.png)
.png)
Technology
OTAC
A new paradigm for user authentication and device authentication
A dynamic, randomized, one-time authentication code...
generated on-demand, locally by the user...
without needing any network...
...that enables identification and authentication simultaneously in a single step.
Based on the world’s first one-way dynamic authentication technology, one-time authentication code (OTAC) originally invented by swIDch provides more secure authentication by uni-directional dynamic token ONLY to overcome bi-directional limitations including high dependency on the push & pull system of network connectivity between clients and servers. By reinventing authentication, swIDch sets a new standard for authentication in cybersecurity beyond the limitations of existing authentication methods.

What we face
A cyber-attack takes place somewhere around the world
once every 39 seconds. As a result, there were 8 billion pieces
of sensitive personal information being leaked to the market in 2019.
These all cost the global economy a staggering $2.9M
every minute in 2020. But WHY does this happen?
once every 39 seconds. As a result, there were 8 billion pieces
of sensitive personal information being leaked to the market in 2019.
These all cost the global economy a staggering $2.9M
every minute in 2020. But WHY does this happen?

Risk of static
information
information
Card numbers, ID, password, and PINs which we use every day are great examples of static information used as authentication credentials. Knowledge-based authentication – whether with PINs, passwords, passphrases – is not only a headache for users, it is also costly to maintain. As the world becomes more connected, using static information for authentication carries with it a huge vulnerability allowing cyber crimes such as identity theft, card-not-present fraud, and hijacking to take place.
ID/PW
- Static information
- Easily lost and stolen
- Easily lost and stolen
Complex
authentication process
authentication process
OTP, which is widely used for secure identity authentication, cannot perform user authentication alone, so an initial authentication step (usually ID and password) is required. Since you must go through more than one authentication step, the complexity feels even greater for users.
OTP
- On its own, it is not enough to identify a user.
- It always requires initial self-authentication between a user and a server.
- It always requires initial self-authentication between a user and a server.
Network
connection distress
connection distress
In locations with poor network,
it is difficult to force the use of a communication network for authentication. The token method is used in numerous authentication environments and has become one of the most common ways of performing secure authentication by obtaining access rights through a specific point-in-time comparison of the authentication key generated by a token service operator (TSP). This is limited due to the reliance of connectivity between a user, a server and a TSP. It is also only operates in an environment controlled by a central server.
it is difficult to force the use of a communication network for authentication. The token method is used in numerous authentication environments and has become one of the most common ways of performing secure authentication by obtaining access rights through a specific point-in-time comparison of the authentication key generated by a token service operator (TSP). This is limited due to the reliance of connectivity between a user, a server and a TSP. It is also only operates in an environment controlled by a central server.
Token
- Requires network connection
- Bi-Directional
- Bi-Directional
What we offer
swIDch’s OTAC technology combines advantages of the three most common authentication systems – user ID/passwords, RSA hardware/software for generating authentication codes, and tokenisation. This provides a solution that is more efficient and more effective than any of these elements individually. It generates a single dynamic code that both identifies and authenticates the user at the same time and can do so without a network connection. And because it’s a single-use, time-based code that’s unique to the user, it can’t be used by someone else or used again.
Strong security
OTAC substantially increases security by generating dynamic authentication codes even in an off-the-network environment.
Seamless Integration
Use of API/SDK to bring simple and frictionless integration for IT admins.
Unlimited scalability
& flexibility
& flexibility
The lightness of OTAC enables applications in multiple industries and not limited to devices
Unbelievable
cost saving
cost saving
No need to build heavy token infrastructure. Save costs associated with network traffic, maintenance, and fraud compensation.



High risk of information breach with static information
Difficult to identify/authenticate the user with OTP alone
High dependency on push & pull system of network connectivity between clients and servers

Duplication-free dynamic code authentication prevents from various breach risks
Identify and authenticate the user with dynamic codes alone
Dynamic code generation without network connectivity
![[JPG] OTAC technology table v2 [JPG] OTAC technology table v2](https://www.swidch.com/hs-fs/hubfs/%5BJPG%5D%20OTAC%20technology%20table%20v2.jpg?width=750&height=501&name=%5BJPG%5D%20OTAC%20technology%20table%20v2.jpg)
How it works
Build customisable, flexible solutions depending on your industry and use case. The generation of the code can happen locally on the device or even on the IC chip across a range of cards and applications. The format is then configurable to each clients needs, along with the transfer and verification. This flexibility combined with configurable time intervals provides a highly flexible and super secure authentication solution across a wide range of industries, and unique to every clients needs and requirements.
International CC Certification for OTAC
Our OTAC technology has obtained the global CC standard for its strong security, stability and reliability.
Patents
121 Registered,
301 Pending







List of Awards

"Overall Fraud Prevention Solution Provider of the Year" CyberSecurity Breakthrough Awards 2021
See More
Download our OTAC brochure
Click here to download our 4-page OTAC brochure Get In touchRelated Topics
IAM Revolution
Find out how swIDch's pioneering OTAC technology can upgrade, replace and revolutionise authentication systems across various industries. Discover the history being OTAC, how it was envisaged and how against all odds, it came into being.
Read More
swIDch selected for UK Smart Grant to develop revolutionary payment technology
swIDch has been selected for the UK Government’s Smart Grant to develop the "swIDch SmartCard", a secure fingerprint payment card embedded with a nano-optoelectrical fingerprint sensor.
Read More
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
The assumption that hackers take control of the internet of things (IoT) and cause serious problems to our society is an agenda repeatedly raised by many futurists and security experts.
Read More
Smart factory vulnerabilities: operational aspects are not the only thing at risk
IoT provides opportunity for businesses to improve process, increase efficiency and thus productivity. Often times, this is as a result of a better end user experience, which for businesses can also be employees.
Read More