How It Works
Physical Doors
  1. The door and phone connect using BLE and mutally authenticate each other
  2. The user presses [Unlock] in App (if needed) to initiate a cryptographic challenge from the door
  3. The door unlocks!
Computer Logins
  1. The phone and laptop mutually authenticate each other using any interface (e.g., BLE, WiFi, or USB)
  2. The user presses [Enter] instead of their typical password, which initiates a cryptographic challenge
  3. The user satisfies the assurance request on the phone and permission is granted
Web Services
  1. The user types in their email or username (no password)
  2. The service will send a cryptographic challenge to the phone through the cloud or through the computer they are using
  3. The user satisifies the assurance requirements and the action is permitted
How We Do It
Multi-level Assurance
iPhone App
  • Presence
  • Intent
  • Identification
Secure
by
Design
Eliminate Phishing
The credentials never leave the phone, and therefore cannot be entered into a malicious website. In fact, the user doesn't even know them!
Trusted Data Entry
We create a trusted path between the human and the remote service. You can enter your social security number or cast your vote for the next election with confidence!
Protected from Malware
SDA is hardened against software-based malware. You can do your banking in the hotel lobby without any fear malware interfering with your transactions!
A Revolutionized Experience for...
Employees
Physical Access Control
The
Past
The
Future
Join the Allthentication Revolution!
We'll make it easy for you.