Network Products Guide: What are the main barriers for strong two-factor authentication to scale to the majority of Internet users and applications?
Stina Ehrensvard: Just like the 3-point seat belt did not scale to all cars until the design was so simple it could be managed with only one hand and within seconds, two-factor authentication needs to be managed within a minimum of time and effort for the user. Traditional authentication technologies have been costly to deploy, but this may not be the main barrier if the same identity and authentication token can be re-used across multiple devices and applications. To address this, the world needs a global open identity standard where the range of authentication technologies, on a competitive market, can be re-used across any number of services.
Network Products Guide: When will NFC (Near Field Communication) scale to the majority of smart phones and mobile devices and in what way can NFC be used for strong two-factor authentication?
Stina Ehrensvard: Based on conversations with the leading providers of NFC components, the majority of the leading smart phone and mobile device manufactures will include NFC in products released the coming year. An NFC enabled authentication token, such as a NFC smart card or YubiKey NEO, offers a great user experience, enabling users to access mobile application by simply letting the card or token touch the mobile device, optionally combined with entering a PIN or password.
Network Products Guide: How can a non-technical individual Internet user secure their online identity, including email, social media accounts, etc., in an easy and secure way?
Stina Ehrensvard: An easy and secure way for individuals to get in control of their online identity and Internet passwords is to use a password manager supporting two-factor authentication, such as Lastpass, PasswordSafe and Passpack. There are today millions of password manager users who have simplified and secured their Internet life by login in with a single password and single strong- authentication token.