OTAC
OTAC
Technology

OTAC

A new paradigm for user authentication and device authentication

Based on the world’s first one-way dynamic authentication technology, one-time authentication code (OTAC) originally invented by swIDch provides more secure authentication by uni-directional dynamic token ONLY to overcome bi-directional limitations including high dependency on the push & pull system of network connectivity between clients and servers. By reinventing authentication, swIDch sets a new standard for authentication in cybersecurity beyond the limitations of existing authentication methods.

what face

What we face

A cyber-attack takes place somewhere around the world
once every 39 seconds. As a result, there were 8 billion pieces
of sensitive personal information being leaked to the market in 2019.
These all cost the global economy a staggering $2.9M
every minute in 2020. But WHY does this happen?
what face
Risk of static
information
Card numbers, ID, password, and PINs which we use every day are great examples of static information used as authentication credentials. Knowledge-based authentication – whether with PINs, passwords, passphrases – is not only a headache for users, it is also costly to maintain. As the world becomes more connected, using static information for authentication carries with it a huge vulnerability allowing cyber crimes such as identity theft, card-not-present fraud, and hijacking to take place.
ID/PW
- Static information
- Easily lost and stolen
Complex
authentication process
OTP, which is widely used for secure identity authentication, cannot perform user authentication alone, so an initial authentication step (usually ID and password) is required. Since you must go through more than one authentication step, the complexity feels even greater for users.
OTP
- On its own, it is not enough to identify a user.
- It always requires initial self-authentication between a user and a server.
Network
connection distress
In locations with poor network,
it is difficult to force the use of a communication network for authentication. The token method is used in numerous authentication environments and has become one of the most common ways of performing secure authentication by obtaining access rights through a specific point-in-time comparison of the authentication key generated by a token service operator (TSP). This is limited due to the reliance of connectivity between a user, a server and a TSP. It is also only operates in an environment controlled by a central server.
Token
- Requires network connection
- Bi-Directional

What we offer

swIDch’s OTAC technology combines advantages of the three most common authentication
systems – user ID/passwords, RSA hardware/software for generating authentication codes, and tokenisation.
This provides a solution that is more efficient and more effective than any of these elements individually.
It generates a single dynamic code that both identifies and authenticates the user at the same time and
can do so without a network connection. And because it’s a single-use, time-based code that’s unique to the user,
it can’t be used by someone else or used again.
Strong security
OTAC substantially increases security by generating dynamic authentication codes even in an off-the-network environment.
Seamless Integration
Use of API/SDK to bring simple and frictionless integration for IT admins.
Unlimited scalability
& flexibility
The lightness of OTAC enables applications in multiple industries and not limited to devices
Unbelievable
cost saving
No need to build heavy token infrastructure. Save costs associated with network traffic, maintenance, and fraud compensation.
offer
offer
offer
High risk of information breach with static information
Difficult to identify/authenticate the user with OTP alone
High dependency on push & pull system of network connectivity between clients and servers
offer
Duplication-free dynamic code authentication prevents from various breach risks
Identify and authenticate the user with dynamic codes alone
Dynamic code generation without network connectivity
[JPG] OTAC technology table v2

How it works

To access a system using OTAC, authorised users can use their mobile device. Also, other devices can be added for an extra layer of security such as an employee ID or bank card enabled with OTAC. By launching the swIDch app or the client’s own app integrated with OTAC, and then tapping the ID or bank card to the mobile device, users can generate a one-time alphanumeric or QR code.

In effect, the user’s device acts like a token server, generating a one-time code for access without the need to connect to networks. Identification and authorisation are then both enabled when users insert or scan their code into the system they want to access.

Welcome to
Remote Access
This service provides secure access to internal resources when you are working outside of the office.
Username
Password
Pin+Token
Login
Traditional company intranet access
Welcome to
Remote Access
This service provides secure access to internal resources when you are working outside of the office.
OTAC
Login
QR code
Company intranet using swIDch
Traditional company intranet access
Company intranet using swIDch

Patents
86 Registered,
262 Pending

Cover cover Cover Cover Cover Cover Cover

List of Awards

Cybersecurity Breakthrough Award 2022_swIDch
"Transaction Security Solutions of the Year" 2022 CyberSecurity Breakthrough Award
See More
22-SCA-LOGO-LIGHT-RGB_FINAL-MED
Best IoT/IIoT Security Solution 2022 SC Awards
See More
GBA-2022-Gold-PNG
2022 Gold Winner at 14th Annual 2022 Golden Bridge Business and Innovation Awards
See More
ITWA-2022-Gold-PNG
2022 Gold Winner at 17th Annual 2022 Information Technology World Awards IT World Awards
See More
GLOBEE-1
2022 Gold GLOBEE Winner "Startup of the Year" in Security Services
See More
CyberSecurity Breakthrough Award 2021 4MP
"Overall Fraud Prevention Solution Provider of the Year" CyberSecurity Breakthrough Awards 2021
See More
2021 Cybertech 100
2021 Cybertech 100
See More
2020 Cybertech category winner of EUROPAS 2020 Award
2020 Cybertech category winner of EUROPAS 2020 Award
See More
CyberSecurity Breakthrough Award 2020 (1)
“Authentication Solution of the Year” CyberSecurity Breakthrough Award 2020
See More
ckh2K9-at-DCWCd2iV3nF-cyber-award-1
2020 Cybertech 100
See More
2021 Cybertech 100
See More