An authentication method based on the combined use of two channels and two or more factors, plus the transparency and immutability of a blockchain signature.
We are well aware of the fact that remembering all your passwords or keeping them somewhere safe is anything but easy. With SignChain Auth, you will be able to access all your personal services without a password, confirm bank transfers and access personal areas. If something unexpected happens to your mobile device or if you forget your PIN number, your keys are revoked. Plus, it can be used with any device or operating system.
So what are you waiting for to make your life easier, more secure and trouble-free? Try SignChain Auth!
Strong Authentication is an authentication method based on the combined use of two channels and two or more factors. It allows for the use of a public key associated with a user’s wallet to generate a unique key that is only compatible with the domain the user is trying to access – so a key to authenticate ownership of the account.
Compliant with authentication based on the use of two or more elements classified as knowledge (something that only the user knows) – a secret PIN number of an OTP), possession (something that only the user has – a smartphone) and inherence (something that only the user is – a digital fingerprint).
SCA-compliant, based on the use of two or more elements classified as knowledge (something that only the user knows), possession (something that only the user has) and ‘inherence’ (something that the user is)
A good code must be unique and secure, against the risk of being decrypted or discovered. With Scytale, you will have a durable code as all transmitted information is encoded with the AES 256 encryption algorithm and can only be decrypted by the concerned device.
An authentication code must be unique and durable against the risk of being decrypted.
The three factors (knowledge, possession and inherence) are entirely independent from each other. As a result, the PIN number, digital fingerprint and smartphone are factors that cannot compromise each other.
The factors – knowledge, possession and inherence – are entirely independent from each other.
The authentication code is associated with the transaction information and is not valid if the recipient or other data are changed. So the code is no longer valid if unauthorised changes are made.
The authentication code is associated with the transaction information and is not valid if the recipient or other transaction data are changed.
SignChain Auth is above all an electronic signature as well
It can be used to log in, but also to sign any information or document.
Access to personal areas, transaction confirmation, bank transfer confirmation, loan request confirmation, investment proposal acceptance.
Personal area authentication, confirmation of receipt for press releases, VPN access, access to company areas.
Access confirmation, log and confirmation registration, authentication tracking, authentication for secure areas, transparency for audits.
Signature on transport documents, orders, purchases, confirmations of receipt, waybills, status changes, process certifications, confirmation of changes.
What makes our solutions unique and why they differ from solutions previously used.
Post-quantum proof technology is used to create a set of keys that can be tracked back directly to the owner. As these are one-shot keys, they prevent phishing attempts, man-in-the-middle attacks and the like.
Show more
Authentication system based on the device's own keys: every transaction is signed, thereby guaranteeing greater security and innovation compared to OTP-based solutions.
Option of using one or more blockchains at the same time as part of a quick and simple process.
Innovative use of smart contracts that issue notifications and/or alerts based on set rules.
Greater security: every public key used – therefore every transaction or process – is recorded on the blockchain.
Unique user experience, with a perfect design for every device (smartphone, desktop computer, tablet) for both the user and for the company.
Our solutions allow for simple integration with company systems and top service providers
Every public key used for an authentication is registered on the blockchain. If the same key is used twice, the authentication request is rejected, followed by the issue of an event shared with the network. The tampering attempt is shared with all those using the service and the police (Italian Postal and Communications Police, Financial Police, etc.).