New Use Cases and articles Link to news

Signchain Authchain

PSD2 Compliant Strong Authentication

An authentication method based on the combined use of two channels and two or more factors, plus the transparency and immutability of a blockchain signature.


Get in touch with our sales team
TRUSTED BY

Strong Authentication Blockchain

We are well aware of the fact that remembering all your passwords or keeping them somewhere safe is anything but easy. With SignChain Auth, you will be able to access all your personal services without a password, confirm bank transfers and access personal areas. If something unexpected happens to your mobile device or if you forget your PIN number, your keys are revoked. Plus, it can be used with any device or operating system.

So what are you waiting for to make your life easier, more secure and trouble-free? Try SignChain Auth!

PSD2-compliant authentication

Strong Authentication is an authentication method based on the combined use of two channels and two or more factors. It allows for the use of a public key associated with a user’s wallet to generate a unique key that is only compatible with the domain the user is trying to access – so a key to authenticate ownership of the account.

Strong Customer Authentication

Compliant with authentication based on the use of two or more elements classified as knowledge (something that only the user knows) – a secret PIN number of an OTP), possession (something that only the user has – a smartphone) and inherence (something that only the user is – a digital fingerprint).

PSD2

SCA-compliant, based on the use of two or more elements classified as knowledge (something that only the user knows), possession (something that only the user has) and ‘inherence’ (something that the user is)

Unique authentication code

A good code must be unique and secure, against the risk of being decrypted or discovered. With Scytale, you will have a durable code as all transmitted information is encoded with the AES 256 encryption algorithm and can only be decrypted by the concerned device.

PSD2

An authentication code must be unique and durable against the risk of being decrypted.

Factor independence

The three factors (knowledge, possession and inherence) are entirely independent from each other. As a result, the PIN number, digital fingerprint and smartphone are factors that cannot compromise each other.

PSD2

The factors – knowledge, possession and inherence – are entirely independent from each other.

Dynamic linking of the request

The authentication code is associated with the transaction information and is not valid if the recipient or other data are changed. So the code is no longer valid if unauthorised changes are made.

PSD2

The authentication code is associated with the transaction information and is not valid if the recipient or other transaction data are changed.

The SCA can be used for

SignChain Auth is above all an electronic signature as well

It can be used to log in, but also to sign any information or document.

Our distinctive features

What makes our solutions unique and why they differ from solutions previously used.

Key

One-shoot Keys

Post-quantum proof technology is used to create a set of keys that can be tracked back directly to the owner. As these are one-shot keys, they prevent phishing attempts, man-in-the-middle attacks and the like.
Show more

Loading

Full transparency for verification

Authentication system based on the device's own keys: every transaction is signed, thereby guaranteeing greater security and innovation compared to OTP-based solutions.

Show more

Route

Blockchain Orchestrator

Option of using one or more blockchains at the same time as part of a quick and simple process.


Show more

Diagnostics

Smart Contracts

Innovative use of smart contracts that issue notifications and/or alerts based on set rules.




Show more

Lock

Blockchain Registration

Greater security: every public key used – therefore every transaction or process – is recorded on the blockchain.


Show More

Settings-2

User Experience

Unique user experience, with a perfect design for every device (smartphone, desktop computer, tablet) for both the user and for the company.

Show moree

AUTH1

Integrated and integrable

Our solutions allow for simple integration with company systems and top service providers

gogle
dropbox
COMPLIANCE – CONNECTION – STANDARDISATION

Every public key used for an authentication is registered on the blockchain. If the same key is used twice, the authentication request is rejected, followed by the issue of an event shared with the network. The tampering attempt is shared with all those using the service and the police (Italian Postal and Communications Police, Financial Police, etc.).

Arrow-up