TokenOne
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

Shortage of inhouse IT engineers

High costs of IT personnel

Values

Reduce Costs

Ensure Security and Business Continuity

TokenOne

Highest Security At Scale

Description

TokenOne allows users to verify their real world credentials and identity, register their phone as a token and create a secure and secret PIN. A user can complete all necessary steps in a way that enables an organisation to meet both identity proofing and legal compliance requirements. Users can also add credentials as required by an organisation’s business rules. Technology Overview Patented Technology Based on principles of industry recognised uncrackable form of encryption (One-Time Pad). No Algorithms Ensures TokenOne is not vulnerable to someone cracking an algorithm and compromising multiple accounts and all the reliant services and infrastructure. Self Management Users register their device as a true and unique token and create their own PIN. Ongoing management of both is also done by the user. Authentication Secure and simple by proving the presence of the device and mentally scrambling the PIN. Genuine strong 2FA As both factors are strong, TokenOne proves the presence of the device AND the user and is one of the few mass market authentication solutions where both factors are strong. PIN never revealed ​ The user knows their PIN which is never entered or revealed to anyone, not even to TokenOne or the service the user is accessing. Strong Two-Factor Authentication in Three Easy Steps
  1. Download the App
  2. Scan QR code and Register
  3. Encode your secret PIN

Scheme of work

 Scheme of work