SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Two-Factor
Authentication
- Akhil Agrawal
Purdue University
Why is it required?
• Legacy Authentication & Authorization alone
are not enough
• Passwords alone are not enough
• No way to verify the end user is our real
subscriber
• No way to verify the end user is bound to
his/her account services
How does it work?
• During any service/application activation, a
random code (Passcode) will be provided
• Subscriber should call from home line and
provide Passcode
• Subscriber account, home line Passcode will
be verified
• Service/Application will be activated
What applications will use it?
• Any application on voice platform
• Phone2Go will be able to use it
immediately
Different Approaches
• Place a call to Subscriber’s home phone,
collect the Passcode & Verify
• Subscriber will place a call to a dedicated
line from home phone, collect the Passcode
& Verify
• Ask Subscriber to place a call to dedicated
line from home phone with in short duration
Technologies Used
• Java
• MySQL
• Dialogic
Architecture
Implementation - Overview
Database – Physical Model
Column Name Data Type Default Value Description
ID UNSIGNED
BIG INT
NOT NULL
PRIMARY KEY
AUTO INCREMENT
Primary Key.
TN INT NULL User's Landline TN.
ApplicationId VARCHAR(25) NULL Name of the Application.
ActivationKey VARCHAR(25) NULL Special parameters required by
respective external client.
MacAddress VARCHAR(25) NULL Mac Address of device.
Token INT NULL 6 digit code generated for 2FA.
DateAndTime DATETIME NOT NULL
Default now()
Date and Time when the code was
created.
2FAStatus VARCHAR(10) NULL Shows the status of the 2 Factor
Authentication.
Will accept only init and success as
values.
REST Module - Layered Architecture
REST Module Sequence Diagram
SIP Module - Layered Architecture
Use Cases
• User making the call and entering the correct
code with no errors.
• User making the call without initiating the 2
Factor Authentication Request.
• User making the call after the set time limit.
• User entering the incorrect code.
SIP Module Sequence Design
No Initiated 2FA Request
User Called After Time Limit
User Entered Incorrect Auth Code
Mentors
• Mr. Naresh Dhiman – Architect and Design of
the solution.
• Mr. Thirumal Ramachandruni, Mr.
Umashankar Somasundaram – Java
development.
• Mr. Mathivanan Manickam – Integration with
Media Server.
Conclusion
• Completing this project for my internship has
been a learning and enjoyable experience.
• I really hope my project helps add a layer of
security to the existing and upcoming voice
applications.

Weitere ähnliche Inhalte

Was ist angesagt?

3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor AuthenticationFortytwo
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Sirius
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDECTM360
 
Securing MySQL with a Focus on SSL
Securing MySQL with a Focus on SSLSecuring MySQL with a Focus on SSL
Securing MySQL with a Focus on SSLwolfSSL
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptxArpithaShoby
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionRafidah Ariffin
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITYSupanShah2
 

Was ist angesagt? (20)

3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
 
User authentication
User authenticationUser authentication
User authentication
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
WPA2
WPA2WPA2
WPA2
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Securing MySQL with a Focus on SSL
Securing MySQL with a Focus on SSLSecuring MySQL with a Focus on SSL
Securing MySQL with a Focus on SSL
 
Kerberos
KerberosKerberos
Kerberos
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Two factor authentication.pptx
Two factor authentication.pptxTwo factor authentication.pptx
Two factor authentication.pptx
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
SecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password SolutionSecureOTP: Total One-Time-Password Solution
SecureOTP: Total One-Time-Password Solution
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 

Andere mochten auch

9 password security
9   password security9   password security
9 password securitydrewz lin
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone GuideLookout
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and YouChris Stone
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorAllan Denot
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple AccountLookout
 

Andere mochten auch (6)

9 password security
9   password security9   password security
9 password security
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
The Back to School Smartphone Guide
The Back to School Smartphone GuideThe Back to School Smartphone Guide
The Back to School Smartphone Guide
 
Two Factor Authentication and You
Two Factor Authentication and YouTwo Factor Authentication and You
Two Factor Authentication and You
 
Two factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google AuthenticatorTwo factor authentication with Laravel and Google Authenticator
Two factor authentication with Laravel and Google Authenticator
 
3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account3 Ways to Protect the Data in Your Apple Account
3 Ways to Protect the Data in Your Apple Account
 

Ähnlich wie 2FA Protocol Presentation

CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicSam Bowne
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application SecurityChong-Kuan Chen
 
Flexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handlingFlexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handlingDMC, Inc.
 
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...Databricks
 
GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02Albert Escala
 
seminar presentation
seminar presentationseminar presentation
seminar presentationsaly salikka
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ SystemRobert Parker
 
Troubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptxTroubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptxDiwakar435317
 
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...Digital Transformation EXPO Event Series
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principlessaurabhshertukde
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ systemRobert Parker
 
Intro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ LabIntro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ LabLizzy Guido (she/her)
 
Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)Isita Pal
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonksRohit Kapoor
 
OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)Bjorn Hjelm
 

Ähnlich wie 2FA Protocol Presentation (20)

CNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application LogicCNIT 129S: 11: Attacking Application Logic
CNIT 129S: 11: Attacking Application Logic
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 
Flexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handlingFlexibility and standardization using dynamic IO addressing and option handling
Flexibility and standardization using dynamic IO addressing and option handling
 
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
Operationalizing Machine Learning—Managing Provenance from Raw Data to Predic...
 
GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02GenerationRFID_Corp_2015_02
GenerationRFID_Corp_2015_02
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
Samarendra Singha New
Samarendra Singha New Samarendra Singha New
Samarendra Singha New
 
PROJECT.ppt (6).pptx
PROJECT.ppt (6).pptxPROJECT.ppt (6).pptx
PROJECT.ppt (6).pptx
 
Mt s2 sdlc
Mt s2 sdlcMt s2 sdlc
Mt s2 sdlc
 
Controlling access to your IBM MQ System
Controlling access to your IBM MQ SystemControlling access to your IBM MQ System
Controlling access to your IBM MQ System
 
Troubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptxTroubleshooting SAML Integrations.pptx
Troubleshooting SAML Integrations.pptx
 
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...Privileged Access Control & Task Automation: A Win Double of Security and Bus...
Privileged Access Control & Task Automation: A Win Double of Security and Bus...
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Analysis concepts and principles
Analysis concepts and principlesAnalysis concepts and principles
Analysis concepts and principles
 
531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system531: Controlling access to your IBM MQ system
531: Controlling access to your IBM MQ system
 
Resume
ResumeResume
Resume
 
Intro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ LabIntro to Automation Using Perfecto's CQ Lab
Intro to Automation Using Perfecto's CQ Lab
 
Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)Isita_Pal_Resume_(1)
Isita_Pal_Resume_(1)
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)OpenID Foundation MODRNA WG Overview (Apr. 2019)
OpenID Foundation MODRNA WG Overview (Apr. 2019)
 

2FA Protocol Presentation

  • 2. Why is it required? • Legacy Authentication & Authorization alone are not enough • Passwords alone are not enough • No way to verify the end user is our real subscriber • No way to verify the end user is bound to his/her account services
  • 3.
  • 4. How does it work? • During any service/application activation, a random code (Passcode) will be provided • Subscriber should call from home line and provide Passcode • Subscriber account, home line Passcode will be verified • Service/Application will be activated
  • 5. What applications will use it? • Any application on voice platform • Phone2Go will be able to use it immediately
  • 6. Different Approaches • Place a call to Subscriber’s home phone, collect the Passcode & Verify • Subscriber will place a call to a dedicated line from home phone, collect the Passcode & Verify • Ask Subscriber to place a call to dedicated line from home phone with in short duration
  • 7. Technologies Used • Java • MySQL • Dialogic
  • 10. Database – Physical Model Column Name Data Type Default Value Description ID UNSIGNED BIG INT NOT NULL PRIMARY KEY AUTO INCREMENT Primary Key. TN INT NULL User's Landline TN. ApplicationId VARCHAR(25) NULL Name of the Application. ActivationKey VARCHAR(25) NULL Special parameters required by respective external client. MacAddress VARCHAR(25) NULL Mac Address of device. Token INT NULL 6 digit code generated for 2FA. DateAndTime DATETIME NOT NULL Default now() Date and Time when the code was created. 2FAStatus VARCHAR(10) NULL Shows the status of the 2 Factor Authentication. Will accept only init and success as values.
  • 11. REST Module - Layered Architecture
  • 13. SIP Module - Layered Architecture
  • 14. Use Cases • User making the call and entering the correct code with no errors. • User making the call without initiating the 2 Factor Authentication Request. • User making the call after the set time limit. • User entering the incorrect code.
  • 16. No Initiated 2FA Request
  • 17. User Called After Time Limit
  • 19. Mentors • Mr. Naresh Dhiman – Architect and Design of the solution. • Mr. Thirumal Ramachandruni, Mr. Umashankar Somasundaram – Java development. • Mr. Mathivanan Manickam – Integration with Media Server.
  • 20. Conclusion • Completing this project for my internship has been a learning and enjoyable experience. • I really hope my project helps add a layer of security to the existing and upcoming voice applications.