IBM brings two-factor authentication to Android handsets
Big Blue aims to beef up securing on Android handsets.


IBM has developed two-factor authentication that uses near-field communication (NFC) to secure financial transactions on mobile devices.
Big Blue claims using NFC means that users no longer have to carry inconvenient devices such as a random password generator.
Two-factor authentication is already prevalent in the business world where employees are required to enter a password and a verification code sent by text message to log into accounts or services.
IBM said its scientists have applied the same concept using a PIN and a contactless smartcard, such as a bank card or an employer-issued identity badge.
A user simply holds the contactless smartcard next to the NFC reader of the mobile device and after keying in their personal identification number (PIN), a one-time code would be generated by the card and sent to the server by the mobile device.
The technology is based on end-to-end encryption between the smartcard and the server using AES (Advanced Encryption Standard) security.
"Our two-factor authentication technology based on the Advanced Encryption Standard provides a robust security solution with no learning curve," said Diego Ortiz-Yepes, a mobile security scientist at IBM Research.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
According to a recent report by ABI Research, the number of NFC devices in use will exceed 500 million in 2014. Another study from Juniper Research forecasts that one billion mobile phone users will use their devices for banking purposes by 2017, making this a vulnerable market for hackers.
The technology, which is available today for any NFC-enabled Android 4.0 device, is based on IBM Worklight, a mobile applicationplatform IBM acquired in 2012. Future updates will include additional NFC-enabled phones.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Want a return on your AI investment? Open source could be the key to success
News Organizations using open source AI tools are more likely to report a return on investment
By Nicole Kobie
-
IBM just open sourced these generative AI coding models
News IBM has open sourced models trained on code written in 116 programming languages - and it could make life a lot easier for enterprise developers
By Steve Ranger
-
Application performance management for microservice applications on Kubernetes
whitepaper How to improve business-critical app performance in a Kubernetes environment
By ITPro
-
Can Oracle really be Linux's knight in shining armor?
Opinion The self-proclaimed champion of open source freedom would like you to forget about its history
By Richard Speed
-
Achieving software health in the microservices age
Whitepaper Tips and tricks for the new and emerging remediation methods
By ITPro
-
The true story behind the IBM Personal Computer
In-depth The industry-creating IBM Personal Computer 5150 turned 40 this year. To mark the occasion, we reveal the story of its birth – and destroy one long-running myth in the process
By Tim Danton
-
Xinuos sues IBM for patent infringement
News Lawsuit revisits ancient legal war over Unix code
By Danny Bradbury
-
Log-On Wave for IBM Z simplifies highly virtualized environments
News The service improves productivity and flattens the learning curve for less-experienced admins
By Praharsha Anand