January 6, 2016 By Larry Loeb 2 min read

The war on password use has been waging on for some time now. Passwords are a relic of the days when computers were stand-alone boxes and hardly ever networked; the damage of a bad login was limited to one account at one location. But a networked computer can do far more damage.

FIDO Takes a Stab

The FIDO Alliance was one of the first organizations to experiment with a viable password alternative. According to the group, the goal is “to change the nature of authentication by developing specifications that define an open, scalable, interoperable set of mechanisms that supplant reliance on passwords to securely authenticate users of online services.”

Those are lofty aspirations, to be sure. The group first concentrated on specs and standards for hardware such as dongles and fingerprint readers embedded in devices. But the effort has never really gained traction in the authentication field and has so far come up short of developing widely adopted solutions.

Google Tests a Password Variant

Google has begun a test of another authentication system that uses a common hardware device: your smartphone. An individual who was granted early access to the technology recently posted the details on Reddit.

It seems simple enough: To sign on, an email address is entered and the phone number associated with that address receives a notification. One of the three numbers present in the notification is pressed, depending on the instructions from Google. Once this challenge is completed, login proceeds. The mobile device must have a secured lock screen so only the owner can access it.

This approach gets around the rigidity of biometrics. Fingerprints never change; once they are used as a key, invariance is a big problem. If stolen somehow, they can be used by a bad actor who knows that the print will always be valid.

This new method is different than the two-factor authorization Google uses in its Authenticator app. It’s easier to use because no additional typing by the user is needed. That could lead to greater adoption since ease of use is always a bonus when trying to get users to accept new practices.

Yahoo Did It First

The Yahoo Account Key was introduced by Yahoo in 2015 as part of its Mail redesign. It’s basically a push notification sent to a smartphone that allows account login. It links your Yahoo account to a mobile device, likely a smartphone.

It works this way: When logging in to Yahoo Mail on the Web, the email address is entered, then the password field selected. Yahoo recognizes that the feature is enabled and sends a push notification to the phone. Approval or denial of the login can then be performed from the phone.

While Yahoo said at the time of introduction it would implement this approach to its other services, that has yet to happen. But now that Google has jumped on board, Yahoo may seek to catch up.

The Smartphone Is the New Dongle

The latter two approaches use the smartphone as the hardware key to the account. To gain access, one must have an active mobile device on hand.

The true question here is how many users will adopt this approach. If the old, cumbersome method of passwords can be supplanted by these new ways, companies that adopt them will be in a better position to deliver services with less bother to users. If cybercriminals or even petty thieves catch up to this technology, however, it could have dire consequences.

More from Identity & Access

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Artificial intelligence threats in identity management

4 min read - The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned about confidential data loss through employees, ex-employees and third-party vendors. Additionally, many feel digital identity proliferation is on the rise and the attack surface is…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today