SlideShare a Scribd company logo
…secured by dynamic passcodes
Sunday, September 18, 2016
INDUSTRY PROBLEM
 LinkedIn
 SWIFT
 LastPass
 Yahoo! Mail
 eBay
 Google
 JP Morgan Chase
52% of existing
data requiring
protections is
vulnerable
Highly
vulnerable
industries
Your Company can be the Next Target!
“ONE OF THE MOST
COMMON AND
DANGEROUS SECURITY
MISTAKES IS USING THE
SAME PASSWORD
ACROSS MULTIPLE
ACCOUNTS”
VICTIMS OF THE
DOMINO EFFECT
THE MOST COMMON PASSWORDS:
1. 123456
2. password
3. 12345678
“If hacked, it can cause a “domino effect,”
allowing all accounts with the same password to
be breached.”
73% of online accounts use duplicated
passwords*
*Source: Telesign
iKeyPass is the ONLY technology that eliminates
duplicate passwords altogether!
iKeyPass offers a “break proof” Online User Authentication solution –
perhaps the safest identity/access management solution in the industry.
Our technology solution:
 A user defined dynamic passcode
 Based on unpredictable variables
 No token, no mobile device and no fingerprints to deal with
 * Anywhere *Anytime * Any device *
 Immune to MITM attacks
 Feature set compliant with NIST SB800-171
SOLUTIONS
Current Solutions
 Static Usernames / Passwords
 Complicated password rules
 User ID Confirmation with
questions pre-defined by
business
 RSA Tokens
 OTPs requiring additional device
 Computer generated codes
 Device recognition
 Pattern recognition / Trusted 3rd
party alliance
iKeyPass Solution
 Almost “break proof” online user
authentication solution.
 Dynamic Passcodes
 Based on unpredictable / changing
variable
 Defined by User
 No communications over the wire
 Dichotomy of Servers
 No RSA tokens. No mobile devices. No
biometrics
 * Anywhere *Anytime *Any device
 Immune to MITM attacks
USER ACCEPTANCE
 Millennials and Gen Xers have the highest interest in two-factor authentication.
 7 in 10 Millennials and Gen Xers (18 to 49) want an extra layer of protection.
TECHNOLOGY
User
Business Server
iKeyPass
Prompt/ Passcode
Changing Variable,
Publicly Available
• Dow Jones Closing
• Stock Symbol
• Weather Hi/Low
• Systems Time
• First word of NY Times
User’sChoice
Formula
+, -, x, /, ^2, %
Factor
0,1,2,3,4 or
2nd variable
Access Code
UserDefined
IP: USPTO: US2015/0163218 A1.
PCT: US2014/065851
Authentication
Requests Access
SEPARATION OF LOGIN PROCESS
User Business Server iKeyPass
1. Sends Username
5. Sends passcode for
authentication
2. Sends associated Pseudo ID
for passcode
3. Returns current base value
and passcode for prompt OR
only passcode for no-prompt
6. Verifies with Result (Auth.
Code) & Allows / Disallows
4. Sends current base value, if
applicable
APPLICATIONS
 Online User Accounts
(Web-based)
 Online Software & SaaS
 Web Mail
 Password Managers (SSO)
 Cloud (data storage)
 Internet of things (IOT) / Devices
iKeyPass RSA Token
One-time
Password
(OTP)
Device
Recognition
Pattern
Recognition
Trusted
Parties
Alliances
Biometrics
Provider Defined /
Computer generated
X X X X X N/A
Requires Additional Device X +$$ X +$$ X +$$
Transmits over wire X X X X X X
User Defined N/A
Level of Complexity
User
defined
Preset Preset Preset Preset Preset Preset
Device Independent
Unpredictable
Multi level security (for
SSO)
Multitier /
Multidimensional
COMPETING SOLUTIONS
SAMPLE SITE
 Does not replace current login process or UI
 Provides Optional third-factor authentication
 At user discretion / user defined
OFFER
 Stand alone, Independent layer of Security for your
Customers
 Does not replace current UI or login process
 Free integration of iKeyPass Authenticator – No NRE
 Six months free trial with no obligations
CONTACT: INFO
PHONE: +1 (408) 748-1234
E-MAIL: info@ikeypass.com
…secured by dynamic passcodes

More Related Content

PDF
Two factor authentication
PDF
Two-factor Authentication
PDF
Adding Two Factor Authentication to your App with Authy
PDF
2 factor authentication 3 [compatibility mode]
PPTX
Seminar-Two Factor Authentication
PPTX
Why iOS developers requires code signing certificate.?
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
PDF
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
Two factor authentication
Two-factor Authentication
Adding Two Factor Authentication to your App with Authy
2 factor authentication 3 [compatibility mode]
Seminar-Two Factor Authentication
Why iOS developers requires code signing certificate.?
Combat the Latest Two-Factor Authentication Evasion Techniques
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...

What's hot (20)

PDF
Avoiding Two-factor Authentication? You're Not Alone
PDF
3 reasons your business can't ignore Two-Factor Authentication
PDF
Two-factor Authentication
PDF
HYPR: The Leading Provider of True Passwordless Security®
PDF
Two factor authentication-in_your_network_e_guide
PDF
Multi factor authentication issa0415-x9
PDF
Multi Factor Authentication Whitepaper Arx - Intellect Design
PDF
Why Two-Factor Authentication?
PPTX
Two factor authentication presentation mcit
PPTX
Two factor authentication 2018
PPTX
Passwordless auth
PDF
Multi Factor Authentication
PDF
Auth-Shield
PDF
Securing corporate assets_with_2_fa
PDF
Sp 29 two_factor_auth_guide
PDF
Session 7 e_raja_kailar
PPTX
Two Factor Authentication Made Easy ICWE 2015
PPT
Ynamono Hs Lecture
PDF
M-Pass: Web Authentication Protocol
PDF
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Avoiding Two-factor Authentication? You're Not Alone
3 reasons your business can't ignore Two-Factor Authentication
Two-factor Authentication
HYPR: The Leading Provider of True Passwordless Security®
Two factor authentication-in_your_network_e_guide
Multi factor authentication issa0415-x9
Multi Factor Authentication Whitepaper Arx - Intellect Design
Why Two-Factor Authentication?
Two factor authentication presentation mcit
Two factor authentication 2018
Passwordless auth
Multi Factor Authentication
Auth-Shield
Securing corporate assets_with_2_fa
Sp 29 two_factor_auth_guide
Session 7 e_raja_kailar
Two Factor Authentication Made Easy ICWE 2015
Ynamono Hs Lecture
M-Pass: Web Authentication Protocol
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Ad

Viewers also liked (17)

PDF
Product Launch - Probably The Best You've Come Across (Modestly claiming)
PPTX
Mule environments
PPT
Semana 2 dia 3 cotidiano
DOC
торгівля людьми забороняється законом україни
PPTX
PPTX
Securing Micro Services in Cloud Foundry
PDF
Introducción a Vagrant
PPTX
Когда мы были на войне
PDF
[Easy] How to use Evernote: Beginner's Guide
PPTX
ConnectIn Italia 2016: la storia di Enel
PPTX
The lipids
PPT
Introduction to the biochemistry
PPTX
Этот удивительный киномир 2
PDF
An Introduction To ifttt
PPTX
Service Oriented Architecture
PDF
Docker: la revolución en virtualización
Product Launch - Probably The Best You've Come Across (Modestly claiming)
Mule environments
Semana 2 dia 3 cotidiano
торгівля людьми забороняється законом україни
Securing Micro Services in Cloud Foundry
Introducción a Vagrant
Когда мы были на войне
[Easy] How to use Evernote: Beginner's Guide
ConnectIn Italia 2016: la storia di Enel
The lipids
Introduction to the biochemistry
Этот удивительный киномир 2
An Introduction To ifttt
Service Oriented Architecture
Docker: la revolución en virtualización
Ad

Similar to iKeyPass...Unbreakable Password Security (20)

PDF
CISSP Domain 05 Identity and Access Management (IAM).pdf
PPTX
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PDF
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
PPSX
Welcome to the 3rd generation in user authentication
PDF
Class paper final
PDF
#MFSummit2016 Secure: Mind the gap strengthening the information security model
PDF
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
PPTX
FrontOne our new and different solutions
PDF
Nt2580 Final Project Essay Examples
PPT
Authentication Technologies
PPT
Authentication technologies
PDF
information security Lecture by cyber security
PDF
Access Control
PDF
Msk security non linear authenticaiton
PPT
Authenticationtechnologies 120711134100-phpapp01
PDF
FIDO and the Future of User Authentication
PDF
Beyond Passwords: FIDO and the Future of User Authentication
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
CISSP Domain 05 Identity and Access Management (IAM).pdf
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
Mercedes Wyss - Modern Identity Management (in the Era of Serverless and Micr...
Welcome to the 3rd generation in user authentication
Class paper final
#MFSummit2016 Secure: Mind the gap strengthening the information security model
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
FrontOne our new and different solutions
Nt2580 Final Project Essay Examples
Authentication Technologies
Authentication technologies
information security Lecture by cyber security
Access Control
Msk security non linear authenticaiton
Authenticationtechnologies 120711134100-phpapp01
FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
Taking Control of the Digital and Mobile User Authentication Challenge
 

Recently uploaded (20)

PDF
Containerization lab dddddddddddddddmanual.pdf
PPT
12 Things That Make People Trust a Website Instantly
PPTX
E -tech empowerment technologies PowerPoint
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
The Evolution of Traditional to New Media .pdf
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
Cyber Hygine IN organizations in MSME or
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
Database Information System - Management Information System
PPTX
APNIC Report, presented at APAN 60 by Thy Boskovic
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Introduction to the IoT system, how the IoT system works
Containerization lab dddddddddddddddmanual.pdf
12 Things That Make People Trust a Website Instantly
E -tech empowerment technologies PowerPoint
si manuel quezon at mga nagawa sa bansang pilipinas
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Uptota Investor Deck - Where Africa Meets Blockchain
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
The Evolution of Traditional to New Media .pdf
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Cyber Hygine IN organizations in MSME or
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Introduction to cybersecurity and digital nettiquette
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Database Information System - Management Information System
APNIC Report, presented at APAN 60 by Thy Boskovic
Mathew Digital SEO Checklist Guidlines 2025
Introduction to the IoT system, how the IoT system works

iKeyPass...Unbreakable Password Security

  • 1. …secured by dynamic passcodes Sunday, September 18, 2016
  • 2. INDUSTRY PROBLEM  LinkedIn  SWIFT  LastPass  Yahoo! Mail  eBay  Google  JP Morgan Chase 52% of existing data requiring protections is vulnerable Highly vulnerable industries Your Company can be the Next Target!
  • 3. “ONE OF THE MOST COMMON AND DANGEROUS SECURITY MISTAKES IS USING THE SAME PASSWORD ACROSS MULTIPLE ACCOUNTS” VICTIMS OF THE DOMINO EFFECT THE MOST COMMON PASSWORDS: 1. 123456 2. password 3. 12345678 “If hacked, it can cause a “domino effect,” allowing all accounts with the same password to be breached.” 73% of online accounts use duplicated passwords* *Source: Telesign iKeyPass is the ONLY technology that eliminates duplicate passwords altogether!
  • 4. iKeyPass offers a “break proof” Online User Authentication solution – perhaps the safest identity/access management solution in the industry. Our technology solution:  A user defined dynamic passcode  Based on unpredictable variables  No token, no mobile device and no fingerprints to deal with  * Anywhere *Anytime * Any device *  Immune to MITM attacks  Feature set compliant with NIST SB800-171
  • 5. SOLUTIONS Current Solutions  Static Usernames / Passwords  Complicated password rules  User ID Confirmation with questions pre-defined by business  RSA Tokens  OTPs requiring additional device  Computer generated codes  Device recognition  Pattern recognition / Trusted 3rd party alliance iKeyPass Solution  Almost “break proof” online user authentication solution.  Dynamic Passcodes  Based on unpredictable / changing variable  Defined by User  No communications over the wire  Dichotomy of Servers  No RSA tokens. No mobile devices. No biometrics  * Anywhere *Anytime *Any device  Immune to MITM attacks
  • 6. USER ACCEPTANCE  Millennials and Gen Xers have the highest interest in two-factor authentication.  7 in 10 Millennials and Gen Xers (18 to 49) want an extra layer of protection.
  • 7. TECHNOLOGY User Business Server iKeyPass Prompt/ Passcode Changing Variable, Publicly Available • Dow Jones Closing • Stock Symbol • Weather Hi/Low • Systems Time • First word of NY Times User’sChoice Formula +, -, x, /, ^2, % Factor 0,1,2,3,4 or 2nd variable Access Code UserDefined IP: USPTO: US2015/0163218 A1. PCT: US2014/065851 Authentication Requests Access
  • 8. SEPARATION OF LOGIN PROCESS User Business Server iKeyPass 1. Sends Username 5. Sends passcode for authentication 2. Sends associated Pseudo ID for passcode 3. Returns current base value and passcode for prompt OR only passcode for no-prompt 6. Verifies with Result (Auth. Code) & Allows / Disallows 4. Sends current base value, if applicable
  • 9. APPLICATIONS  Online User Accounts (Web-based)  Online Software & SaaS  Web Mail  Password Managers (SSO)  Cloud (data storage)  Internet of things (IOT) / Devices
  • 10. iKeyPass RSA Token One-time Password (OTP) Device Recognition Pattern Recognition Trusted Parties Alliances Biometrics Provider Defined / Computer generated X X X X X N/A Requires Additional Device X +$$ X +$$ X +$$ Transmits over wire X X X X X X User Defined N/A Level of Complexity User defined Preset Preset Preset Preset Preset Preset Device Independent Unpredictable Multi level security (for SSO) Multitier / Multidimensional COMPETING SOLUTIONS
  • 11. SAMPLE SITE  Does not replace current login process or UI  Provides Optional third-factor authentication  At user discretion / user defined
  • 12. OFFER  Stand alone, Independent layer of Security for your Customers  Does not replace current UI or login process  Free integration of iKeyPass Authenticator – No NRE  Six months free trial with no obligations
  • 13. CONTACT: INFO PHONE: +1 (408) 748-1234 E-MAIL: info@ikeypass.com …secured by dynamic passcodes