Using phone to authenticate users – the most secure mechanism commonly available to humans today |From Enigma to IoT #6

Using phone to authenticate users – the most secure mechanism commonly available to humans today |From Enigma to IoT #6

A cell phone, equipped with the right authentication mechanism, is way better than a password. Stolen passwords and credentials became a plague of the digital world in which we live. In ELIoT Pro we use a cell phone as a universal tool in Human-to-Machine authentication.

Moreover, biometric technologies, available in the phones is used as a 2nd factor in all transactions. Combination of our password-free technology together with such factor is significantly more secure since biometrics can confirm to the system knows that it’s you that uses that phone.

Stealing one’s cell phone and biometrics or pin code is a way less probable than stealing a static credential.

Commonly, using biometrics as a main authentication is still static credentials since it’s not reinforced with one-time code, which disappears – it seems to be a weak solution. In their case it disappears in 200 milliseconds! All in all, the most secure way of authentication so far commonly available for humans is a right combination of elements that we put together in ELIoT Pro’s system.

Cyberus Labs has developed a unique password-free user authentication platform which was designed to be ultra-secure and at the same time simple and fast to use.

ELIoT Pro’s Human-to-Machine component generates a highly secure, unique one-time token for each log in session, utilizing a variant of One Time Pad Encryption. This has been mathematically proven to be unbreakable in 1947 and is widely accepted to be the most secure encryption methodology available.

This technology can be deployed across a number of applications and industries, thanks to its ability to provide cast-iron Human-to-Machine authentication in many key sectors of IoT.