Compared to Other Authenticators
Soft-Tokens
- Blind Authentication, no transaction context
Hard-Tokens
- Blind Authentication, no transaction context
- Can be stolen (no extra key required)
Security Key/Token
- Requerem compra de hardware adicional caro
- não é pratico
- pode ser perdido
- custo elevado para oferecer aos clientes
- não intuitivo
SMS Token
- SIM Cloning: Intercept SMS messages on ilegitimate phone
- Rogue BTS: GSM fake antenas intercept comms
- Malicious Apps: Intercept SMS on the legitimate phone
Matrix Card
- Can be stolen or copied (no extra key required).
- Matrix encryption model is not secure (many short keys, easy internal attacks)
embedded solution
TrustFactor can be embedded into a Client App, enhancing the user experience (UX), which is not possible with any of the other options.
Comparison
| Multi-Factor Auhtentication | TrustFactor | Soft-Tokens | Hard-Tokens | Security Keys | SMS Tokens | Matrix Card |
|---|---|---|---|---|---|---|
| Knowledge Factor | ||||||
| Possession Factor | ||||||
| Inheritance Factor | ||||||
| Location Factor | ||||||
| Phishing Safe | Zero Input | ||||||
| UI/UX Customization | ||||||
| CAPEX: Investment Cost | $$ | $ | $$$ | $$$ | $$ | $ |
| OPEX: Usage Cost | $$ | $ | $$ | $$ | $$ | $$ |
| Cost per Authentication | ||||||
note
Cost estimated based on 300 k users and 10 M authentication per Year.