Upload
akhil-agrawal
View
163
Download
1
Embed Size (px)
Citation preview
Two-Factor Authentication
- Akhil Agrawal
Purdue University
Why is it required?
• Legacy Authentication & Authorization alone are not enough
• Passwords alone are not enough
• No way to verify the end user is our real subscriber
• No way to verify the end user is bound to his/her account services
How does it work?
• During any service/application activation, a random code (Passcode) will be provided
• Subscriber should call from home line and provide Passcode
• Subscriber account, home line Passcode will be verified
• Service/Application will be activated
What applications will use it?
•Any application on voice platform
•Phone2Go will be able to use it immediately
Different Approaches
• Place a call to Subscriber’s home phone, collect the Passcode & Verify
• Subscriber will place a call to a dedicated line from home phone, collect the Passcode & Verify
• Ask Subscriber to place a call to dedicated line from home phone with in short duration
Technologies Used
• Java
• MySQL
• Dialogic
Architecture
Implementation - Overview
Database – Physical ModelColumn Name Data Type Default Value Description
ID UNSIGNED
BIG INT
NOT NULL
PRIMARY KEY
AUTO INCREMENT
Primary Key.
TN INT NULL User's Landline TN.
ApplicationId VARCHAR(25) NULL Name of the Application.
ActivationKey VARCHAR(25) NULL Special parameters required by
respective external client.
MacAddress VARCHAR(25) NULL Mac Address of device.
Token INT NULL 6 digit code generated for 2FA.
DateAndTime DATETIME NOT NULL
Default now()
Date and Time when the code was
created.
2FAStatus VARCHAR(10) NULL Shows the status of the 2 Factor
Authentication.
Will accept only init and success as
values.
REST Module - Layered Architecture
REST Module Sequence Diagram
SIP Module - Layered Architecture
Use Cases
• User making the call and entering the correct code with no errors.
• User making the call without initiating the 2 Factor Authentication Request.
• User making the call after the set time limit.
• User entering the incorrect code.
SIP Module Sequence Design
No Initiated 2FA Request
User Called After Time Limit
User Entered Incorrect Auth Code
Mentors
• Mr. Naresh Dhiman – Architect and Design of the solution.
• Mr. Thirumal Ramachandruni, Mr. Umashankar Somasundaram – Java development.
• Mr. Mathivanan Manickam – Integration with Media Server.
Conclusion
• Completing this project for my internship has been a learning and enjoyable experience.
• I really hope my project helps add a layer of security to the existing and upcoming voice applications.