PATENTED SOLUTION Link to News blog >

One-shot keys

Creation and management of highly secure encrypted one-shot keys


Get in touch with our sales team

Proprietary key generation solution

 

Post-quantum proof technology is used to create a set of keys that can be tracked back directly to the owner. As these are one-shot keys, they prevent phishing attempts, man-in-the-middle attacks and the like.

By using a proprietary process (post-quantum proof technology), we are able to associate many pairs of keys (both public and private) with a single user.

This way, whenever users sign information, for security reasons they will use a different pair of keys (public keys are only exposed at the time of signing).

Using one-shot keys prevents risks associated with reusing the same pair of keys. Plus, with this feature there is no longer the need to replace keys every 5 years, as required for security purposes.

 

Key

Post-quantum proof technology

a solution that is secure against the latest quantum computing technologies.

Key

Proprietary solution

proprietary key generation solution

Key

Tamper-proof

Tamper-proof protection solution.

Key

Biometric Security

greater security and convenience compared to traditional identification methods

Key

Authentication with two or more factors

based on the combined use of two authentication methods, for greater security

Key

Simple integration (SDK and API)

Solutions available through both API integration and complete interfaces

Our distinctive features

What makes our solutions unique and why they differ from solutions previously used.

Key

One-shoot Keys

Post-quantum proof technology is used to create a set of keys that can be tracked back directly to the owner. As these are one-shot keys, they prevent phishing attempts, man-in-the-middle attacks and the like.
Show more

Loading

Full transparency for verification

Authentication system based on the device's own keys: every transaction is signed, thereby guaranteeing greater security and innovation compared to OTP-based solutions.

Show more

Route

Blockchain Orchestrator

Option of using one or more blockchains at the same time as part of a quick and simple process.


Show more

Diagnostics

Smart Contracts

Innovative use of smart contracts that issue notifications and/or alerts based on set rules.




Show more

Lock

Blockchain Registration

Greater security: every public key used – therefore every transaction or process – is recorded on the blockchain.


Show More

Settings-2

User Experience

Unique user experience, with a perfect design for every device (smartphone, desktop computer, tablet) for both the user and for the company.

Show moree

Scytale Products

Blockchain solutions that are ever more integrated with current regulations to give your digital transformation the boost it needs and do so under entirely secure conditions.

Signchain Authentication

PSD2 blockchain strong authentication based on the combined use of two channels and two or more factors. Strong authentication, plus the transparency and immutability of a blockchain signature.

Signchain Signature

The eIDAS-compliant blockchain electronic signature: either remotely or in person. For companies, agents and professionals. A secure electronic signature where, in our vision, blockchain is the real trusted cross-border service provider

Ready to start?

Get in touch! We will be happy to answer any question you may have!

[contact-form-7 id=”1874″ title=”Contact Form Scytale2020 ENG”]

Arrow-up