small and large companies deal with the challenge of issuing and maintaining
employee identity credentials for physical access to company facilities. In
addition, some companies use these same identity credentials for physical
access and web-based authentication. Companies incur significant costs to
maintain the infrastructure that supports employee identity credentials and to
equip facilities, computers and employees with the readers that enable their
Mobile Assisted Authentication (MAA) devices represent both a better way for companies to manage physical access and a cost-effective and convenient way for employees to access company information (network or enterprise access). In addition, since virtually all phones are capable of supporting SMS, the MAA solution is the most generally available to all organizations and is relatively easy to use.
Using the phone as an out-of-band authentication device requires that an employee’s mobile phone be correlated with the person’s identity. The phone can then be used as an additional factor to authenticate the employee. For example, when an employee tries to gain access to the company network a short message service (SMS) message containing access information (e.g. One Time Password) is sent to the phone, which the employee enters on the Web site to gain access to the network. This approach can have several benefits. For example, using the phone as an out-of-band authentication device provides an additional (something you have) authentication factor and also protects against certain forms of attack—specifically phishing attacks to capture identity credentials for fraudulent use. To achieve access, someone must now intercept the user’s ID–password as well as the access information sent to the mobile device.
IProve® - Mobile Assisted Authentication offers numerous advantages and benefits. In addition, its lower costs and ubiquity make it an ideal complement to an organization’s existing security and authentication mechanisms. For many organizations, MAA can present a host of benefits to organizations looking to improve security while maximizing the productivity of end users and administrative staff.