Moreover, any communication between the USB security keys and the hosts, such as users’ computers, is encrypted by hardwired algorithms and is extremely hard to be intercepted and decrypt by unauthorized users. The complexity of the technology renders the USB security keys almost impossible to be replicated or counterfeited in any technically and economically viable way (though some researchers had managed to do so, which will be discussed later). These security codes, or tokens, are hardwired or hardcoded into the chips of USB security keys and cannot be changed by software. Each USB security key contains a unique security code used to verify users’ identities. USB Security Key (USB Shield) for Industrial and Commercial Bank of China (ICBC)(Source: v.) Benefits of USB Security KeyĪ USB security key, also known as the Universal 2nd Factor (U2F) key or USB key, is a type of hardware security key that plugs into a computer's USB ports. Industrial and Commercial Bank of China is the quintessence of integrating and enforcing USB security key in its online bank business, which holds a patented “method utilizing a USB KEY to encrypt and authenticate data of an online bank” (苏文力 et al., 2006) in China. Facebook and Twitter allow the USB key as well.įinancial institutes such as Bank of America also allow clients to link USB security keys to their accounts to protect online transactions. The user will pass the 2FA if the security key matches the one on file. ![]() ![]() After users input their correct password, Google will ask users to insert their security keys into the USB ports and then press the button on the key. For example, Google users can set up the 2FA with Google’s Titan Security Key or other compatible security keys. ![]() ![]() Īnother method for the second layer of security is the hardware-based tokens such as USB security keys. The second step comprises various approaches, including one-time passcodes generated by verification apps like Google Authenticator or those sent to users’ mobile phones, QR codes, and biometrics like fingerprints. The first step of authentication consists of the traditional usernames and passwords. Companies and institutes are adopting two-factor authentication (2FA) methods to protect users' information privacy and account security online.
0 Comments
Leave a Reply. |