RapidSoft Systems Home
RapidSoft Systems Home
Offshore Software Development iPhone, Brew, Blackberry Software Development
Rapidsoft Mobile 2 Factor Authentication Solution

Rapidsoft Systems' Mobile Two Factor Authenticator Solution

Mobiles and smart phones are the next major frontier for integarting security technologies in business and personal applications. Rapidsoft Systems' pre-crafted solutions allows you to integrate mobile based security solutions in any application of your choice. We supply tools and integrated solutions using industry's best voice autentication platforms. The turnkey solutions area available for financial, insurance and other industries that needs tested two factor authentication system. Mobile two factor authentication can be integrated virtually with any application where there is a need to add two factor authetication.

Basics of Two Factor Authentication

Two-factor token-based authentication using one-time passwords has proven to be the most secure method to access critical information and applications. Two-factor authentication is stronger because it uses:

Dual factor authentication from Rapidsoft Systems verifies that it is actually the legitimate user in possession of the second factor and not another person who has stolen the mobile phone or is using malware to intercept the communication. It delivers a type of challenge-response on the user’s mobile phone for completely out-of-band, multi-layered authentication on the second factor device. The Rapidsoft Systems app can be installed on the iPhone, iPad, iPod Touch, BlackBerry and Android devices. Its two factor capability has been successfully integrated via the mobile network. The Two factor server manager manages all registered users.

Rapidsoft Systems provides server based connectors to integarte Google Apps, SugarCRM, Joomla, and other SaaS applications, offering a federated Single Sign-On (SSO) service. The app also supports the OAuth protocol, so you can integrate it into your website access control in minutes.

The Rapidsoft Mobile authenticator can integrate with user data residing in MS Active Directory, LDAP-based or SQL-based directories. This is a safe way for any organization to protect users' accounts and authorization to access sensitive web resources or internet applications.

Out-of-Band, Two-Factor Authentication

More businesses today are deploying two-factor authentication for users in order to improve security. However, the most common approaches including soft tokens and sending authentication codes as a plain text SMS message are not secure. Rapidsoft's two factor authemntication uses a secure SMS channel and all messages are encrypted using 256 bit encryption/decryption keys.

The Process Is Entirely Out-of-Band

The entire authentication process takes place out-of-band from the web session, making it much more secure than sending a code to the user's phone but then requiring the user to type it into the web page. The communication between the application on the phone and the API is a server-to-server communication which is more secure and less likely to be intercepted than a SMS communication.

Easier to Use

Relying on the mobile phone as a second factor is much more convenient for users than carrying hardware tokens, USB drives or smartcards. It's also more affordable for the business because there is no need to purchase, distribute and maintain expensive physical devices. Additionally, people have a natural ability to remember categories and recognize pictures. Touching/tapping a few pictures that match their chosen categories is much easier for people than trying to correctly copy a long alphanumeric code from their phone to the web page without making mistakes.

Business Applications

Common uses for two-factor authentication include:

Deployment Options

Rapidsoft Mobiel Authenticator can be used as a stand-alone authentication solution or integrated into existing authentication technologies and mobile applications, including integrating it with SMS-based authentication processes to make the SMS more secure. The image-based authentication challenge can be delivered as an application on a user's smartphone or as a zero-footprint model using the mobile browser on the phone. Additional delivery methods are available for users who do not have smartphones.

Price and Licensing

Please contact us for more details on pricing and other custom features. We offer several pricing options - licensing and usage based pricings. Pricing based on the number of subscribers (starting as a low as $2/per consumer per month). Customization changes based on specific customer requirements can be done. Integration with end user systems is provided.

Partners

iPhone developer
Spacer

Popular Services

Industry & Verticals

Key Technologies

Popular Products