Trojan Attacks
Trojans are pieces of malware allowing a hacker to remote access a computer system. They are not self-replicating and are not automated in that they need direction interaction with a hacker to fulfill their purpose.
Trojans need to be installed from an executable file or a compiler. Sometimes Trojans exploit flaws in a browser, messenger program, or media player. Once installed, the hacker can use the Trojan to access sensitive information. SolidPass protects you from Trojans with powerful two-factor authentication.
SolidPass supports transaction data signing (TDS). This allows the user to authenticate the transaction with a challenge issued by the enterprise and a response generated by SolidPass based on the transaction details. The response that is generated becomes the unique digital signature that when processed allows the transaction to go through.
SolidPass validates the signature against the transaction data and executes the transaction.
Two-Factor Authentication
The SolidPass family of security tokens provides strong two-factor authentication. SolidPass helps organizations and entities to realize stronger authentication than a static username and password by providing two-factor authentication. The SolidPass security token is engineered to dynamically generate a one-time password (OTP). Potential uses of SolidPass include securing access to enterprise applications and vpn connections. The security token can also be used to authenticate users and sign transactions. This is especially useful for online banking and mobile banking security, where SolidPass can be embedded in a mobile banking application for seamless authentication.
SolidPass supports the following strong authentication methods:
- Event-based One-Time Password (OTP)
- Time-based One-Time Password (OTP)
- PIN control mandatory/optional
- Security Question
- Challenge-Response
- Transaction Data Signing (TDS)
- Mutual Authentication