M-Pin - Two Factor Authentication For Web sites

  •        1030

M-Pin Strong Authentication System enables true two-factor authentication for web sites and applications, based on the open source M-Pin Authentication Server and M-Pin Managed Service. The M-Pin™ Managed Service is a highly available, fault tolerant software as a service that issues cryptographic secrets to M-Pin Authentication Servers and Clients.

The M-Pin Authentication Server uses just one leak-proof cryptographic key, and can't reveal any information about your users such as identity or login details, even if the key is compromised. The M-Pin Client is an HTML5 browser, so developers can easily integrate M-Pin into their websites and applications, enabling frictionless two-factor authentication and removing all username / password vulnerabilities.

www.certivox.org

Tags
Implementation
License
Platform

   




Related Projects

M-Pin-Server


M-Pin™ Strong Authentication Server: M-Pin™ Strong Authentication System enables true two-factor authentication for web sites and applications, based on the open source M-Pin™ Authentication Server and M-Pin™ Managed Service.

M-Pin-Perl-RP


M-Pin Perl Relying Party Library: This directory contains the source code and Perl language wrapper for M-Pin Relying Party (RP) code for the M-Pin Strong Authentication System.

M-Pin-Java-RP


M-Pin Java Relying Party Library: This directory contains the source code and Java language wrapper for M-Pin Relying Party (RP) for use in the M-Pin Strong Authentication System.

Apache Shiro - Java Security Framework


Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s easy-to-understand API, you can quickly and easily secure any JVM-based application – from the smallest mobile applications to the largest web and enterprise applications.

Keyczar - Toolkit for safe and simple cryptography


KeyczarKeyczar is an open source cryptographic toolkit designed to make it easier and safer for devlopers to use cryptography in their applications. Keyczar supports authentication and encryption with both symmetric and asymmetric keys. Keyczar was originally developed by members of the Google Security Team.



Cryptlib - provides Encryption and Authentication Service


cryptlib is a powerful security toolkit that allows even inexperienced crypto programmers to easily add encryption and authentication services to their software. It provides support for S/MIME and PGP/OpenPGP secure enveloping, SSL/TLS and SSH secure sessions, CA services such as CMP, SCEP, RTCS, and OCSP, and other security operations such as secure timestamping.

M-Pin-C-Client


M-Pin C Client Library: The M-Pin C Client Library enables you to create your own M-Pin Client independent of the M-Pin JavaScript library for embedding into hardware or software applications.

sjcl - Stanford Javascript Crypto Library


The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes.

M-Pin-PHP-RP


M-Pin PHP Relying Party Library: This directory contains the source code and PHP language wrapper for M-Pin Relying Party (RP) for use in the M-Pin Strong Authentiation System.

Tcpcrypt - Encrypting the Internet


Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP.

CLR Security


The CLR security team codeplex site provides sample code and libraries of APIs to extend and debug the security APIs that ship with the .NET Framework. This codeplex site includes Security.Cryptography.dll which adds new cryptography algorithms to the .NET framework, as well ...

dieu-hoa-daikin


Bán ?i?u hòa treo t??ng Daikin inverter gas R410A, 12000 Btu, m?t chi?u, xu?t x? Thái Lan By admin – Posted on (Edit Post)Danh m?c: ?i?u hòa Daikin, ?i?u hòa Daikin Inverter Salesvn là ??n v? chuyên nghi?p trong l?nh v?c cung c?p và l?p ??t máy ?i?u hòa không khí hàng ??u th? gi?i t?i Vi?t Nam – ??c bi?t lo?i – FTKS35EVMA-RKS35EBVMA – ?i?u hòa Daikin treo t??ng Inverter gas R410A 9.000 Btu, hai chi?u, xu?t x? Thái lan ,?i?u hòa treo t??ng Daikin inverter công ngh? nh?t b?n. Giá bán 1

security-ass1 - Assignment 1 in Security course - Cryptography tools


Assignment 1 in Security course - Cryptography tools

conscrypt - Conscrypt is a Java Security Provider that implements parts of the Java Cryptography Extension and Java Secure Socket Extension


Conscrypt is a Java Security Provider (JSP) that implements parts of the Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE). It uses BoringSSL to provide cryptographical primitives and Transport Layer Security (TLS) for Java applications on Android and OpenJDK.The core SSL engine has borrowed liberally from the Netty project and their work on netty-tcnative, giving Conscrypt similar performance.

BouncyCastle - Lightweight Cryptography API for Java and CSharp


Bouncy Castle Crypto APIs is a lightweight cryptography API for Java and CSharp. It has provider for the Java Cryptography Extension and the Java Cryptography Architecture. It supports TLS, PKCS7, PKCS12, OpenPGP, S/MIME, OCSP, TSP, CMP, Extended Access Control, ASN and lot more.

connect_3g


This is a simple utility to enable Linux users to use 3G Internet from Bulgarian mobile operators with 3G USB modems without any configurations performed by the user. Currently tested on recent Ubuntu, Debian, Fedora and openSUSE distributions and following devices: HUAWEI E173 (Vivacom), Alcatel X220L (Vivacom), ZTE MF190 (Globul), ZTE K3565-Z (M-tel). connect_3g now supports PIN code security, though using it is not recommended.

tessel-pulse - Pulse your LEDs with tessel


Example-------```jsvar tessel = require('tessel');var mqtt = require('mqtt');var port = tessel.port['GPIO'];var pulse = require('tessel-pulse');var pin = port.pwm[0]; // G4var stop = pulse(pin, { type: 'pulse', // or 'blink' steps: 200, // the number of increments of the intesity of the led's light changeFrequency: 500 // ms after the step is incremented/decremented});setTimeout(stop, 10000); // blink for 10s```Example with MQTT-----------------First, install [MQTT.js](http://npm.im/mqtt) wit

flask-web.py-jvm


This is a demonstration of Flask and web.py with WTForms running on Jython and uses Apache Shiro, Java security framework that performs authentication, authorization, cryptography, and session management.

JSecurity


JSecurity is a powerful and flexible open-source Java security framework that cleanly handles authentication, authorization, enterprise session management, and cryptography services.

Off-the-Record Messaging Provides Private Conversations Over IM


Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing encryption, authentication, deniability, and perfect forward secrecy. If you lose control of your private keys, no previous conversation is compromised.