Turn your phone into an Authentication token!

I was turned onto this Authentication Solution recently, and I have to admit after having looked the site over that the possibilities for this type of a solution are extremely high!  Cost of Ownership appears to be significantly lower than a Token Key system (think SecurID), which means Return on Investment will likely be much higher.

Here’s how it works on a pre-configured site:

  • Enter your usual username and password.
  • Instantly, you receive a phone call. Answer and press the pound sign (#).
  • That’s It!

This simple process provides two separate factors of authentication through two separate channels (your computer and your phone service).  So instead of just answering a network challenge by providing your PIN and PASSCODE displayed on your SecurID token, this service will call your cell-phone and then you enter a # into your phone.

Some advertised benefits:

  • Works with any VPN, enterprise application, or website
  • Eliminates the need for tokens
  • Works with any phone anywhere
  • Easy to setup, manage, and use

Pretty cool, huh?   For more details, check out their homepage

What features do you want in a PDA Phone?

Smartphones generally favor the smaller form-factor: smaller screens that generally have no touch-sensitivity on the screen. But those of us who use PDAs prefer the opposite: a larger screen sizes that are touch-sensitive, but still have voice and data connectivity.
With that thought in mind, I think that the bulk of society only needs basic PDA functionality (Calendar, Tasks, Contacts, etc), and would be best utilizing them on a SmartPhone. This is obviously the reason for the prominence of SmartPhones. But what about those of us who are power users, who desire more of an actual PDA with more features than just a SmartPhone? Let’s discuss the benefits of what programs or technology are best kept relegated to one platform or another. Here are the basics that I see in each of the two categories at this time:

SmartPhone (where smaller size is better) for most of Society:

  • WM5 or WM6,
  • Regular PIM Functionality (Contacts, Calendar, Tasks),
  • E-mail,
  • Mobile Media,
  • Cell/PCS Phone,
  • Data Plan.
  • Bluetooth 2.0

PDA-Phone (where larger screen is better) for the Techies among us:

  • Larger Screen size (3.5″ – 4″), preferably VGA resolution of 640×480 (or better),
  • Much Larger Memory capacity: 1GB ROM and 2GB Flash RAM minimum,
  • SDHC Card slot,
  • Biometric Finger-Print reader for added Security,
  • Mini USB connector for data exchange and charging.
  • Should meet all of Rad’s Laws (tip of hat to Radimus).
  • All devices should charge via USB (where possible).
  • All devices should have more than one function or interface with other devices
  • Bluetooth LEDs are at least 50% too bright and should only be lit when an error is present, when searching, or when charging.
  • Full QWERTY Keyboard (Slide-out)
  • Regular PIM Functionality (Contacts, Calendar, Tasks),
  • WM6 (or better) with PDF & Office for PDA + Image Viewer native.
  • E-mail, preferably via WebIS’ FLEXMAIL application.
  • Mobile Media Player with support for all the known media formats (including AJAX and Flash),
  • 3G/4G/GSM Cell/PCS Phone service available through your favorite Carrier,
  • 3G/4G/GSM Data Service capability available through your favorite Carrier,
  • WiFi A/B/G/N with Quick-Connector for External Antenna,
  • Consumer InfraRED, with Bundled TV Remote software,
  • Bluetooth 2.0 w/EDR (enhanced data rate), full support for Stereo Audio
  • GPS (SiRFStar III or better), with bundled “on-road” and “off-road” Applications for getting you from point-a to point-z.
  • Barcode scanner, with bundled Database manager (for your DVD/CD collection).
  • 3MP+ Camera in back for quality snaps & video, and a 2MP front-facing camera for Video Conferencing/Calling, with built-in Flash.
  • Video Out connectors (for Video presentations, etc).

What else would you like to see added to either phone category?

 

Miscellaneous Stuff:

  • ActiveSync 4.6 (or whatever version#) w/OTA WiFi Synchronizing for non-Exchange (i.e. Single user Outlook) and Sync’ing w/Mac systems.

When will I get this kind of convergence?

There are many PDAs out there with Telephony services, a camera, and other features, but they are always lacking something: like integrated GPS, VGA, or sufficient base RAM memory.

When will some company create a PDA with these features?

  • Cellular (GSM & 3G) plus Data (GPRS/UMTS/Edge).
  • 4″ VGA (640×480 minimum) screen.
  • Faster Processor (624Mhz PXA270 or better).
  • More SDRAM (128MB minimum, 256MB preferred).
  • SiRFstar III GPS (AGPS would be cool).
  • 3MP Camera, + 1MP front-facing Video Conference
  • Wireless WiFi b & g, Bluetooth 2.0 + EDR.
  • SDIO or MicroSD (SDHC compatible).
  • Barcode scanner & Inventory Software.

So far, the Psion Teklogix “iK�n” PDA Phone that Breley alerted us to last week is the closest match to date, but even the iK�n is lacking in a few areas, namely a 2MP camera instead of a 3MP camera, no front-facing camera for Video Conferencing, no AGPS (minor actually), no 3G capabilities, and a 3.7″ screen.  Also, it appears the Barcode scanner/imager is “optional”, so it looks like it may be an “add-on” module.

Next closest is the E-TEN Glofiish X500+, but it too lacks a lot: 2.8″ screen, 64MB of SDRAM, no front-facing camera for Video Conferencing, and no Barcode Scanner.

Can anyone else suggest a device that comes close to offering these same specifications.   I’ll draw the line at UMPCs because I’m still looking for a regular PocketPC.

Another HSI (High Speed Internet) Router setup

Today I got to work on a new brand of Router currently being distributed to Verizon High Speed Internet (HSI) customers: the ActionTec modem & DSL Router GT704-WG (presumably for “Wireless-G”).

It had a nice browser interface, but a very limited implementation of WPA, in that it only allowed alpha and numeric characters for key-entry.  This goes against the industry standard, which is to allow additional characters (specifically special characters) to be used in key generation.  If the intention is to secure the connection between the client and the access point, then why reduce the effectiveness of that security by limiting the character-set the key is based on?  Sigh…

Security in a Mobile World part-4 Posted

Today I posted the last part of my four part article “Security in a Mobile World”.   This article part, as well as the prior 3 parts, can be found at Mobility Today.

Security on the PocketPC platform is a great deal different than your laptop. Security issues considered minor on the Laptop platform like Physical Access, Application/Data Access, and Theft/Loss Mitigation are more substantial on the PocketPC platform, because the PocketPC is infinitely easier to steal than a laptop. And larger issues on the Laptop like Firewalls, AntiVirus, and AntiSpyware become less predominant because the PocketPC platform offers less of a potential target for hackers. Because there is currently more interest in cracking Windows PC data and applications, the PocketPC platform is relatively safe, but that will change soon enough.

If you would like to read the entire 4th part of this article, click here.

Security in a Mobile World part-3 Posted

Today I posted the third part of my four part article “Security in a Mobile World”.   This article part, the prior 2 parts, and the remaining  part will continue to be published at Mobility Today.

It is a well known fact that most every Laptop user could stand to improve their privacy (and overall security) when utilizing their PC for everyday use. This installment is geared towards getting you started on the right path towards accomplishing this goal.

If you would like to read the entire 3rd part of this article, click here.

Security in a Mobile World part-2 Posted

Today I posted the second part of my four part article “Security in a Mobile World”.   This article part, the prior part, and the remaining 2 parts will continue to be published at Mobility Today.

Public wireless hotspots are, by definition, meant to be public, and so it goes that private hotspots are meant to be private, regardless as to whether or not the hotspot is encrypted to keep unauthorized users out. This is the same as recognizing the difference between a grocery store and a residential home. A grocery store is open to the public, and you can walk through the door and browse among the aisles to your hearts content. Likewise, it is generally understood that it is completely unacceptable for someone to just walk into another person’s home unannounced. It needs to be understood and accepted that a private Wi-Fi LAN is essentially an extension of someone’s personal property.

If you would like to read the entire 2nd part of this article, click here.

Security in a Mobile World part-1 Posted

Today I posted the first part of my four part article “Security in a Mobile World”.   This article part, and the following 3 parts will continue to be published at Mobility Today.

Security is a multilevel concept, in both the mindset and it’s practical application. The mindset refers to keeping the concepts of security at the front of your mind while you go through your daily activities. The practical application is Security itself. For now, I will only attempt to touch on the important levels (under the heading of Practical Application) that Mobile Users need to consider in today’s environments. Later I will touch on the mindset aspect of Security.

If you would like to read the entire 1st part of this article, click here.