How it Works

The secret behind the solution

There are many well-proven authentication solutions in the market. But the absolute majority of services are still using static passwords for login, followed by repeated frauds and scandals.

So why continue on a dead end street? To make our connected world safe, it is about time to step up and do things in a different way.

With features like DeviceID, location, and a unique Risk Engine, the Keypasco Solution can raise the level of security for you and your customers. The groundbreaking technology even offers you a way to secure ALL of your customers without affecting the user experience – let us tell you how it works!


The Keypasco Solution

How it works

The solution consists of:

● The Keypasco server
● One or several devices
● A two-channel structure
● The Risk Engine

1. The DeviceID properties on the end-user’s device are scanned and stored at the Keypasco server. Any personal device may form part of the digital identity

2. The first channel sends information between the end-user’s device and the service provider

3. The second channel sends information between the end-user’s device and the Keypasco server

4. To verify the authentication the service provider checks with the Keypasco server to confirm:

● Device authentication
● Geographical location
● Proximity
● Risk Engine analysis

5. Then, it is decided whether the authentication is successful or not

Keypasco 2-channel structure

Our patented features

DeviceID and two-channel authentication: Bring the user’s own device as unique authentication device through a two-channel structure. Security by Your own device!

Proximity: The user’s own devices / wearables in close position to each other as unique identity to enhance security.

● Keypasco PKI Sign: A unique solution for PKI in a mobile device without the need for a Secure Element. By using Keypasco PKI Sign no private key is stored at any one place, but it is still PKI compliant, making the solution extremely safe.

Dynamic URL: This allows for single sign-on with one single trusted security app linking multiple Internet content providers on one side and multiple ID providers on the other.

 

Security by Keypasco

Keypasco mitigates threats 

Phishing – by linking the users DeviceID with its geographical location, your username and password only works on your devices in the right locations.

Man in the Middle (MitM) and Man in the Browser (MitB) attacks – by Keypasco’s two-channel structure and Out of band secure notifications.

Malicious Virus Control (Viruses, Trojans, etc.) – with an Out of Band secure notifications we can stop them from taking control or replicate an end user’s device.

Theft/Robbery of a device can compromise a user’s security. With the Keypasco proximity feature, a user’s account is safe even if a device is stolen.


Desktop client 

The client is installed on the end-users desktop computer for identification of the device and location. The desktop client also provides the functionality of secure verifications and signatures. The desktop client can be used to secure web solutions as well as desktop applications.

Smartphone & tablet client 

Our SDK is integrated in the ICP’s app to identify the device and its location, and can confirm secure verifications and signatures through the Out-of-Band verification channel. One of the signature options is the Keypasco PKI Sign, which has no need of a secure element.

Browser client 

With the Browser client, the Keypasco solution can verify the device and location. The unique risk engine is working in the background.

 

The Keypasco server 

Keypasco authenticates the end-user by identifying and associating their device(s) and location(s) to an anonymous user-ID within the Keypasco server. No personal data is ever stored in either the client or on the server! The server is located in the Cloud and self-scalable to handle any volume.


Combine our solutions for mobile, desktop and browser to meet your unique security needs

Whatever combination, you get a solution with an intuitive user experience that mitigates all present online threats and is easy to integrate and easy for mass roll-out for a fraction of the cost of traditional solutions.

Mobile & Desktop

When you want to provide your customers with secure authentication without having to provide the end users with hardware tokens. It is also suitable if you have, or plan to have, a company App.

  • PKI Sign available

Mobile & Browser

When you want secure authentication. Want to secure the browser and have, or plan to have, a company App.

  • PKI Sign available
  • No installed client on the Desktop

Mobile Stand-alone

When you want to offer your end users secure authentication and have, or plan to have, a company App.

  • PKI Sign available
  • The Keypasco solution can be completely hidden as a library in your own App

Desktop Stand-alone

When you want to offer multi-factor secure authentication without having to provide the end users with hardware tokens.

  • Utilize your end users device as a secure token instead of spending money on a hardware token and distribution

Browser Stand-alone

When you want to offer secure authentication without having to ask your end users to install a client.

  • Utilize your end users device as a secure token instead of spending money on a hardware token and distribution
  • No installed client on the Desktop required

The core of the Keypasco solution:

Device authentication

device-ring

Geographical location

globe-ring

2-channel structure

2channel


Features

PKI sign

mobile-sign-ring

Micro proximity

micro-proximity-ring

Local sign

desktop-sign-ring

Macro proximity

macroproximity-ring

Risk management

risk-engine2-ring

GeoOTP

geo-otp-ring


Clients & Server

Vakten™ Smartphone

mobile-ring

The Keypasco server – Borgen™

borgen-ring

Vakten™ Browser

monitor-ring

Vakten™ Desktop

laptop-ring






Contact us to learn more

Your Name (required)

Your Email (required)

Your Message