SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Two-Factor Authentication with
One-Time Password
The BiGuard OTP is a chip-based, 6-digit numeric PIN token to be used in combination with
a password for a strong two-factor authentication. This powerful solution provides single
password authentication for remote VPN, LAN and web access through the use of an ASAS
back-end server. Each BiGuard OTP token is unique and has been assigned an Electronic
Serial Number (ESN) and identification seed, so that the authentication cannot be
reproduced. The BiGuard OTP continuously changes its PIN number, which, compared to a
relatively easy-to-crack static password, dramatically increases access security and greatly
reduces the risk of unauthorized access to corporate network resources by intruders. The car
key-sized token is extremely portable, offering total mobility and maximum flexibility for
remote network access.
• Dynamic One-Time Password
• Event-based Algorithm Token
• Strong Two-factor Authentication
• Easy installation and management
• Car key-sized for extreme mobility
• One-click easy-to-use system
• Compatible with BiGuard SSL VPN series equipment
Strong Two-Factor Authentication
The traditional user login method is to simply enter a fixed static password. This could pose
a grave risk when used in public areas such as Internet cafes, airports and other public
areas, because people nearby may be able to obtain the static password you use to log into
your company’s network. The BiGuard OTP allows you to create a strong, two-factor
authentication by using a dynamically generated 6-digit PIN, and combine this with your
existing static password. Even if the token is lost or stolen, it’s useless to anyone but its
owner and your company’s system administrator.
One-Time Password for Multiple Applications
Prior to launching authentication systems, administrators were required to synchronize each
BiGuard OTP token with an ASAS RADIUS-standard server which stored the ESN of each
token. The BiGuard OTP token is flexible enough to adopt various algorithms, including
OATH (Open AuTHentication) event-based algorithms. Whenever access to LAN, Web or
remote VPN is needed, users simply click on the token button to obtain a one-time
password called a dynamic PIN. This action will start the two-factor authentication process
between the BiGuard SSL VPN equipment and the ASAS server, resulting in the server
either accepting, rejecting or challenging the authentication request.
Easy Installation and Management
The ASAS server provides administrators with a friendly management interface, which
includes account management, adding new tokens, etc. The step-by-step server installation
is as easy as any normal commercial software. The administrator can use any web browser,
anywhere, any time, to login to the ASAS management server, without having to pre-install
any client software.
Ease of Use Anywhere at Any Time
Its simple interactive interface is easy to understand and use. A simple, single click on the
button of the BiGuard OTP token generates a six-digit OTP number. Pressing and holding
the button produces the token’s Electronic Serial Number (ESN), a number used to identify
each token. Bars in the lower right corner of the LCD screen display battery strength - 3
bars for a fully charged battery. Its car key-sized design makes it extremely portable.
Wherever you need to access the company’s network resources, the BiGuard OTP offers
you better security level of authentication process to login the networks, even when on the
road, or from an airport paid terminal.
Economic Authentication Solution
Unlike others solutions, BiGuard’s OTP solution includes an ASAS server, so there is no
need to renew the service, reconfigure user setting or renew tokens. The battery inside a
BiGuard OTP token will last up to 3 years, so no hassle of replacing batteries.
The BiGuard OTP: a truly economic authentication solution.
BiGuard OTP
OTP
Features & Specifications
Billion Electric Co., Ltd.
8F, No.192, Sec.2, Chung Hsing Road,
Hsin Tien City, Taipei Hsien, Taiwan
TEL : +886-2-2914-5665
FAX : +866-2-2918-6731,+886-2-2918-2895
E-mail : sales@billion.com
www.billion.com
Standard Compliance
• OATH Algorithm
Supported Software
• Remote Access (With Authenex ASAS Authentication Server)
- Any ASAS system-compatible remote access system
- OTP-capable VPNs
- SSL VPN
• Authentication Interoperability
- Secure Web Access (MS Internet Explorer and Netscape
Communicator)
- RADIUS
• OTP Number Generation
- OATH Algorithm
- 160-bit
Minimum System Requirements
• Client Browser: Microsoft IE 6.0 or newer versions
• ASAS Server Requirements:
- Hardware:
CPU: Pentium IV 1.4GHz or above
Disk space: 8GB of free hard disk space
Memory: 512MB or more
- Software:
Microsoft Windows 2000/2003 Server Edition
Microsoft Windows 2000 Server Pack 3 or above
ASAS Server Software
• OATH Algorithm Authentication Server:
• RADIUS Standard Server (ASAS Server)
• Easy Administration through Web Management GUI
• Easy to integrate into existing network infrastructure
• Use a Web browser to manage ASAS any time, from anywhere
Hardware Specifications
• Display: 6-Digit Numeric LCD Display
• Casing: Polycarbonate
• Power: Internal battery
• Dimension: 55mm (W) x 25mm (D) x 12.2mm (H)
Application Diagram
V.083007
The specifications in this datasheet are subject to change without prior notice.
Operation Environment
• Operating Temperature: -5° to 50° C
• Storage Temperature: 10° to 50° C
Supported Equipment
• BiGuard SSL VPN series equipment
Available Packages
• BiGuard OTP Starter Kit (2 OTP tokens)
• BiGuard OTP 5U (5 OTP tokens)
• BiGuard OTP 10U (10 OTP tokens)
Business Trip
User’s Laptop
Employee at
Home Desktop
Business Trip User
at Airport kiosk
Business Partner
from Internet
Enter 6-digit number
displayed on the
BiGuard OTP token
Enter 6-digit number
displayed on the
BiGuard OTP token
Enter 6-digit number
displayed on the
BiGuard OTP token
Enter 6-digit number
displayed on the
BiGuard OTP token
ASAS Authentication Server
BiGuard SSL VPN
Security Gateway
Email and Files Terminal Services
Remote Desktop
Web-based
Applications
Services and Applications Network Places
Internet
iBusiness Security Gateway

Weitere ähnliche Inhalte

Was ist angesagt?

Open ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikOpen ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikAldi Nor Fahrudin
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesteam-WIBU
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecGENIANS, INC.
 
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010Alvaro Roldan Peral
 
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...Netgear Italia
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview GENIANS, INC.
 
Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...
Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...
Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...Netgear Italia
 
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...Martin Prosek
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIArash Ramez
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case StudyFIDO Alliance
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
Surveon Professional NVR3000 Introduction
Surveon Professional NVR3000 IntroductionSurveon Professional NVR3000 Introduction
Surveon Professional NVR3000 IntroductionSurveon Technology Inc.
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedArash Ramez
 
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Chris Ryu
 

Was ist angesagt? (20)

Open ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotikOpen ssl certificate (https) for hotspot mikrotik
Open ssl certificate (https) for hotspot mikrotik
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010Forti Gate Virtual Appliances Sales 201010
Forti Gate Virtual Appliances Sales 201010
 
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
Wireless NETGEAR - Soluzioni wireless per il business e demo configurazione W...
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...
Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...
Webinar NETGEAR - Il software NMS300 per la gestione ed il controllo completo...
 
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...
Mobile Identity 2013 - Optimising and simplifying authentication and authoriz...
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation APIAnti-tampering in Android and Take Look at Google SafetyNet Attestation API
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Google FIDO Authentication Case Study
Google FIDO Authentication Case StudyGoogle FIDO Authentication Case Study
Google FIDO Authentication Case Study
 
Surveon Enterprise NVR5000 Introduction
Surveon Enterprise NVR5000 IntroductionSurveon Enterprise NVR5000 Introduction
Surveon Enterprise NVR5000 Introduction
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Surveon Professional NVR3000 Introduction
Surveon Professional NVR3000 IntroductionSurveon Professional NVR3000 Introduction
Surveon Professional NVR3000 Introduction
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)UTM Basic Rev 1.2 (Modified)
UTM Basic Rev 1.2 (Modified)
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...Let's get started with passwordless authentication using windows hello in you...
Let's get started with passwordless authentication using windows hello in you...
 
Surveon SMR Series Introduction
Surveon SMR Series Introduction Surveon SMR Series Introduction
Surveon SMR Series Introduction
 

Andere mochten auch

Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013Hai Nguyen
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
Zoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docxZoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docxSarah Harrison
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowresHai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideHai Nguyen
 

Andere mochten auch (6)

Ams 2 fa april 2013
Ams 2 fa april 2013Ams 2 fa april 2013
Ams 2 fa april 2013
 
Hi, neighbor!
Hi, neighbor!Hi, neighbor!
Hi, neighbor!
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
Zoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docxZoo_Organisation_and_Regulation.docx
Zoo_Organisation_and_Regulation.docx
 
Citrix sb 0707-lowres
Citrix sb 0707-lowresCitrix sb 0707-lowres
Citrix sb 0707-lowres
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 

Ähnlich wie Bi guardotp

Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryJohan Dentant
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor AuthenticationKalyana Sundaram
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token2FA, Inc.
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsMichelle Morgan-Nelsen
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securityOKsystem
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET Journal
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713John Yu
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authenticationZTech Proje
 
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...WSO2
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...Sagara Gunathunga
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+AppViewX
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Mukesh Chinta
 

Ähnlich wie Bi guardotp (20)

Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_Industry
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
eMAS Multifactor Authentication
eMAS Multifactor AuthenticationeMAS Multifactor Authentication
eMAS Multifactor Authentication
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
2FA OTP Token
2FA OTP Token2FA OTP Token
2FA OTP Token
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 
10 1 otp all
10 1 otp all10 1 otp all
10 1 otp all
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
 
IRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key OrderIRJET- Three Step Password Verification by using Random Key Order
IRJET- Three Step Password Verification by using Random Key Order
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
[WSO2Con EU 2018] Kicking Your Enterprise Security Up a Notch With Adaptive A...
 
kicking your enterprise security up a notch with adaptive authentication sa...
kicking your enterprise security up a notch with adaptive authentication   sa...kicking your enterprise security up a notch with adaptive authentication   sa...
kicking your enterprise security up a notch with adaptive authentication sa...
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
 
App viewx cert+
App viewx  cert+App viewx  cert+
App viewx cert+
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Tech t18
Tech t18Tech t18
Tech t18
 
Two Factor Authentication for VPN
Two Factor Authentication for VPNTwo Factor Authentication for VPN
Two Factor Authentication for VPN
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
 

Mehr von Hai Nguyen

Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailarHai Nguyen
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheetHai Nguyen
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthenticationHai Nguyen
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Hai Nguyen
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_briefHai Nguyen
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 enHai Nguyen
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationHai Nguyen
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseHai Nguyen
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authenticationHai Nguyen
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheetHai Nguyen
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheetHai Nguyen
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationxHai Nguyen
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210Hai Nguyen
 

Mehr von Hai Nguyen (20)

Sms based otp
Sms based otpSms based otp
Sms based otp
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
Scc soft token datasheet
Scc soft token datasheetScc soft token datasheet
Scc soft token datasheet
 
Rsa two factorauthentication
Rsa two factorauthenticationRsa two factorauthentication
Rsa two factorauthentication
 
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
Quest defender provides_secure__affordable_two-factor_authentication_for_okla...
 
Pg 2 fa_tech_brief
Pg 2 fa_tech_briefPg 2 fa_tech_brief
Pg 2 fa_tech_brief
 
Ouch 201211 en
Ouch 201211 enOuch 201211 en
Ouch 201211 en
 
N ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authenticationN ye c-rfp-two-factor-authentication
N ye c-rfp-two-factor-authentication
 
Multiple credentials-in-the-enterprise
Multiple credentials-in-the-enterpriseMultiple credentials-in-the-enterprise
Multiple credentials-in-the-enterprise
 
Mobile authentication
Mobile authenticationMobile authentication
Mobile authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Identity cues two factor data sheet
Identity cues two factor data sheetIdentity cues two factor data sheet
Identity cues two factor data sheet
 
Hotpin datasheet
Hotpin datasheetHotpin datasheet
Hotpin datasheet
 
Gambling
GamblingGambling
Gambling
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Datasheet two factor-authenticationx
Datasheet two factor-authenticationxDatasheet two factor-authenticationx
Datasheet two factor-authenticationx
 
Csd6059
Csd6059Csd6059
Csd6059
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
10695 sidtfa sb_0210
10695 sidtfa sb_021010695 sidtfa sb_0210
10695 sidtfa sb_0210
 

Bi guardotp

  • 1. Two-Factor Authentication with One-Time Password The BiGuard OTP is a chip-based, 6-digit numeric PIN token to be used in combination with a password for a strong two-factor authentication. This powerful solution provides single password authentication for remote VPN, LAN and web access through the use of an ASAS back-end server. Each BiGuard OTP token is unique and has been assigned an Electronic Serial Number (ESN) and identification seed, so that the authentication cannot be reproduced. The BiGuard OTP continuously changes its PIN number, which, compared to a relatively easy-to-crack static password, dramatically increases access security and greatly reduces the risk of unauthorized access to corporate network resources by intruders. The car key-sized token is extremely portable, offering total mobility and maximum flexibility for remote network access. • Dynamic One-Time Password • Event-based Algorithm Token • Strong Two-factor Authentication • Easy installation and management • Car key-sized for extreme mobility • One-click easy-to-use system • Compatible with BiGuard SSL VPN series equipment Strong Two-Factor Authentication The traditional user login method is to simply enter a fixed static password. This could pose a grave risk when used in public areas such as Internet cafes, airports and other public areas, because people nearby may be able to obtain the static password you use to log into your company’s network. The BiGuard OTP allows you to create a strong, two-factor authentication by using a dynamically generated 6-digit PIN, and combine this with your existing static password. Even if the token is lost or stolen, it’s useless to anyone but its owner and your company’s system administrator. One-Time Password for Multiple Applications Prior to launching authentication systems, administrators were required to synchronize each BiGuard OTP token with an ASAS RADIUS-standard server which stored the ESN of each token. The BiGuard OTP token is flexible enough to adopt various algorithms, including OATH (Open AuTHentication) event-based algorithms. Whenever access to LAN, Web or remote VPN is needed, users simply click on the token button to obtain a one-time password called a dynamic PIN. This action will start the two-factor authentication process between the BiGuard SSL VPN equipment and the ASAS server, resulting in the server either accepting, rejecting or challenging the authentication request. Easy Installation and Management The ASAS server provides administrators with a friendly management interface, which includes account management, adding new tokens, etc. The step-by-step server installation is as easy as any normal commercial software. The administrator can use any web browser, anywhere, any time, to login to the ASAS management server, without having to pre-install any client software. Ease of Use Anywhere at Any Time Its simple interactive interface is easy to understand and use. A simple, single click on the button of the BiGuard OTP token generates a six-digit OTP number. Pressing and holding the button produces the token’s Electronic Serial Number (ESN), a number used to identify each token. Bars in the lower right corner of the LCD screen display battery strength - 3 bars for a fully charged battery. Its car key-sized design makes it extremely portable. Wherever you need to access the company’s network resources, the BiGuard OTP offers you better security level of authentication process to login the networks, even when on the road, or from an airport paid terminal. Economic Authentication Solution Unlike others solutions, BiGuard’s OTP solution includes an ASAS server, so there is no need to renew the service, reconfigure user setting or renew tokens. The battery inside a BiGuard OTP token will last up to 3 years, so no hassle of replacing batteries. The BiGuard OTP: a truly economic authentication solution. BiGuard OTP OTP
  • 2. Features & Specifications Billion Electric Co., Ltd. 8F, No.192, Sec.2, Chung Hsing Road, Hsin Tien City, Taipei Hsien, Taiwan TEL : +886-2-2914-5665 FAX : +866-2-2918-6731,+886-2-2918-2895 E-mail : sales@billion.com www.billion.com Standard Compliance • OATH Algorithm Supported Software • Remote Access (With Authenex ASAS Authentication Server) - Any ASAS system-compatible remote access system - OTP-capable VPNs - SSL VPN • Authentication Interoperability - Secure Web Access (MS Internet Explorer and Netscape Communicator) - RADIUS • OTP Number Generation - OATH Algorithm - 160-bit Minimum System Requirements • Client Browser: Microsoft IE 6.0 or newer versions • ASAS Server Requirements: - Hardware: CPU: Pentium IV 1.4GHz or above Disk space: 8GB of free hard disk space Memory: 512MB or more - Software: Microsoft Windows 2000/2003 Server Edition Microsoft Windows 2000 Server Pack 3 or above ASAS Server Software • OATH Algorithm Authentication Server: • RADIUS Standard Server (ASAS Server) • Easy Administration through Web Management GUI • Easy to integrate into existing network infrastructure • Use a Web browser to manage ASAS any time, from anywhere Hardware Specifications • Display: 6-Digit Numeric LCD Display • Casing: Polycarbonate • Power: Internal battery • Dimension: 55mm (W) x 25mm (D) x 12.2mm (H) Application Diagram V.083007 The specifications in this datasheet are subject to change without prior notice. Operation Environment • Operating Temperature: -5° to 50° C • Storage Temperature: 10° to 50° C Supported Equipment • BiGuard SSL VPN series equipment Available Packages • BiGuard OTP Starter Kit (2 OTP tokens) • BiGuard OTP 5U (5 OTP tokens) • BiGuard OTP 10U (10 OTP tokens) Business Trip User’s Laptop Employee at Home Desktop Business Trip User at Airport kiosk Business Partner from Internet Enter 6-digit number displayed on the BiGuard OTP token Enter 6-digit number displayed on the BiGuard OTP token Enter 6-digit number displayed on the BiGuard OTP token Enter 6-digit number displayed on the BiGuard OTP token ASAS Authentication Server BiGuard SSL VPN Security Gateway Email and Files Terminal Services Remote Desktop Web-based Applications Services and Applications Network Places Internet iBusiness Security Gateway