The PassWindow challenge pattern presented on the computer screen can easily be resized and moved around on the screen by the user. The size and position is then stored as a cookie in the user's web browser or alternatively on the system server for future reference, so you only ever have to do it once.
Why not try our demo to see the process for yourself?
No. The authentication script would simply record your preferred challenge image location and proportion and save this information to a cookie in your browser. If the service detects your cookies are disabled then alternatively the information can be recorded on the server as part of your user profile on their database.
This way, each time you need to authenticate in the future, the pattern is in the correct position for your card.
Dont worry – you will quickly learn how to recognize the numbers within the noise. The human brain has a remarkable ability to recognize familiar characters, even when they are surrounded by clutter. The authentication management software at the server end of the transaction will be monitoring your responses and adjust the patterns to make them easier for you every time you authenticate.
Yes, the animated challenge speed can be easily modified according to your preference by the server, in fact most implementations will detect the speed of your response and adjust the animation based on your authentication history.
Both challenge methods are effective authentication methods however the animated method shown in this video is much more resistant to long term trojan analysis than the static version with the same sized key pattern, requiring over 1000 times more interceptions by an attacker with total control of your computer. This is well beyond any normal usage even with many years of targeted interception and analysis.
The static challenge method works well on non electronic display media such as printed on documents or packaging, the interception value can be easily increased by adding extra columns and rows to both the key and challenge pattern.
A simple guideline is to use larger key patterns for applications which will include static media.
No the costs for transparent cards should be exactly the same as regular white cards.
Most raw plastic from the factory begins in a transparent form to which the specific colour is added during the manufacturing process such as white.
The PassWindow system works by sending a different and unique challenge pattern each time it is used to authenticate a user. This means that even if someone is watching you use the card and sees the digits you are entering on the screen, they can't use those numbers to falsely authenticate as you.
Also, because the PassWindow key pattern is made up of random LCD-display-like segments, even if the shoulder surfer sees your key, the arrangement cannot be easily remembered or communicated, as would be the case with a static CVV number or ordinary password.
A tint printed over the transparent PassWindow card region prevents PassWindow key patterns from being easily photocopied or photographed, and renders the pattern very difficult to see under normal conditions. However, placed against a backlit display, the digits can easily be read.
PassWindow is designed to be used as a second-factor authentication method. This means it should be used in conjunction with a memorized component, such as a username and password. Therefore, to authenticate, the user must provide 'something they know' – their username and password – along with 'something they have' – their PassWindow-embedded identification card.
Using these two factors together, it is possible to prevent people falsely authenticating as the legitimate owner of the card, even if the physical card is lost or stolen.
The Card Verification Value (CVV) is a number that is typically printed on the back of a credit card, which must be input in conjunction with one's other credit card details when making 'card not present' purchases, such as when one makes an online transaction.
This number is generated cryptographically by the issuing bank using the details of the credit card; however, this number is only printed on the card, it is not stored on the card's magnetic stripe.
Card vendors use this code to ascertain whether the person conducting the transaction either has the card in their possession, or has at least seen the card, or communicated with someone who has seen the card.
While CVV provides some level of protection against online credit card fraud in that merchants are required to regularly delete CVV data, it only really protects against the broad scale theft of card data; for example, from a compromised database.
CVV is also susceptible to phishing scams.
While PassWindow might be considered to be similar to CVV, it is far more secure as a result of the following differences:
No part of the PassWindow key pattern is stored on the card apart from the printed pattern in the transparent region of the PassWindow-embedded card. This means that even if you use your card in a compromised ATM fitted with a skimming device, an attacker will not be able to successfully authenticate as you to make online transactions.
The existence of key-logging and screen-capturing software represents a significant threat to the security of one's electronic data and is commonly used by hackers to obtain usernames, passwords, credit card details, etc. However, attacks of this nature remain fairly uncommon despite media hype.
Regardless, addressing this threat was one of the key design considerations in the development of PassWindow.
Assuming a hacker has infiltrated the target computer such that they are able to run key-logging and/or screen-capturing code, thereby capturing all computer activity, the security of PassWindow follows a predictable trajectory that can be managed so as to completely eliminate the threat of this kind of attack.
For a hacker to calculate enough of the user's PassWindow key pattern to make a reasonable guess about what it is, a minimum of several thousand interceptions must be made for even simple small sized key patterns.
If we generously assume that the target of the attack uses their card to log in or conduct a transaction once per day, it would require the hacker to successfully intercept all login attempts over the course of many years, or decades for the higher-complexity implementations that are commonly used for critical applications. In comparison the same trojan attack can bypass the equivalent time based token authentication in just 1 user interception.
PassWindow's security is also augmented using various proprietary techniques that drastically increase the number of successful interception attempts required to make reasonable guesses at the key pattern.
Much of security strength is increased exponentially by configuring a larger key pattern for the user; our extensive testing and analysis has shown that even with relatively small key patterns of 9 or 12 columns if configured properly are well beyond trojan analysis in any meaningful timeframe.
To complete the picture, with the PassWindow Authentication Manager it is possible to schedule card renewal at particular time intervals or after the user has reached a certain number of authentications, rendering it impossible for a hacker to obtain enough interceptions to have any meaningful chance at guessing the key pattern.
PassWindow's advantage is that in all likely scenarios, even with an extremely dedicated hacker, it would take in the order of years of hacker surveillance, and even this possibility can be negated through the correct use of the PassWindow Authentication Manager software.
Existing authentication systems use a hardware token that contains sophisticated electronics that generate new authentication codes at given time intervals – usually around 30 seconds or a minute. The clocks on the server and the hardware token are synchronized, allowing the server to be reasonably sure that the person entering the code is in possession of the hardware token.
The PassWindow authentication method is superior to hardware token based methods for the following reasons:
A brute-force attack generally involves continually probing an encrypted piece of data with many password keys to see if any succeed in producing a rational output, thereby hinting that the key is likely correct.
Because each PassWindow challenge/solution pair can suggest a number of possible keys, the only way it is possible to crack the PassWindow system is through statistical analysis of many known challenges/solutions intercepted over a compromised Internet connection.
So, while a brute-force attack is theoretically possible in this sense, it is prevented by the fact that it would take an attacker a very long time, in the order of months or years with normal use, to intercept sufficient challenge/solution pairs to compromise the user's PassWindow key pattern.
Therefore, unlike conventionally encrypted data, PassWindow is not susceptible to brute-force attacks.
By monitoring a user's keystrokes a trojan could theoretically try to match the timing of these against the challenge frame shown and thereby speed up the necessary number of interceptions to try to deduce the users key. In reality this is a very unlikely attack as users are seldom as precise in their keystroke timing as they would need to be and a variety of unknown factors could warp the results such as challenge network loading times.
Part of the added security strength of the animated challenge method is to obfuscate the exact digits a user enters against which frame the user has read them from; there are two simple methods to prevent this type of potential Trojan analysis being done against a user.
In practise this possibility can be easily prevented without any active interference to the user.
The PassWindow challenge pattern generator produces line segments that randomly superimpose segments on the key, so this technique cannot be used to gain information about the PassWindow key pattern on your card.
Biometric techniques, such as fingerprint or retinal scanning seek to authenticate the user based on properties unique to their bodies. While countless Hollywood movies might leave us with the impression that biometric identification systems are the gold standard of personal authentication, they are problematic for a number of reasons, a few of which are often borne out in the plots of said movies.
For example:
From our extensive analysis deduced by many independent international cryptographers and specialist mathematical pattern analysts there are a few simple rules for exponential key strength when choosing a PassWindow configuration.
A general suggestion from our own analysis for the smallest secure patterns would be 9 column key pattern for normal user authentication and 12 column key patterns for financial systems requiring individual transaction authentication.