What is OTP?

0TP(One-Time password)

OTP attempts to solve some of the problems users have when choosing strong passwords. Most 0TPs operate based on two-factor authentication principles. To authenticate to a system, you need a token card and your PIN personal identification number. The method of generating and synchronizing passwords varies from 0TP system to system. In one of the more popular OTP methods, the token card generates a login password within a time interval (usually 60S). This seemingly random string of numbers is actually closely tied to the mathematical algorithm running on the OTP server and token. A login password generated from the token might look like this: 4F40D974. The PIN is either used with an algorithm to generate a login password (which subsequently becomes an OTP) or with a login password.

Using a system that generates login passwords based on algorithms and PINs prevents individuals from repeatedly sniffing the network and obtaining the user’s PIN. OTP improves passwords in the following ways:

1. Users can no longer choose weak passwords
2. Users only need to remember the PIN instead of the traditional strong password.
3. Once the password is used once, the password sniffed on the line has become invalid. Of course, there is a reason why no large-scale password system uses 0TP. OTP also has some disadvantages:

  • Users need to have a token card for authentication
  • OTP requires an additional server to accept requests from the authentication server relay
  • Using OTP to enter a password takes more time than entering a password that the user needs to remember.
  • OTP is expensive in large networks

When considering the overall OTP rating, it’s clearly a valuable technology that just can’t be used everywhere. Most organizations choose to use 0TP for critical systems in their security strategy, or where password cracking attempts are high. For a typical organization, this would be financial and human resources systems, but it could also be remote systems such as dial-up or virtual private networks.

One-time programmable

OTP (One Time Programable) As embedded applications become more and more widespread, product security becomes more and more important. On the one hand, it is to protect the hardware design, and on the other hand, it is also for the safety of the product itself to prevent it from being HACKED. In embedded systems, all codes and system data are stored inside the FLASH chip. The characteristic of FLASH chip is that it can be erased and written multiple times, and the data will not be lost when power is turned off. In order to protect the data in FLASH, more and more FLASH manufacturers provide a special register inside FLASH: the OTP register. OTP=ONE TIVE PROGRAMMABLE, which means that this register can only be programmed once, and it can no longer be modified after programming. The 0TP register is very similar to the FLASH data area. 1 can be rewritten as 0, but 0 can never be written as 1. If there is a 32-bit OTP register, the value produced is OxFFEEEFFE. If the user writes the value of the OTP register through programming After it is OxFFFFFFFE, the OTP register can no longer be rewritten to OxFFFEFFFF; of course, the value of this OTP register can also be rewritten to 0xFFFFFFFD or others. . In order to provide protection for the 0TP register, this type of FLASH chip generally also provides a LOCK register. The LOCK register is also ONE TIMEPROGRAIMABLE. Each bit of the LOCK register corresponds to an OTP register. If the bit (BIT) of the LOCK register corresponding to the OTP register is written from 1 to 0, it means that the locked OTP register cannot be written anymore. Even if the current value of OTP is OXFFEEEEEE, its value can never be overwritten. Through the OTP register and LOCK register, users can save some specific information in 0TP, such as software version number, hardware version number, secret key and other information. At the same time, there will be another OTP register inside this type of FLASH chip. This register has been programmed by the manufacturer when it is produced, written with a specific serial number, and locked. If necessary, FLASH manufacturers can also write specific serial numbers according to customer needs. In this way, each chip will have a different ID number to avoid being copied. In addition to FLASH chips, many CPU manufacturers also provide similar OTP registers inside the CPU for users to use, which is conducive to the development of safer applications. Like some larger manufacturers, such as TI, FREESCALE, etc., they often do not disclose the data sheets of certain chips. If you want to obtain their data sheets, you must place a large order and sign a certain confidentiality agreement. 0TP itself does not provide absolutely secure applications. However, the provision of OTP helps developers develop and deploy more secure applications and protect their own and customers’ interests. Many large manufacturers, such as NOKIA, MOTOROAL, SANSUNG and SONYERRICSON, etc., need to develop some mobile phones that can only be used in their own networks according to the requirements of customers (operators). Many software and hardware protections are based on OTP.

OTP Token Types

There are various credentials for generating strong identity authentication one-time passwords (OTP). For example, Verisign provides security cards and security tokens through Tianwei Integrity in China.
There are various token methods such as machine access method and SMS access method. OPT stands for open Telecom Platform (Open Telecom Platform). However, this is really a bad name that leads to romantic misunderstanding. In fact, it is much more universal than the name sounds. It is an application operating system that also includes a large number of libraries and programs for building large-scale distributed fault-tolerant systems. OTP was originally developed by Ericsson in Sweden. Its design goal is to construct fault-tolerant systems.
OTP contains many powerful tools, such as a complete web server, FTP server, CORBA ORB, etc., all of which are written in Erlang. OTP also contains advanced tools needed to build telecom applications, such as implementations of H248, SNMP, and an ASN.1 to Erlang cross-compiler. When writing programs using OTP, the core concept is behavior in OTP. A behavior encapsulates a certain common behavior pattern. You can also understand these behaviors as
An application framework that can be customized by destroying modules. The power of OTP is that it relies on behavior to introduce many important features such as fault tolerance, expansion, and dynamic code upgrades. In other words, on the basis of behavior, programmers no longer need to consider matters such as fault tolerance. Behavior has already helped you to ensure these problems, so you can feel free to write callback modules. Taking the īava world as a comparison, it behaves like a J2EE container.

Get an Online Quote Today

Your Trusted Partner for PCB Fabrication, Component Sourcing & PCB Assembly