importance as all manner of sensitive corporate (and personal) information is now regularly stored on handsets, and handsets, as little computers, have all manner of vulnerabilities. Two-factor authentication could secure basic access a lot better than a PIN code, which few use anyway, and could also serve as the basis for data encryption, VPN keys, and more.

Among the possibilities here could be a hardware token along the lines of an RF-based DoD Common Access Card (CAC), or similar based on Bluetooth (particularly Bluetooth Low Energy, and possibly as some form of enhanced headset), Wi-Fi (Direct Connect), RFID, DASH7, ZigBee, ZWave, and even near-field communication (NFC) assuming this catches on for retail and financial/banking purposes, as it just might, even though I personally see it as redundant with the Bluetooth and Wi-Fi capabilities we already have, and a few others. Or we might have another use for the wireless ignition key now standard on so many cars, an interesting limited-range wireless application all by itself. Regardless, building such a token shouldn’t be too difficult, and the need, IMHO, is obvious. Many of the security firms I spoke with at Interop thought this was a good idea, so we might even see products at some point here. I’m surprised we’ve not seen such a solution already, and one can only hope. Perhaps the required culture of security is still immature. That’s probably it.

Oh, and, in case you missed it, the world did in fact end as predicted, last Saturday night at 6 PM. I noticed a very brief interruption in cellular service at that time, and then everything went back to as it was before. Except – I’m pretty sure we were all simply transported, instantaneously, to heaven, and, while I find it a little odd and perhaps a bit disappointing that heaven is just like what came before, I don’t get to make the rules here. So, this blog, and everything else, as far as I can tell, anyway, will continue. OK, I can only speak for the blog, but it’s looking good so far.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2011 IDG Communications, Inc.

Premium WordPress Themes Download
Download Best WordPress Themes Free Download
Download WordPress Themes Free
Download Nulled WordPress Themes
udemy paid course free download
download micromax firmware
Download Best WordPress Themes Free Download
udemy free download
Next Post

High-tech amusement park keeps special-needs guests connected

Recommended

Lost underground? IoT beacons help subway riders find their way

San Jose gets SmartPoles with LTE, LED lights and energy meters

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Hardware
  • Infrastructure
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • Open Source
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2019-20 iottennessee.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware

© 2019-20 iottennessee.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In