View

Sorting

Products found: 1

logo
Offer a reference bonus
0.00

PrivaKey

Privakey Experience

The convenience of sending Privakey challenge requests to your users iOS and Android phones is backed by strong security measures, most of which, that your customers won’t even realize are happening. Secure Notification Any service that can connect to Privakey’s API can deliver users secure, push challenge notifications. Privakey only sends notifications to users’ devices that are cryptographically bound to their account. Context Rich Message Upon receiving a challenge, users will be presented with a context rich message that clearly communicates a required response. Content can include HTML, documents and forms. In this example, it’s a simple yes/no question for identity verification. Biometric Identity Verification Privakey streamlines high risk and high value interactions. All it requires from a user is the assertion of their intent and a biometric on their device. Privakey’s mobile libraries then access bound private keys and sign the users’ response, ensuring the integrity and non-repudiation. Challenge Response Sent The user’s response is encrypted, digitally signed and returned to the initiating service. The entire process only takes a few seconds, so the customer can enjoy their day and you’ll have a strong, non-repudiated confirmation of your user’s intent.

Four Simple Components

  • Device. Privakey’s underlying technology works by turning users’ mobile phones into a powerful tool for authentication and authorization. This is done by binding user accounts to their phones and tokenizing those devices with asymmetric cryptography.
  • Challenge. With the backing of MFA, services can send unique, interactive messages to their users without worrying about security. Most of the security features are going on in the background so the user experience isn’t inhibited by cumbersome security actions.
  • Biometrics. Biometrics like fingerprint and face ID are used as a second factor to verify who exactly is responding to the challenge. Using biometrics to approve challenges enhances the customer experience of interactions that typically would involve passwords, KBA, OTPs, or signatures.
  • Digital Signature. The challenge and response is encrypted, digitally signed, and returned to the service. This provides a very high degree of assurance that the action was not tampered with and eliminates most man-in-the-middle and phishing threats.
... Learn more
-
-
ROI-calculator
Configurator
ROI-
-
0
0

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.