keypascoロゴ
  • Home
  • Keypasco MFA
    • ソリューション
    • 作動原理
    • 機能と特色
    • 顧客のケース
    • Frost & Sullivan’s Introduction to Lydsec
  • ニュース
  • 当社について
    • 提携パートナー
    • 採用情報
    • 受賞
  • お問い合わせ
    • Global locations
  • Try our demo
  • Keypasco Taiwan Headquarters Celebrates Grand Opening with Successful Tea Party
  • メニュー

Tag Archives: RSA Conference

Money Guard Technologies and Keypasco creates cyber security in the GCC region

投稿日: 2017-02-132017-02-13

Keypasco has now teamed up with the Dubai based company Money Guard Technology to cover the GCC region. Together we can implement the Keypasco technology and enhance Internet security in the region. Internet security is not a national, but a global problem that needs to be solved. All over the world people are becoming more […]

Continue reading→

Keypasco MFA

  • Frost & SullivanによるLydsecの紹介
  • Keypasco Taiwan Headquarters Celebrates Grand Opening with Successful Tea Party
  • ソリューション
    • 顧客のケース
    • 機能と特色
    • 作動原理

ニュース

  • Keypasco Taiwan Headquarters Celebrates Grand Opening with Successful Tea Party
  • ニュース
    • メディア公告

当社について

  • 当社について
    • 受賞
    • 採用情報
    • 提携パートナー
  • Keypasco Taiwan Headquarters Celebrates Grand Opening with Successful Tea Party

お問い合わせ

  • お問い合わせ
  • global locations
  • Keypasco Taiwan Headquarters Celebrates Grand Opening with Successful Tea Party

ソーシャルメディア

Keypasco on Facebook Keypasco on Twitter Keypasco on LinkedIn
Copyright © LYDSEC 2010-2025 | All rights reserved
デバイス認証

 

We offer a “token” for end users without the administration, logistics and hardware cost by using the devices the end users already own!

デバイスが自身のセキュリティを保障する!

The secure token is the identified device a user already carry, examples could be a smartphone, tablet, browser or a desktop/laptop computer.

device-ring

×
Geographical locations

 

(geo-fencing)

 

Access is only allowed from locations that are approved, and the approved geographical location can be as large as a country or a continent, or just as small as a city.

We make sure that if a user moves from point A to B that they verify that it is indeed the true user who has moved.

globe-ring

×
デュアルチャネルアーキテクチャ

 

The Keypasco technology offers a strong authentication solution consisting of the Keypasco server (Borgen), one or several clients (Vakten), and a web channel.

  1. The first channel sends information between the end user’s device/browser and the Internet Content Provider.
  2. The second channel sends information between the end user’s device/Vakten client and the authentication server.

Then the verification of the end user´s attempt is done via the multi-factor levels of security. The Keypasco server verifies the device authentication, geographical location, micro proximity devices (optional), and the risk management.

2channel

×
ミクロ・アプローチ

 

The micro proximity feature adds an additional level of security by appointing a dedicated micro proximity device. If this micro proximity device is not in immediate proximity to the Vakten for Desktop client the user can’t login or sign any transactions.

For an example: if device 1 is used to login to an account then device 2 (which is the micro proximity device) has to be within centimetres of device 1 to be logged in.

micro-proximity-ring

×
リスク管理

 

Our risk management analysis feature provides a risk score for each attempt done by the end user. The risk score and it´s value is determent by indicators such as correct device, proximity of additional secure devices, Out Of Band verifications, geographical locations/geofencing, previous fraud and fraud trends etc.

This analysis is improved continuously and is an active part of the service to quickly mitigate new threats.

risk-engine2-ring

×
PKI Sign

 

The Keypasco PKI Sign feature is a dynamic feature that offers ICPs full support of PKI in a portable mobile device. The feature is based upon the core concepts:

  1. a end users credentials, only known by the correct user,
  2. a transaction can only be approved from the correct device,
  3. a transaction can only be approved from an approved location.

We can guarantee by utilizing the PKI Sign that the signature is done by the correct user. Keypasco has invented (and patented) a new innovative way of using a users mobile device as a secure soft carrier of private keys.

An end users private key is divided into three parts: a client part, a server part, and a secret (PIN). The private keys can only be put together and sign a transaction if the end user has all three parts. The correct user is the only one who knows the secret to achieve the client part, and the server part is only achieved when the correct device and location has identified itself.

The feature does not require a Trusted Platform or a Secure Element, and Keypasco can provide the generating of keys, and verify the signatures if no established PKI CA is provided by the Internet Content Provider through an optional plugin.

mobile-sign-ring

×
マクロ・アプローチ

 

Access is only allowed from locations that are approved, and a user need to have his or hers devices within a reasonable distance of each other.

If the devices are too far apart (example: the distance between point A and point B) it will result in a weak macro proximity score.

macroproximity-ring

×
GeoOTP

 

The Keypasco GeoOTP is a complementary mechanism for offline situations. This feature is suitable when a user is in a situation without network access.

The GeoOTP provides information about where the device is located and which device that is being used.

geo-otp-ring

×
現地署名

 

Keypasco offers Internet Content Providers a way to provide user a option to sign transactions via the Desktop Client. The Vakten for Desktop client presents a window with the transaction details and asks the user to approve or deny.

This signature option is presented on the same Desktop device that initiated the attempt, but all the information is secured by the デュアルチャネルアーキテクチャ.

desktop-sign-ring

×
Vakten™ スマートフォン

 

The Vakten client is installed on the end users smartphone device to identity the device and location. This Vakten has two functionalities:

  1. To send the device authentication and geographical location information to the Keypasco server Borgen,
  2. and to receive tasks to confirm attempts, which is usually payment signatures or Out of Band recovery.

Supported platforms: Android & iOS.

mobile-ring

×
Keypascoサーバー– Borgen™

 

The Keypasco server Borgen is self-scalable to handle any volume, and we offer a SLA on 99,999% uptime on the Cloud Server.

Borgen store the unique identifiers (made up by the device authentication, geographical location, micro proximity devices (optional), and the リスク管理.) in the anticipation that an Internet Content Provider and the Vakten software send in an authentication and/or sign attempt.

When an attempt is received, Borgen match the sets of identifiers sent through the different channels with the saved ones.

The Keypasco Server Borgen is offered to be hosted in both the Clouds and On-premise as a Server License.

borgen-ring

×
Vakten™ ブラウザ

 

The Keypasco product Browser Vakten is an easy and quickly deployable product tailored as an entry level product on it’s own, but comes to it’s full strength in combination with the Keypasco client Smartphone Vakten.

It doesn’t require any installation procedure on client devices; it is instead an integrated part of the web layer of the Internet Content Provider’s web site by an embedded JavaScript.

The Vakten client is installed in the end users browser to identity the device and location. This Vakten has one functionality:

  1. To send the device authentication and geographical location information to the Keypasco server Borgen

Supported platforms: Browsers (Internet Explorer, Chrome, Firefox, & Safari) on desktop (Windows, Mac OSX, & Linux) & smartphone (Android & iOS).

monitor-ring

×
Vakten™ デスクトップパソコン

 

The Vakten client is installed on the end users smartphone device to identity the device and location. This Vakten has two functionalities:

  1. To send the device authentication and geographical location information to the Keypasco server Borgen,
  2. and to receive tasks to confirm attempts, which is a local sign payment signatures.

Supported platforms: Windows, Mac OSX, & Linux.

laptop-ring

×
Mitigated Threats

 

Phishing: Keypasco mitigates phishing by linking the user with a geographical location and the device authentication. A user’s username and password will not work from a wrong device or location.

Man in the Middle & Man in the Browser: Man in the Middle (MitM) and Man in the Browser (MitB) attacks are mitigated by Keypasco’s 2-channel structure and the Out of band secure notifications.

Malicious Virus Control (Viruses, Trojans, etc): Viruses, Trojans, and other infections can control or replicate an end user’s device. Keypasco mitigates these threats by offering Out of Band authentication, which enables a user to regain control of devices and accounts.

Theft/Robbery: In addition to virtual threats, physical theft of a device can compromise a user’s security.
With Keypasco’s proximity feature, a user’s account is safe even if a device is stolen.

×
jaJapanese
en_USEnglish jaJapanese