Authenticator - Cryptomathic

By: Cryptomathic  11-11-2011
Keywords: Security, Two-factor Authentication, Hsms


Multi-Factor Authentication

The rise in on-line attacks, e.g. phishing and Trojans has led organisations to seek new ways of securing internet / telephone channels resulting in strong two-factor authentication - providing a long-term, strategic solution.

The Authenticator is a multi factor authentication server designed for scalable applications, for example, eBanking and eGovernment, with full support for a wide range of tokens, including our recently developed smartphone OTP soft-tokens.

Authentication Mechanisms

  • CAP / DPA
  • CodeSure
  • Digital signatures
  • Matrix cards
  • OATH (e.g. display cards)
  • OTP proprietary tokens (e.g. Vasco)
  • Pattern recognition
  • PKI
  • Secure fax
  • Smart phone applications
  • Static & partial user name and password
  • TAN lists

End-to-end Security and OTP Tokens

The Authenticator provides a much more secure and comprehensive solution than other authentication systems - addressing a variety of issues such as audit, compliance and dual control. Here are some of the features:

  • HSMs (Hardware Security Modules), securing cryptographic keys and authentication data
  • Attack detection, e.g. invalid authentication attempts
  • Administrator Security - remote admin client, chip card log-on, separation of duties and dual controls
  • Audit logs, including usage log and security log
  • Database, e.g. HSM encryption

This soft-token solution is easy to deploy, highly cost effective compared with legacy tokens and offers formidable 2FA security. It is also possible to include a custom logo to reinforce your branding.

Flexible & Future Proof

Criminals try to defraud users and steal their identities and in various simple and sophisticated ways. The Authenticator addresses relevant attacks and we will continue to add best in class authentication methods over time that foil future attacks ensuring that our customers stay ahead of the criminals. Current major attacks include:

  • Internal Attack
  • Man-In-The-Browser
  • Man-In-The-Middle
  • Mining
  • Pharming
  • Phishing
  • Social Engineering
  • Trojan


The Authenticator is scalable and is used by customers for managing anywhere from a few hundred users to several million.
The solution is the best 2FA solution for large roll-outs due to its performance and scalability features:

  • Fail-over, e.g. back-up or disaster recovery
  • Clustering
  • Load balancing across servers and HSMs

Return on Investment

Support for multiple authentication mechanisms allow companies to achieve full flexibility in adapting and modifying token strategies while avoiding token vendor lock-in, ensuring the highest ROI of all authentication servers as our customers can shop around for the most cost efficient authentication method.

On-line Demo

Authenticator Video

Keywords: Hsms, Security, Two-factor Authentication

Other products and services from Cryptomathic


Signer - Cryptomathic

As the private key is stored centrally, the physical security and responsibility of the key no longer lies with the individual user, as it is not stored on a PC or hardware token. The Signer functionality of using a central server for securely creating digital signatures on a user's behalf is a unique design by Cryptomathic and is patented worldwide.


Token Manager - Cryptomathic

As well as supporting the lifecycle phases it enables the token Issuer to define their own 'custom states' and the mechanisms used to transfer token states, providing a flexible yet detailed model for the control of any token type. The concept is similar to that of a payment card; it can be used by the customer to perform transactions but the physical plastic must also be managed by the bank.