Site Options:

Kadix

Keylogging Ontology

Reference

Reference topics provide quick access to information, and typically consist of a term and a description. These topics may contain proprietary information specific to MobileTrust

Scope: Endpoint Security, Desktop Computers, Mobile Devices

Term Description
App Drawer

The App Drawer, sometimes called the App Tray, is a collection of all the apps and widgets installed on a mobile device.

Bar Code

A Bar Code is a machine-readable code consisting of numbers and a pattern of parallel lines of varying widths. The code identifies the object or product it is printed on. Bar Codes can be interpreted by optical scanners called Bar Code readers, and other devices including printers and smartphones with interpretive software.

Related Reference:
QR Code

Data At Rest

Data At Rest refers to data in storage, in contrast to 'Data in Motion' which is data traversing a network or temporarily residing in computer memory to be read or updated.

Context: MobileTrust
Data At Rest is stored in an encrypted back-end database and is subject to infrequent change.

Data Origin Authentication

Data Origin Authentication verifies that the source of data received is as claimed.

Data Origin Authentication enables the recipient to verify that messages have not been changed in transit (Data Integrity) and that they originated from the anticipated sender (authenticity)

Related Reference:
Microsoft: Data Origin Authentication

Field

A Field is a place for a piece of informaton in a database or some other form of storage.

Firewall

A Firewall is software or hardware designed to block intruders and malware from access into computing devices via the Internet or network connections. It filters the data flow at various access points into computers and networks.

Home or Small Business Firewall:
A Firewall typically integrated into a personal computer operating system such as Windows. Software Firewalls can detect inbound/outbound traffic and protect against adware, spyware, and other forms of malware. In addition to software Firewalls, low cost NAT (Network Address Translation) routers can help filter unwanted access to your computer. By itself, a NAT router lacks the capability of a high end router found in a corporate setting.

Corporate Firewall:
A Firewall that may be a router, or software in a dedicated computer or server. It can be just a single router that filters out unwanted packets of information, or it may be a combination of routers and servers with each one performing a different aspect of firewall processing.

Related Reference:
Packet Filter

HTTPS

HTTPS (HyperText Transfer Protocol Secure) is a secure version of HTTP (HyperText Transfer Protocol). HTTPS allows secure transactions, including online banking. The URL begins with https:// instead of http://

Syntax
https://www.google.com/adsense/

Technical

HTTPS is HTTP with a Secure Socket Layer (SSL). A Secure Socket Layer is an encryption protocol. When a user connects to a HTTPS website, the session is encrypted with a Digital Certificate.

Related Reference:
URL

Hypervisor

A Hypervisor is a Virtual Machine Manager. It allows you to run multiple operating systems concurrently as 'Virtual Machines' on a single physical computer. Each Virtual Machine emulates a single computer.

An installed Hypervisor controls the physical computer's resources, and makes sure that guest operating systems or virtual machines do not interfere each other.

A Hypervisor on a server allows client computers to log into separate instances of the server that are customized and dedicated to each client.

Related Concept:
Hypervisor-Based Keylogger

Jailbroke Device

A Jailbroke Device has had Apple/IOS operating system restrictions removed.  Compare with Related Reference: Rooting Device.

Related Information:
Wikipedia: IOS Jailbreaking

Related Reference:
Rooted Device

Keyboard Driver

A Driver (also known as a Device Driver) is a program that allows a computer or mobile device to communicate with hardware or a device.

A Keyboard Driver controls the keyboard attached to a computer or integrated in a mobile device.

Technical

The MobileTrust Keyboard Driver passes keystrokes, in an encrypted format, directly to the browser via an Out-Of-Band Channel that bypasses the System Messaging Queue.

Related Reference:
Out-Of-Band Channel
System Message Queue

Key URI

A Key URI is an encryption key encoded in a URI.

Technical
Encryption keys may be encoded in URI ih the following format:
otpauth://TYPE/LABEL?PARAMETERS ≈ where TYPE is HOTP (HMAC-based One-time Password Algorithm) or TOTP (Time-based One-time Password Algorithm) and LABEL is a human readable label to help distinguish multiple OTP generators

Related Reference:
URI

Network Packet

A Network Packet is a unit of data that is formatted for transmission across a network or the internet.

Related Concepts:
Remote Access Keylogger
Sniffer Keylogger

OATH Authentication

OATH (Open Authentication) is a non-proprietary set of standards for Two-Factor authentication.

Wikipedia
"The Initiative for Open Authentication (OATH) is an industry-wide collaboration to develop an open reference architecture using open standards to promote the adoption of strong authentication."

OAUTH Authentication

OAuth Authentication is a server-to-server protocol for applications to authenticate each other. Three parties are typically involved: One authorization server, and two servers with their applications that need to communicate with one another.

One-Time Password (OTP)

A One-Time Password (OTP) is valid for only one login session or transaction. The purpose is to make it more difficult to gain unauthorized access to restricted resources, such as a bank account. An OTP is generated for use as a second authentication factor in Mobile Trust.

OpenID

OpenID is an open standard for Single Sign-On (SSO) authentication for affiliated but separate web sites. It does not rely on a central authority to authenticate user identity.

OpenID motto: "Make simple things simple and make complicated things possible."

OpenID Connect:
A simple identity layer on top of the OAuth 2.0 protocol (OAuth is an open standard for authorization. It is a complementary service to, and is distinct from OpenID. OAuth is also distinct from OATH which is an open standard for authentication.) Connect allows computing clients to verify the identity of an end-user based on the authentication performed by an authorization server, as well as to obtain basic profile information about the end-user.

Out-Of-Band Channel

An Out-Of-Band Channel is a channel of communication that is separate from the main communication channel.

Example:
Mobile Trust uses a patented method to encrypt keystrokes. It sends them to the browser via an Out-of-Band Channel that bypasses the System Messaging Queue.

Related Concept:
Out-Of-Band Authentication (OOBA)

Packet Filter Technical

A Packet Filter is a network layer firewall that operates at a low level to prevent packets of data from passing through the firewall unless they match an established set of rules.

The network layer is defined in the TCP/IP protocol suite (the communication language or set of protocols for the Internet).

Password Vault A Password Vault allows you to securely store and manage passwords for websites, networks, and cloud services.

Context: MobileTrust
The Password Vault stores login credentials in an encrypted database.

ProtectID Authentication

ProtectID Authentication is a Two-Factor Authentication system by Strikeforce Technologies.

ProtectID is based the OATH (Open Authentication) architecture. Multiple authentication mechanisms are supported, including biometrics and cell phone authentication.

PIN

A PIN (Personal Identification Number) is required for ProtectID authentication in MobileTrust.

QR Code

A QR (Quick Response) Code is a type of Bar Code. Bar Codes are one dimensional whereas QR Codes are two dimensional. QR Codes can hold a lot more data than Bar Codes.

QR Codes are one of three options for entering an OATH authentication factor in MobileTrust.

Figure A. QR Code compared to Bar Code

Related Reference:
Bar Code

Rooted Device

A Rooted Device provides the user with 'root access' of various Google/Android operating system - subsystems.  Compare with Related Reference: Jailbroke Device.

Technical

Since Android is based on the Linux kernel, rooting Android gives similar access to administrative (superuser) permissions in Linux.

Related Reference: Jailbroke Device

Rootkit

A Rootkit is unauthorized software, usually malware, that is designed to gain hidden, administrative access to computers and mobile devices. A Rootkit may allow other malware to gain access to operating system level functions and events (actions including keystrokes).

Some forms of malware including certain keyloggers require a Rootkit for installation.

Wikipedia
"The term rootkit is a concatenation of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware."

SAML

SAML (Security Assertion Markup Language) is a Single Sign-on protocol that completely eliminates the need for passwords. SAML allows the user to log on once for affiliated but separate web sites. It relies on Centralized Identity Management.

Related Concept: Single Sign-On (SSO)

Related Reference: openID

Security Token

A Security Token, sometimes called an Authentication Token or just a Token, usually refers to hard token authentication. Eg. Smart Card or Key Fob. Security Tokens are implemented as second factors in Two-Factor Authentication. See the related concept, Token-Based Authentication. for more information.

By definition, Security Tokens include soft tokens. Eg. One-Time Passwords (OTP) in Mobile Trust.

Security Token Service (STS):
An STS is a web service responsible for issuing security tokens, especially software tokens enabling the use of Single Sign-on (SSO) in distributed (heterogeneous company or multi-company) networks.

Related Concept:
Token-Based Authentication SSO

Related Reference:
One-Time Password (OTP)

System Message Queue

A System Message Queue is an operating system component used for Inter-Process Communication (IPC), or for inter-thread communication within the same process. Messages are placed onto a queue and stored until they are retrieved.

Technical
Keystrokes can be intercepted by a keylogger by hooking into the System Message Queue.

Related Concept:
Keylogger

Related Reference:
URI (Uniform Resource Identifier)

URI

A URI (Uniform Resource Identifier) is a string of characters used to identify a name of a resource.

Wikipedia
"One can classify URIs as locators (URLs), or as names (URNs), or as both. A Uniform Resource Name (URN) functions like a person’s name, while a Uniform Resource Locator (URL) resembles that person’s street address. In other words: the URN defines an item’s identity, while the URL provides a method for finding it."

Related Reference:
URL (Uniform Resource Locator)

URL

A URL (Uniform Resource Locator) A URL is a character string used to identify a reference to a web resource. In addition to identifying a web resource, it specifies the means of locating the resource. In most web browsers, the URL of a web page is displayed inside the address bar.

Syntax:
http://example.org/wiki/Main_Page ≈ web resource identified as /wiki/Main_Page represented as an HTML web page, and obtained from an internet host with domain name example.org.

Related Reference:
URI (Uniform Resource Identifier)

Related Information:
Keylogging Ontology
Problem & Solution
MobileTrust: FAQs