Investors Hangout Stock Message Boards Logo
  • Home
  • Mailbox
  • Boards
  • Favorites
  • Whats Hot!
  • Login - Join Now!
Zerify Inc ZRFY
(Total Views: 607)
Posted On: 01/04/2019 7:04:51 AM
Post# of 82686
Posted By: CyberJ
Re: maronti1 #46037
This link & explanation of OOBA defeats Alice101

(Thanks Maronti great find!) OOBA simply explained

It explains a superior ,sophisticated inventive process using 2 different signals over 2 different channels over the previous single band (internet) patent Read below.

Simply explained, everybody understands it, except thieves who are stealing it and their lawyers


Quote:
Out-of-Band Authentication (OOBA)
Definition - What does Out-of-Band Authentication (OOBA) mean?

Out of band authentication (OOBA) is a term for a process where authentication requires two different signals from two different networks or channels. These kinds of more sophisticated authentication prevent many kinds of fraud and hacking. Out-of-band authentication will effectively block many of the most common kinds of hacking and identity theft in online banking.



Techopedia explains Out-of-Band Authentication (OOBA)
The essential idea behind out-of-band authentication is that by using two different channels, authentication systems can guard against fraudulent users that may only have access to one of these channels.

One of the most common examples of out-of-band authentication is in banking transactions. Typically, a customer wishing to do an online bank transaction will be sent an SMS message by cell phone with a password. This way, any hackers or identity thieves that have access through key loggers or other equipment will not be able to access that particular password, because it is sent over a 3G or 4G wireless network instead of being sent over the Internet. This type of authentication can be extremely effective as long as fraudulent operators haven’t somehow gained access to the user’s cell phone system as well. Sophisticated hacking that is able to access the SMS message and password is often called a man-in-the-middle attack. In general, a man-in-the-middle attack involves creating a dummy network that will trick the victim into thinking that it is a legitimate network. If the actor can intercept the user’s cell phone communications, it may be possible to overcome out-of-band authentication security protocols.

.













(6)
(0)









  • New Post - Investors HangoutNew Post

  • Public Reply - Investors HangoutPublic Reply

  • Private Reply - Investors HangoutPrivate Reply

  • Board - Investors HangoutBoard

  • More - Investors HangoutMore

  • Keep Post - Investors HangoutKeep Post
  • Report Post - Investors HangoutReport Post
  • Home - Investors HangoutHome
  • Mailbox - Investors HangoutMailbox
  • Boards - Investors HangoutBoards
  • Favorites - Investors HangoutFavorites
  • Whats Hot! - Investors HangoutWhats Hot!
  • Settings - Investors HangoutSettings
  • Login - Investors HangoutLogin
  • Live Site - Investors HangoutLive Site