Based on the world’s first one-way dynamic authentication technology, one-time authentication code (OTAC) originally invented by swIDch provides more secure authentication by uni-directional dynamic token ONLY to overcome bi-directional limitations including high dependency on push & pull system of network connectivity between clients and servers. By reinventing authentication, swIDch sets a new standard for authentication in cybersecurity beyond the limitations of existing authentication methods.
What we face
once every 39 seconds. As a result, there were 8 billion pieces
of sensitive personal information being leaked to the market in 2019.
These all cost the global economy a staggering $2.9M
every minute in 2020. But WHY does this happen?
it is a big headache to force the use of a communication network for authentication. The token method is used in numerous authentication environments and has become one of the most common ways of performing secure authentication by obtaining access rights through a specific point-in-time comparison of the authentication key generated by a token service operator (TSP). This is limited due to the reliance of connectivity between a user, a server and a TSP. It is also only operates in an environment controlled by a central server.
What we offer
systems – user ID/passwords, RSA hardware/software for generating authentication codes, and tokenisation.
This provides a solution that is more efficient and more effective than any of these elements individually.
It generates a single dynamic code that both identifies and authenticates the user at the same time and
can do so without a network connection. And because it’s a single-use, time-based code that’s unique to the user,
it can’t be used by someone else or used again.
How it works
To access a system using OTAC, authorised users can use their mobile device. Also, other devices can be added for an extra layer of security such as an employee ID or bank card enabled with OTAC. By launching the swIDch app or the client’s own app integrated with OTAC, and then tapping the ID or bank card to the mobile device, users can generate a one-time alphanumeric or QR code.
In effect, the user’s device acts like a token server, generating a one-time code for access without the need to connect to networks. Identification and authorisation are then both enabled when users insert or scan their code into the system they want to access.
Where to use
OTAC technology can generate dynamic virtual card details without a network
connection, thereby adding an extra layer of security to the payment process.
This patented technology is a CNP (card not present) fraud prevention solution that replaces
static card information with dynamic details, which gives users full control
over their security and finance.
Current digital key solutions require network connectivity when it comes to car sharing to
receive and activate the key. There can be an issue when the vehicle is located
in a basement or rural area where network connectivity is weak.
OTAC allows drivers to access a vehicle in a networkless environment.
No matter where the driver or car is located, there are no obstacles for drivers activating the
digital key and sharing it with an authorized person.
authenticate your user/object with the dynamic code. Enable your users to locally generate
OTAC and deliver it over various channels such as voice, keypad, Bluetooth, etc.
Algorithm size under 4KB fits into any device chips for enhanced security.
end-to-end trust. However, authentication flows can be cumbersome and involve many
round-trips, with an irreducible time cost for each; authorisation services can become
overwhelmed as each microservice relies on them for access control.
OTAC allows secure authentication of a user in a single ended flow,
greatly reducing the number of round trips.
Forget passwords and OTPs. Users can securely access services by generating OTAC
even in an off-the-network environment. With OTAC, access your company applications
anywhere and anytime. As long as OTAC guarantees hassle free log-in, remote
working is no longer a problem.
In the middle of a battle in a war, it is very difficult to identify your friendlies or targets.
Current solution to the problem is to identify friendlies from their devices
using static information, which can be hacked and used by the enemy.
OTAC can completely eliminate this risk by generating dynamic codes locally
without a network. Wherever a soldier is located, their device will send a dynamic
code which hackers cannot steal so that their own force can identify securely.