Compared to Other Authenticators
Soft-Tokens
- Blind Authentication, no transaction context
Hard-Tokens
- Blind Authentication, no transaction context
- Can be stolen (no extra key required)
Security Key/Token
- Requerem compra de hardware adicional caro
- não é pratico
- pode ser perdido
- custo elevado para oferecer aos clientes
- não intuitivo
SMS Token
- SIM Cloning: Intercept SMS messages on ilegitimate phone
- Rogue BTS: GSM fake antenas intercept comms
- Malicious Apps: Intercept SMS on the legitimate phone
Matrix Card
- Can be stolen or copied (no extra key required).
- Matrix encryption model is not secure (many short keys, easy internal attacks)
embedded solution
TrustFactor can be embedded into a Client App, enhancing the user experience (UX), which is not possible with any of the other options.
Comparison
Multi-Factor Auhtentication | TrustFactor | Soft-Tokens | Hard-Tokens | Security Keys | SMS Tokens | Matrix Card |
---|---|---|---|---|---|---|
Knowledge Factor | ||||||
Possession Factor | ||||||
Inheritance Factor | ||||||
Location Factor | ||||||
Phishing Safe | Zero Input | ||||||
UI/UX Customization | ||||||
CAPEX: Investment Cost | $$ | $ | $$$ | $$$ | $$ | $ |
OPEX: Usage Cost | $$ | $ | $$ | $$ | $$ | $$ |
Cost per Authentication |
note
Cost estimated based on 300 k users and 10 M authentication per Year.