KEMBAR78
2FA Protocol Presentation | PPTX
Two-Factor
Authentication
- Akhil Agrawal
Purdue University
Why is it required?
• Legacy Authentication & Authorization alone
are not enough
• Passwords alone are not enough
• No way to verify the end user is our real
subscriber
• No way to verify the end user is bound to
his/her account services
How does it work?
• During any service/application activation, a
random code (Passcode) will be provided
• Subscriber should call from home line and
provide Passcode
• Subscriber account, home line Passcode will
be verified
• Service/Application will be activated
What applications will use it?
• Any application on voice platform
• Phone2Go will be able to use it
immediately
Different Approaches
• Place a call to Subscriber’s home phone,
collect the Passcode & Verify
• Subscriber will place a call to a dedicated
line from home phone, collect the Passcode
& Verify
• Ask Subscriber to place a call to dedicated
line from home phone with in short duration
Technologies Used
• Java
• MySQL
• Dialogic
Architecture
Implementation - Overview
Database – Physical Model
Column Name Data Type Default Value Description
ID UNSIGNED
BIG INT
NOT NULL
PRIMARY KEY
AUTO INCREMENT
Primary Key.
TN INT NULL User's Landline TN.
ApplicationId VARCHAR(25) NULL Name of the Application.
ActivationKey VARCHAR(25) NULL Special parameters required by
respective external client.
MacAddress VARCHAR(25) NULL Mac Address of device.
Token INT NULL 6 digit code generated for 2FA.
DateAndTime DATETIME NOT NULL
Default now()
Date and Time when the code was
created.
2FAStatus VARCHAR(10) NULL Shows the status of the 2 Factor
Authentication.
Will accept only init and success as
values.
REST Module - Layered Architecture
REST Module Sequence Diagram
SIP Module - Layered Architecture
Use Cases
• User making the call and entering the correct
code with no errors.
• User making the call without initiating the 2
Factor Authentication Request.
• User making the call after the set time limit.
• User entering the incorrect code.
SIP Module Sequence Design
No Initiated 2FA Request
User Called After Time Limit
User Entered Incorrect Auth Code
Mentors
• Mr. Naresh Dhiman – Architect and Design of
the solution.
• Mr. Thirumal Ramachandruni, Mr.
Umashankar Somasundaram – Java
development.
• Mr. Mathivanan Manickam – Integration with
Media Server.
Conclusion
• Completing this project for my internship has
been a learning and enjoyable experience.
• I really hope my project helps add a layer of
security to the existing and upcoming voice
applications.

2FA Protocol Presentation

  • 1.
  • 2.
    Why is itrequired? • Legacy Authentication & Authorization alone are not enough • Passwords alone are not enough • No way to verify the end user is our real subscriber • No way to verify the end user is bound to his/her account services
  • 4.
    How does itwork? • During any service/application activation, a random code (Passcode) will be provided • Subscriber should call from home line and provide Passcode • Subscriber account, home line Passcode will be verified • Service/Application will be activated
  • 5.
    What applications willuse it? • Any application on voice platform • Phone2Go will be able to use it immediately
  • 6.
    Different Approaches • Placea call to Subscriber’s home phone, collect the Passcode & Verify • Subscriber will place a call to a dedicated line from home phone, collect the Passcode & Verify • Ask Subscriber to place a call to dedicated line from home phone with in short duration
  • 7.
  • 8.
  • 9.
  • 10.
    Database – PhysicalModel Column Name Data Type Default Value Description ID UNSIGNED BIG INT NOT NULL PRIMARY KEY AUTO INCREMENT Primary Key. TN INT NULL User's Landline TN. ApplicationId VARCHAR(25) NULL Name of the Application. ActivationKey VARCHAR(25) NULL Special parameters required by respective external client. MacAddress VARCHAR(25) NULL Mac Address of device. Token INT NULL 6 digit code generated for 2FA. DateAndTime DATETIME NOT NULL Default now() Date and Time when the code was created. 2FAStatus VARCHAR(10) NULL Shows the status of the 2 Factor Authentication. Will accept only init and success as values.
  • 11.
    REST Module -Layered Architecture
  • 12.
  • 13.
    SIP Module -Layered Architecture
  • 14.
    Use Cases • Usermaking the call and entering the correct code with no errors. • User making the call without initiating the 2 Factor Authentication Request. • User making the call after the set time limit. • User entering the incorrect code.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
    Mentors • Mr. NareshDhiman – Architect and Design of the solution. • Mr. Thirumal Ramachandruni, Mr. Umashankar Somasundaram – Java development. • Mr. Mathivanan Manickam – Integration with Media Server.
  • 20.
    Conclusion • Completing thisproject for my internship has been a learning and enjoyable experience. • I really hope my project helps add a layer of security to the existing and upcoming voice applications.