.png)
.png)
OTAC
A dynamic, randomized, one-time authentication code...
generated on-demand, locally by the user...
without needing any network...
...that enables identification and authentication simultaneously in a single step.
Based on the world’s first one-way dynamic authentication technology, one-time authentication code (OTAC) originally invented by swIDch provides more secure authentication by uni-directional dynamic token ONLY to overcome bi-directional limitations including high dependency on the push & pull system of network connectivity between clients and servers. By reinventing authentication, swIDch sets a new standard for authentication in cybersecurity beyond the limitations of existing authentication methods.

What we face
once every 39 seconds. As a result, there were 8 billion pieces
of sensitive personal information being leaked to the market in 2019.
These all cost the global economy a staggering $2.9M
every minute in 2020. But WHY does this happen?

information
- Easily lost and stolen
authentication process
- It always requires initial self-authentication between a user and a server.
connection distress
it is difficult to force the use of a communication network for authentication. The token method is used in numerous authentication environments and has become one of the most common ways of performing secure authentication by obtaining access rights through a specific point-in-time comparison of the authentication key generated by a token service operator (TSP). This is limited due to the reliance of connectivity between a user, a server and a TSP. It is also only operates in an environment controlled by a central server.
- Bi-Directional
What we offer
systems – user ID/passwords, RSA hardware/software for generating authentication codes, and tokenisation.
This provides a solution that is more efficient and more effective than any of these elements individually.
It generates a single dynamic code that both identifies and authenticates the user at the same time and
can do so without a network connection. And because it’s a single-use, time-based code that’s unique to the user,
it can’t be used by someone else or used again.
& flexibility
cost saving




![[JPG] OTAC technology table v2 [JPG] OTAC technology table v2](https://www.swidch.com/hs-fs/hubfs/%5BJPG%5D%20OTAC%20technology%20table%20v2.jpg?width=973&height=650&name=%5BJPG%5D%20OTAC%20technology%20table%20v2.jpg)
How it works
To access a system using OTAC, authorised users can use their mobile device. Also, other devices can be added for an extra layer of security such as an employee ID or bank card enabled with OTAC. By launching the swIDch app or the client’s own app integrated with OTAC, and then tapping the ID or bank card to the mobile device, users can generate a one-time alphanumeric or QR code.
In effect, the user’s device acts like a token server, generating a one-time code for access without the need to connect to networks. Identification and authorisation are then both enabled when users insert or scan their code into the system they want to access.
Remote Access
Remote Access
Patents
104 Registered,
282 Pending







List of Awards
