THINOPS CYPHER

THINOPS CYPHER

THINOPS CYPHER

Rethink
fraud protection.

Rethink
fraud protection.

Rethink
fraud protection.

It doesn’t matter how protected your secrets are. As long as you have secrets, fraudsters will try to steal them.

It doesn’t matter how protected your secrets are. As long as you have secrets, fraudsters will try to steal them.

It doesn’t matter how protected your secrets are. As long as you have secrets, fraudsters will try to steal them.

ThinOps Cypher prevents fraud by replacing stored secrets with relationship-based entanglements.

ThinOps Cypher prevents fraud by replacing stored secrets with relationship-based entanglements.

ThinOps Cypher prevents fraud by replacing stored secrets with relationship-based entanglements.

Old School

With ThinOps Cypher

Central stores of credentials

Decentralized, one-to-one encrypted relationships with no stored PII

Single-sided verification

Bi-directional verification for both parties on every transaction

Confusing and degraded user experience

So easy users won’t try to get around the security controls

FRAUD PREVENTION

Decentralized
and entangled.

The most common sources of fraud are stolen secrets like usernames, passwords, tokens, keys, and more. Building higher walls and deeper moats around these repositories isn’t working. Every “improvement” to prevent fraud has made users’ lives worse with each extra step and encouraged worse security habits with attempts to circumvent controls. 

Instead of relying on centralized stores of secrets that can be stolen, phished, keylogged, observed, recorded, brute forced, etc., ThinOps Cypher moves the authentication process from a centralized server to a user’s mobile phone. 

This decentralized platform verifies every transaction in a bidirectional entanglement, preventing fraud losses from account takeover, credential theft, internal threats, and more.

COMPARISON

Verify every
transaction. 

Each time a user enrolls to use ThinOps Cypher on a new system, a new set of public/private keys is created for that specific system on the user’s mobile phone. Both sides of this relationship are verified on every transaction using PKI Entanglement. 

In a transaction, each side of that entanglement reaches out to the other to ensure that set of public/private keys that are contained only between the two parties are the correct ones. 

By creating this bidirectional, one-to-one relationship, there are no secrets to phish (no usernames or passwords) and every transaction behind cypher is protected by single-use, cryptographically controlled identity proofs. Even better? Users don’t even notice. 

Step
Legacy fraud prevention 
ThinOps Cypher fraud prevention

User initiates a transaction (ex: purchases, transferring money, requesting records, etc.)

Asks user to provide credentials to log into the service, requiring known and stored secrets such as usernames and passwords. 

Offers correct level of challenge based on type of transaction (notification, approve button, biometric, or cognitive keyboard) 

User provides valid credentials/proof

Credentials are sent to a central authenticator for verification 

Verifies the correct user is on the correct device tied to the service 

Verification

Authenticator verifies if the credentials provided match the ones they’ve stored (as even biometric logins are still tied to a login)

Reaches out directly via its PKI Entanglement to create one side of an encrypted “handshake” to verify the service it’s reaching out to is the service it’s entangled to

Multi-factor

Go on. Tell us how you really feel about 6-digit codes. 

The entangled service reaches back out to complete the handshake by mutually validating the organization, system, user, and device are all correct and participants are willing / uncompromised, all behind the scenes

Time taken

Depends on if you need something like a password reset or code and/or if the passkey gods are shining upon you 

<1 second. (For real. We wish it sounded more real because it’s easier to believe.) 

Frustration

You know that sigh you take before you log in somewhere these days? That.

Only when you realize how much time you’ve wasted on ineffective login/fraud prevention tools

ACCESSIBILITY

Customized keyboards for more fraud protection.

For high-risk or high-value actions, ThinOps Cypher offers another layer of interaction with our patented OneTiCK cognitive keyboard so you can not only prove that you're present, but you are actively participating in the interaction. 

This doesn’t require a long, complex password. It also prevents phishing, shoulder-surfing, keyloggers, and more. These keyboards can be customized to any icon, sound, or more.