Skip to main content

Feitian One Time Password (OTP) Tokens are compatible with OATH specification. Which are the benefits?


OATH is an open specification for One Time Password (OTP) Token devices. This specification is provided by the open authetication Initiative www.openauthentication.org OATH includes public specifications for event-based (HOTP) authetication and time-based (TOTP) authetication. Both authetication types use public encryption standards. For the event-based authetication the OTP password is dynamicly generated with every button push or token activation. For the time-based authetication a new OTP password is automaticaly generated every after 30 or 60 seconds.

OATH was created so that can be used with both hardware tokens (small dimensioned devices which can be held in a pocket and generate the OTP password) and software tokens (small programs which run on smartphones and other portable devices).

There is an important number of compatible tokens with OATH. Feitian OTP Tokens are also OATH compatible with OATH and can be used with any open authetication system which is compatible with OATH.


Feitian OTP Token C100 for event-based (HOTP) authetication is easy to use and carry. The token can be attached to a key chain and can be kept in a pocket. The level of security to access data stored on web is high because the password is unique for each authetication request. This way you can avoid the risk of password theft and attacks. Now you can get your OTP C100 at great price.

Feitian OTP Token C200 for time-based (TOTP) authetication offers high security because generates an unique password every 30 seconds. The users choose this device for secure access in VPN, wep pages and web applications, online data bases etc. Get you own Feitian OTP C200 at a great price.
Find out more details about OTP Token C200. >>

Authentication Server
The OATH consortium is a collaboration effort between the IT industry leaders whose purpose is to provide a reference architecture for universal strong authentication for all users and each device from any network. The OATH open standard allows multiple choices for hardware, reduced property costs and allows users to replace the complex existing property security systems with cost-effective systems.


The high level features of OATH reference architecture include:
1. Open specifications – use the existing strandards provided by the initial standardization efforts from other well known technical standards which comply with the specific needs.
2. Improved devices and innovation – suport a great variety of authentication devices (tokens, smartcards etc) and transforms the existing mobile devices (mobile phones, PDA, laptops, smartphones, tablets etc) into authentication devices.
3. Interoperable modules – the components were created so that could interoperable and provide flexibility in developing and implementing the authentication solutions.
4. Support for native platforms – the architecture was created to be integrated with the existing platforms and management infrastructures for identities and access control (LDAP, AAA servers etc.).

Benefits for authentication solution providers:
1. The personal network and interoperability opportunities allow providers to create autentication solutions which run with complementary solutions
2. The complete framework provides the architecture for developing complete end-to-end solutions
3. Reduced costs for research and developing through technical colaboration and specifications based on standards.
4. Facilitates technolgical innovation in hardware and software devices development for multiple authentication methods (OTP, SIM, PKI based).

Benefits of the autentication in enterprise environments:
1. Increase the users/consumers acceptance for strong authentication
2. Provides potential for increasing revenues through more secure online experience for users/customers
3. Reduced costs for implementing the solution by simplifying the integration of the solution components. This allows validation to be lauched as a network utility.
4. Reduced costs for solution implementation by activating the authentication devices for sharing/reusing for multiple websites and wep applications.
5. The open standard approach prevents bending to a certain solution and allows you to choose from a wider range of providers for implementating the best and flexible solutions in industry.

Benefits for clients/consumers/end-users:
1.Reduced risk for identity theft by a wider implementation of strong authentication
2.Convenience and improved experience for users by providing a wide range of authentication devices and services.

Comments

Popular posts from this blog

Cititor contactless pentru carduri RFID (NFC) 13.56 MHz

Acest cititor de card contactless citeste si scrie cardurile mifare rfid 1K. Protocol de comunicatie:  - accepta toate cardurile cu frecventa ceasului de 13.56 MHz (smartcard RFID): - ISO 14443 tip A si B - Mifare 13.56 MHz ISD14443A - Baud rate: 106 Kbps la 6.8 Mbps - Suport pentru protocol Felica - Compatibil cu protocol de card 15693 Securitate: - Chipset cu nivel inalt de securitate - Protectie la scurt-circuit si depasirea tensiunii de alimentare - Mecanism de criptare in firmware - Posibilitate de actualizare pentru firmware Performanta: - Primul VHBR CCID card reader - Primul reader CCID cu procesor de viteza inalta - Incorporeaza tehnologie contactless VHBR (Very High Bit Rates) solicitata de aplicatiile ICAO (International Civil Aviation Organization), cu standard LDS 2.0 Compatibilitate: compatibil cu cele mai utilizate platforme software: Windows, Linux. M...

Dispozitiv criptografic USB Token CryptoMate EVO

Prezentarea generala a dispozitivului criptografic CryptoMate EVO Tokenul USB CryptoMate Evo PKI utilizeaza algoritmi ECC si RSA pentru operațiunile criptografice cu cheie publică, esențiale în aplicațiile PKI pentru carduri inteligente și semnătură digitală. Tokenul CryptoMate EVO PKI este construit in jurul unui modul ACOS5-EVO care acceptă algoritmi DES, 3DES, AES și SHA. Tokenul este conform cu standardele internaționale pentru cardurile inteligente PKI (ISO 7816 (părțile 1, 2, 3, 4, 8 și 9) și FIPS 140-2 level 3 și este certificat CC EAL 5+ CryptoMate EVO poate fi utilizat pentru aplicații care includ semnarea digitală, securitatea e-mailurilor, conectarea online, conectarea la rețea și aplicațiile blockchain. Caracteristici: ● Card inteligent criptografic si cryptoprocesor ◦ Modulul ACOS5-EVO incorporat ◦ Memorie RRPROM: 192 KB ◦ Conform cu ISO 7816 Partile 1, 2, 3, 4, 8, si 9 (suporta T=0, T=1;...

Card Mifare RFID 1K

Cardul MIFARE este un lider pentru interfata contactless, cu o baza imensa, instalata in intreaga lume.  Cardul Mifare 1K clasic carduri are functie de stocare si memoria divizata in sectoare si blocuri cu mecanisme simple pentru control acces. Caracteristici chip: - transmisia fara contact (contactless) a datelor si a energiei - frecventa de lucru: 13.56 MHz - verificarea integritatii datelor prin 16-bit CRC, paritate, bit coding, bit counting - timp tipic de tranzactionare < 100 ms - distanta de operare pana la 100 mm - viteza de transfer date: 106 Knit/s - mecanism anticoliziune - 7 Byte UID sau 4 Byte NUID - perioada de pastrare a datelor de 10 ani - numar de cicluri de scriere: 200000 - memorie EEPROM 1kB organizata in 16 sectoare a 4 blocuri de 16 bytes Caracteristicile tehnice: - antena incorporata - grosime: 1 mm - dimensiune: 86x54 mm, standard card bancar - colturi rotunjite - material: PVC a...