contents

software
 
nCryptone and Inteligensa Launch nC Mobile Token

nCryptone and Inteligensa join their expertise to transform cellphones into Tokens that are both simple to deploy and to use. Today, cellphones are mass market objects, they are always handy and give access to numerous services. In order to meet the pressing needs or a stronger security of electronic exchanges, cellphones can also be used as tokens, providing dynamic passwords which will replace outdated static passwords. This approach is appealing, but only if the proper tools and services - allowing to implement a solution as easily as using it to call - are provided to customers.

This is the reason why nCryptone's nC Mobile Token includes:
- A software platform (nC Mobile Service Center) allowing large companies (banks, administrations, e-merchants, etc.) as well as their end-users, to manage, via a secure website, all the steps of the token life cycle: creation of the token, token's graphic personalization, user provisioning and enrolment, software deployment on cellphones (on air download or SMS), token activation (first use) or deactivation (in the case of cellphone theft for instance) of the authentication function… This modular platform is offered either as ASP or in licence mode.
- A software which, once received by the cellphone, calculates and displays on the screen a dynamic password (OTP), based on a highly secure algorithm: OATH (nCryptone is a coordinator member of OATH). The launch of the calculation is done by entering a Pin code on a cellphone keypad, which constitutes, with the OTP, the second factor of authentication.

nC Mobile Token is compatible with all OATH compliant authentication servers. This compatibility, along with its easiness to implement thanks to the nC Mobile Service Center, guarantees quick deployment and a fast ROI. Created jointly with Inteligensa, the nC Mobile Token suite combines nCryptone's experience in the field of strong authentication and Inteligensa's expertise in the field of highly secure chips.



write your comments about the article :: © 2007 Computing News :: home page