adsense

Monday, January 23, 2012

ArrayShield Card - One more weapon from India for Online Security



Today morning while reading 'The Hindu' @ Safe, read about ArrayShield product, Arrayshield Card.

More about this card can be read at the company's website How it works?
In the last couple of months, my focus has been on solutions for safe online banking technologies.

ArrayShield Card has made a beginning in the new direction for 2FA (2 Factor Authentication).
The ArrayShield Card does not rely on Mobiles or RSA tokens, but on a proprietary ArrayShield translucent Card.

The Process in brief is as under :
      1. Users choose a memorable pattern (sequence of cells on the array) as their secret and register the same.
      2. The User on logging into a ArrayShield enabled protected site, have to overlap the Arraycard, which will display the specific values.
      3. The specific values are an OTP (One-time password) which have to be entered on the login page.
      4. Every time they log on, they are presented with a challenge Array of random characters, which will be displayed on their computer screen.


ArrayShield Card has been launched very recently and as the usage spreads by word of mouth, more and more websites would be interested in it.

As more and more products are introduced for Safe eBanking, the number of converts from physical banking to eBanking will increase, benefiting the Banks as well as the bank's customers.


Sunday, January 22, 2012

Public Holidays in Indian States during the year 2012 - Section 25 of the Negotiable Instruments Act, 1881



LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Andhra Pradesh

LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Assam

LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Bihar


LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Chandigarh

LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Chattisgarh

LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in DADRA & NAGAR HAVELI
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Goa
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Guajrat
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Haryana.
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Jharkand
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in Karntaka
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in KERALA
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in MADHYA PRADESH
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in NEW DELHI

LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in ORISSA
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in PUNJAB
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in PUDUCHERRY
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in RAJASTHAN
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in TAMILNADU
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in UTHARAKHAND
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in UTTAR PRADESH
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in WEST BENGAL
LIST OF Bank HOLIDAYS UNDER NEGOTIABLE INSTRUMENTS ACT, 1881 FOR THE YEAR 2012 in JAMMU & KASHMIR
















'SafeNet eToken 3500' – New Tool to combat Online Banking fraud. Which Bank will introduce this in India?




Indian bank customers especially internet banking customers are being made aware of the need for efficient security practices.

As the number of internet banking users is on the use, the threats t internet banking too is in on the increase.
It is a cat and mouse game between Indian Banks and the internet fraudsters in the cyberworld.

The most common terms in internet security is the MITM(Man-in the Middle) or MITB (Man in the Browser) scenario.

Safenet, the 'Data Protection Company', as it's punchline, announced the launch of a Comprehensive Solution for Addressing all Risk Levels in Online Banking.
The Solution is 'SafeNet eToken 3500'.

The main differentiator between 'SafeNet eToken 3500'  and its competitors is the ability of eToken 3500 to read transaction data from the web browser and than generates a unique electronic signature that is used to validate the transaction.
Yes,  'SafeNet eToken 3500' , reads the transaction data from the web browser. Well, check out the demo @ Demo



The following are the steps to secure the financial transaction by 'SafeNet eToken 3500'
  1. User logs into the Bank's internet banking site by signing with his/her login id and OTP(One time Password) generated by  'SafeNet eToken 3500' .
  2. User inputs the Sum of amount tobe transferred along with the Account number.
  3. The  'SafeNet eToken 3500'  is to be held to the computer screen and 'SafeNet eToken 3500', reads the amount and the account number.
  4. Basing on the same, an Electronic Signature is generated by 'SafeNet eToken 3500'.
  5. The Electronic Signature I.e an number is keyed into the Banks internet banking site.
  6. If the details tally, the transaction is approved.

The  'SafeNet eToken 3500'  adds an additional security layer to the transaction. The advantage of logging into the banks website with  'SafeNet eToken 3500' , OTP is that the user need not remember his/her password. This frees the banks from investing in Password generation, storing etc job and also ensures that the log-in is safe 100% every time.

Hm, not sure, when this will be introduced in India?


What is (Man in the Middle attack) MITM scenario? 
(Man in the Middle attack) MITM is an attack in the cyberworld, which involves intercepting a communication between two systems.
The motive is to intercept the exchanged data and inject false data. The false data in internet banking can be a change in the intended beneficiary or the amount of the respective transaction.

The man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other.

How did the (Man in the Middle attack) MITM gets its name?
The attack gets its name from the ball game where two people try to throw a ball directly to each other while one person in between them attempts to catch it. In a man in the middle attack, the intruder uses a program that appears to be the server to the client and appears to be the client to the server.

What are the various techniques to thwart (Man in the Middle attack) MITM?
Popular protection techniques against MITM attacks use authentication tools that are based on:
Public key infrastructures : -
such as:

  1. Secret keys (which are usually high information entropy secrets, and thus more secure), or
  1. Passwords (which are usually low information entropy secrets, and thus less secure)
  1. Latency examination, such as with long Cryptographic hash function calculations that lead into tens of seconds; if both parties take 20 seconds normally, and the calculation takes 60 seconds to reach each party, this can indicate a third party
  1. Second (secure) channel verification
  1. One-time pads are immune to MITM attacks, assuming the security and trust of the one-time pad.
  1. Carry-forward verification

What is (Man in the Browser) MITB  scenario?
In (Man in the Middle attack) MITB, a trojan infects the web browser, and has the ability to modify pages, modify transaction content or insert additional transactions, all in a completely covert fashion invisible to both the user and host application.

Security mechanisms such as SSL/PKI and/or Two or Three Factor Authentication solutions, will not thwart (Man in the Middle attack)  MITB attacks.

The only way to repulse a (Man in the Middle attack)  MitB attack is by utilising transaction verification.
As the (Man in the Middle attack) MitB Trojan works by utilising common facilities provided to enhance Browser capabilities such as Browser helper Objects, Extensions and User scripts etc., it is therefore virtually undetectable to virus scanning software.

In an example exchange between user and host, e.g. an Internet banking transaction such as a funds transfer, the customer will always be shown, via confirmation screens, the exact payment information as keyed into the browser. The bank, however, will receive a transaction with materially altered instructions, i.e. a different destination account number and possibly amount. T

Authentication, by definition, is concerned with the validation of identity credentials. This should not be confused with transaction verification. Transaction Verification has to be done by an Out of Band (OOB) mechanism to counter (Man in the Middle attack) MITB attacks.


Thursday, January 19, 2012

National Financial Switch(NFS) gets a new member - The A P Mahesh Co-operative Urban Bank Ltd., Hyderabad.




The A P Mahesh Co-operative Urban Bank Ltd., popularly known as 'Mahesh Bank', has joined NPCI’s National Financial Switch (NFS) network on 30 th December 2011.

The bank has a network of 36 branches, 28 in the twin cities of Hyderabad and Secunderabad and one each at Khammam, Vijayawada, Guntur, Rajahmundry, Visakhapatnam, Warangal in Andhra Pradesh., Jaipur in Rajasthan and Mumbai in Maharashtra.

Mahesh Bank's customers can now access their bank accounts through 86,000+ ATMs of 63 other banks which are already in the NFS network.

Mahesh Bank commenced operations in 1977, and its customers base is basically traders. Towards this end, it has also opened branches in Jaipur and Mumbai, both major trading centres.


Mahesh Bank started its life as Primary Co-operative Society on 30th June, 1977.
In 1996, the Bank was accorded SCHEDULED STATUS by Reserve Bank of India from 26th October, 1996 - the first Co-operative Bank to be accorded this status in the entire South India.

In 2001, the Bank got itself registered as a Multi-State Co-operative Bank under the Multi-State Co-operative Societies Act, 1984 with effect from 30.05.2001 - again the first Co-operative Bank in South India.

As Mahesh Bank is on an expansion spree, with RBI permitting the bank to extend its area of operation to the entire States of Maharashtra, Rajasthan and Gujarat, the NFS route will enable it to attract more customers into its fold.

Tuesday, January 17, 2012

Delhi Metro to Provide Smart Card Recharge Facility at AFC Gates



As the usage of Contactless Smart Cards by Delhi Metro Commuters is on the rise, Delhi Metro is looking at innovative ways to smoothen the recharge process.

Towards this, Delhi Metro is procuring the latest AFC (Automatic Fare Collection) gates, which will have the capacity of automatic top up of smart cards through the bank accounts of card holders (electronic clearance system (ECS).


As per the proposed process flow, for customers availing this facility, when the balance of a smart card goes down to the pre defined value or the minimum amount, the specific AFC gates will add pre defined amount into the card automatically.

Later on, the deducted amount will be collected from the card holder’s bank account by the Metro fare collection system. I am not sure, what will happen if there is no balance in the card holder's bank account at the time of debit.
In addition to this, DMRC is also developing a new technology through which Delhi Metro commuters will be able to recharge their smart cards through various options such as net banking, credit cards, debit cards. DMRC is also procuring Add Value Machines for recharging the smart cards at the stations through net banking, credit cards, debit cards.

'Add Value Machines', can be said to reverse ATM's, which accept Cash and credit the equivalent value to DMRC Contactless Cards.

Like all good things in life, these new features are not instantly available, but will be 'live', within this calendar year I.e 2012.
Currently, tokens and smart cards can be purchased or recharged only by paying cash at the specified counters, machines or customer care centers at Metro stations.

The Smart cards are very popular in Delhi Metro as DMRC is providing 10% discount on fares on use of the smart cards and many stations have dedicated exit gates only for card users.

LinkWithin

Related Posts with Thumbnails

Disclaimer

The thoughts in this BLOG are personal, and reflect only my view on the subject.
This are not the views of my Employers.
All images, logos rights rest with the Original TitleHolders

All efforts have been made to make this information as accurate as possible, N Prashant will not be responsible for any loss to any person caused by inaccuracy in the information available on this Website. Relevent Official Gazettes Communications may be consulted for an accurate information. Any discrepancy found may be brought to the notice of N Prashant