Download presentation
Presentation is loading. Please wait.
Published byEdward Andrews Modified over 9 years ago
3
Our Mission: to secure these applications
4
Against… Direct observation of the login process Network snoopers Tailgating proxy Keystroke logging malware Man-in-the-middle attacks Frame buffer readers The Enemy Within
6
Caused By…
7
and…
8
The Solution
9
The means The user enters the digits corresponding to a secret Keyword. If the Keyword is ‘Fred’ the user enters ‘1101’. Each login features a different set of random numbers, so the matrix solution is different each time.
10
The Products 1. Forticode Enterprise 2. Forticode Authentication Engine with Diffie- Hellman Public Key Encryption 3. Forticode Bulletproof Authentication Engine with D-H Public Key Exchange and in-memory Database 4. Forticode Machine-to-Machine Authentication Engine with Diffie-Hellman Public Key Encryption * Products 2, 3 and 4 require the client to write an interface, for which Forticode supplies a template. * Product 1 is self-contained, with an Oracle/Informix database, needs no interface, and is installed for trial at www.designsim.com.au
11
Forticode Enterprise Web-based CGI with dynamic HTML pages Integrated AES256 Encrypted Oracle, DB2 or Informix Database Suitable for up to 20 million users, possibly unsuitable for credit card applications, because migration or sync would be needed with client’s DB 70 integrated graphical account administration pages, CSS programmable Optional XML account administration interface Composite bitmap matrix display, proof against screen scrapers or key loggers Optional QR matrix display Optional selectable image sets for matrix SHA256 matrix solution submission
12
The Enterprise admin functions
13
Forticode Authentication Engine with Public Key Encryption Unix TCP/IP daemon with fork-on-connect Uncrackable Diffie-Hellman public key exchange New public key with each connection Extremely fast authentication Unlimited number of users Specifically designed for credit card applications No database for hackers to steal No graphics. All communication is in XML framework AES256 private key encrypted credentials AES256 private key encrypted matrix and matrix solution
14
Forticode Bulletproof Authentication Engine With In-memory Database Unix TCP/IP daemon with fork-on-connect Uncrackable Diffie-Hellman public key exchange New public key with each connection Fast authentication Number of users limited to ~5 million, therefore unsuitable for credit card applications In-memory database only contains uncrackable SHA256 hashes of credentials. The Enemy Within has nothing to steal No graphics. All communication is in XML framework AES256 private key encrypted matrix and matrix solution
15
Forticode Machine-to-Machine Authentication Engine Unix TCP/IP daemon with fork-on-connect Uncrackable Diffie-Hellman public key exchange New public key with each connection Extremely fast authentication Unlimited number of client machines No database for hackers to steal No graphics. All communication is in XML framework AES256 private key encrypted credentials AES256 private key encrypted matrix and matrix solution
16
Templates for Interfaces Forticode Enterprise Not required, unless XML communication is selected Authentication Engine with Public Key Encryption Implements Diffie-Hellman public key exchange, AES256 encryption, and XML communications Bulletproof Auth Engine with Public Key Encryption and in-Memory Database Implements Diffie-Hellman public key exchange, AES 256 encryption, SHA256 hash for credentials in database and XML communications.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.