Tiqr: a novel take on two-factor authentication

Roland M. van Rijswijk, Joost van Dijk

Research output: Contribution to conferencePaperAcademicpeer-review

55 Downloads (Pure)

Abstract

Authentication is of paramount importance for all modern networked applications. The username/password paradigm is ubiquitous. This paradigm suffices for many applications that require a relatively low level of assurance about the identity of the end user, but it quickly breaks down when a stronger assertion of the user’s identity is required. Traditionally, this is where two- or multi-factor authentication comes in, providing a higher level of assurance. There is a multitude of two-factor authentication solutions available, but we feel that many solutions do not meet the needs of our community. They are invariably expensive, difficult to roll out in heterogeneous user groups (like student populations), often closed source and closed technology and have usability problems that make them hard to use. In this paper we will give an overview of the two-factor au- thentication landscape and address the issues of closed versus open solutions. We will introduce a novel open standards-based authentication technology that we have developed and released in open source. We will then provide a classification of two-factor authentication technologies, and we will finish with an overview of future work.
Original languageUndefined
Pages81-97
Number of pages17
Publication statusPublished - 4 Dec 2011

Keywords

  • Authentication
  • two-factor authentication
  • IR-93961
  • Security
  • EWI-25210

Cite this

@conference{0b8a5ad54a7f4f35918b77036a0d7d1d,
title = "Tiqr: a novel take on two-factor authentication",
abstract = "Authentication is of paramount importance for all modern networked applications. The username/password paradigm is ubiquitous. This paradigm suffices for many applications that require a relatively low level of assurance about the identity of the end user, but it quickly breaks down when a stronger assertion of the user’s identity is required. Traditionally, this is where two- or multi-factor authentication comes in, providing a higher level of assurance. There is a multitude of two-factor authentication solutions available, but we feel that many solutions do not meet the needs of our community. They are invariably expensive, difficult to roll out in heterogeneous user groups (like student populations), often closed source and closed technology and have usability problems that make them hard to use. In this paper we will give an overview of the two-factor au- thentication landscape and address the issues of closed versus open solutions. We will introduce a novel open standards-based authentication technology that we have developed and released in open source. We will then provide a classification of two-factor authentication technologies, and we will finish with an overview of future work.",
keywords = "Authentication, two-factor authentication, IR-93961, Security, EWI-25210",
author = "{van Rijswijk}, {Roland M.} and {van Dijk}, Joost",
year = "2011",
month = "12",
day = "4",
language = "Undefined",
pages = "81--97",

}

Tiqr: a novel take on two-factor authentication. / van Rijswijk, Roland M.; van Dijk, Joost.

2011. 81-97.

Research output: Contribution to conferencePaperAcademicpeer-review

TY - CONF

T1 - Tiqr: a novel take on two-factor authentication

AU - van Rijswijk, Roland M.

AU - van Dijk, Joost

PY - 2011/12/4

Y1 - 2011/12/4

N2 - Authentication is of paramount importance for all modern networked applications. The username/password paradigm is ubiquitous. This paradigm suffices for many applications that require a relatively low level of assurance about the identity of the end user, but it quickly breaks down when a stronger assertion of the user’s identity is required. Traditionally, this is where two- or multi-factor authentication comes in, providing a higher level of assurance. There is a multitude of two-factor authentication solutions available, but we feel that many solutions do not meet the needs of our community. They are invariably expensive, difficult to roll out in heterogeneous user groups (like student populations), often closed source and closed technology and have usability problems that make them hard to use. In this paper we will give an overview of the two-factor au- thentication landscape and address the issues of closed versus open solutions. We will introduce a novel open standards-based authentication technology that we have developed and released in open source. We will then provide a classification of two-factor authentication technologies, and we will finish with an overview of future work.

AB - Authentication is of paramount importance for all modern networked applications. The username/password paradigm is ubiquitous. This paradigm suffices for many applications that require a relatively low level of assurance about the identity of the end user, but it quickly breaks down when a stronger assertion of the user’s identity is required. Traditionally, this is where two- or multi-factor authentication comes in, providing a higher level of assurance. There is a multitude of two-factor authentication solutions available, but we feel that many solutions do not meet the needs of our community. They are invariably expensive, difficult to roll out in heterogeneous user groups (like student populations), often closed source and closed technology and have usability problems that make them hard to use. In this paper we will give an overview of the two-factor au- thentication landscape and address the issues of closed versus open solutions. We will introduce a novel open standards-based authentication technology that we have developed and released in open source. We will then provide a classification of two-factor authentication technologies, and we will finish with an overview of future work.

KW - Authentication

KW - two-factor authentication

KW - IR-93961

KW - Security

KW - EWI-25210

M3 - Paper

SP - 81

EP - 97

ER -